Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Stepwise Deployable Mechanism Design and Dynamics Analysis of UAV Folding Wing
Ye XU, GuoSheng XU, Yukun WANG, Gang WANG, Jingwang LIU, BoJun FAN, Miao WU
Modern Defense Technology    2024, 52 (1): 24-33.   DOI: 10.3969/j.issn.1009-086x.2024.01.004
Abstract116)   HTML7)    PDF (2561KB)(77)       Save

Folding wing deployment scheme of small patrol UAV has an important influence on UAV flight mode switching. According to folding characteristics and deployment requirements of UAV folding wing, two deployment schemes synchronous deployment and stepwise deployment are proposed. With deployment dynamics model of a folding wing being established based on Lagrangian method, and folding wing drag force during deployment being calculated with aerodynamic simulation tool, driving torques needed for different deployment schemes are obtained. Driving torque is used as the evaluation criterion to optimise deployment scheme of the folding wing. Simulation results show that the stepwise deployment scheme has a short deployment time and a small deployment torque to reach the required deployment position. Finally, a deployment mechanism is designed for the stepwise deployment scheme, and static strength analysis of the structure is provided to verify the feasibility of the structure.

Table and Figures | Reference | Related Articles | Metrics
Cyberspace Defense Capability Assessment Based on TOPSIS-Grey Association Analysis
Kun WANG, Yuchen ZHANG, Shuqin DONG, Jiang WU
Modern Defense Technology    2023, 51 (6): 97-104.   DOI: 10.3969/j.issn.1009-086x.2023.06.012
Abstract22)   HTML2)    PDF (839KB)(54)       Save

Attack and defense are dialectical unity, and their mutual transformation is a direct embodiment of the combat process. In network attack and defense, the offense usually dominates while the defense is in a relatively weak position, and the idea of dynamic defense is valued. By combing and analyzing the dynamic defense of cyberspace, the factors affecting the defense capability of cyberspace are obtained, and a set of cyberspace defense index systems based on dynamic empowerment is constructed. To eliminate the interference of human preference on the results, the entropy weight method is adopted to simplify the index set, and the comprehensive weight of each index is weighted. The TOPSIS(technique for order preference by similarity to an ideal solution)-gray correlation analysis method is applied to construct an evaluation model to realize the evaluation of cyberspace defense capability, and the effectiveness and feasibility of the evaluation model are proved by specific cases.

Table and Figures | Reference | Related Articles | Metrics
Deployment Method of Ground-Based Tactical Laser System for UAV Swarm Defense Based on PSO Algorithm
Changhong QU, Yu SONG, Kun WANG, Qingyong CUI, Jiangyang CHEN
Modern Defense Technology    2023, 51 (5): 15-24.   DOI: 10.3969/j.issn.1009-086x.2023.05.003
Abstract329)   HTML29)    PDF (1324KB)(152)       Save

In modern wars, it is difficult for traditional air defense systems to effectively and economically counter unmanned aerial vehicle (UAV) swarm, and ground-based laser systems have become an important means of UAV swarm defense under the key area defense scenarios. Research on the deployment of laser systems will help give full play to their combat capability. Based on the power density concept, the damage model of ground-based laser systems to the UAV target flying at a uniform speed in a straight line is derived. A fitness function is designed to evaluate the advantages and disadvantages of the deployment scheme. Additionally, the particle swarm optimization (PSO) algorithm is adopted to provide the optimal deployment scheme under different specifications and quantities of deployable laser systems, and under different possible attack directions, heights, and speeds of UAVs. Comparison with the scheme of deploying all the laser systems in the center of the key area and of deploying these systems randomly verifies the correctness of the proposed scheme.

Table and Figures | Reference | Related Articles | Metrics