Loading...

Table of Content

    28 October 2022, Volume 50 Issue 5
    SPECIAL COLUMN
    An Approach of Optical Satellites Tracking an Extraatmospheric Vehicle Based on UKF
    Yu-yan TANG, Yong JIANG
    2022, 50(5):  1-7.  doi:10.3969/j.issn.1009-086x.2022.05.001
    Asbtract ( 11208 )   HTML ( 10291)   PDF (1325KB) ( 739 )  
    Figures and Tables | References | Related Articles | Metrics

    With the rapid growth of the technologies of vehicles and tracking, this paper proposes an approach of optical satellites tracking an extraatmospheric vehicle based on unscented Kalman filter (UKF) under the background of satellite constellation tracking vehicles. It solves the problem of optical satellites tracking an extraatmospheric vehicle accurately and velocity estimation error converging rapidly within 30 s in the case of reasonable observation distance. The validity of this algorithm and relative superiority to EKF are verified by simulation.

    AIR SPACE DEFENSE SYSTEM AND WEAPON
    Operational Application Mode and Key Technologies of Unmanned Underwater Vehicle
    Sheng-zhi SUN, Zhuang MIAO, Yang LI, Yun LUO, Wei-juan ZHENG, Bi-qi SHENG
    2022, 50(5):  8-13.  doi:10.3969/j.issn.1009-086x.2022.05.002
    Asbtract ( 5779 )   HTML ( 505)   PDF (1155KB) ( 767 )  
    Figures and Tables | References | Related Articles | Metrics

    With the gradual maturity of unmanned underwater vehicle(UUV), the study of its application in modern underwater warfare is an important basis for improving the theory of future underwater warfare. This paper analyzes the operational requirements of UUV about covert pursuit,launching a surprise attack and confusing enemy and attack, and researches three operational modes of UUV: passive centralized type, semi-active distribution type and resident distribution type, from the perspective of improving underwater combat capabilities. In addition, in order to adapt to the future underwater high-intensity warfare, the key technologies such as deep-diving communication, autonomous control and underwater distribution and recovery of UUV are proposed to provide an important practical basis for the development of UUV combat theory.

    Low-altitude UAV Operation Risk Assessment Method Considering the Uncertainty
    Wen-tao WANG, Xu-sheng GAN, Ya-rong WU, Jin-shen REN, Cui-xiang WANG
    2022, 50(5):  14-21.  doi:10.3969/j.issn.1009-086x.2022.05.003
    Asbtract ( 5369 )   HTML ( 392)   PDF (3463KB) ( 423 )  
    Figures and Tables | References | Related Articles | Metrics

    In view of the complex low-altitude airspace environment and the fact that unmanned aerial vehicle(UAV) operation risks cannot be quantified, a low-altitude UAV operation risk assessment method considering the uncertainty in the operation process is proposed. According to the force model during the descent of the UAV, the area affected by the sudden failure of the UAV is deduced. Considering the uncertainty in the operation of the UAV, the Monte-Carlo method is used to determine the UAV’s fall point distribution, the impact area of the fall is calculated, and the system risk value is obtained. Through case analysis, the validity and rationality of the proposed risk assessment method are verified, which can provide real-time safety assessment for low-altitude UAV air traffic management, and guarantee the UAV operates safely in the low-altitude airspace.

    Research on UAV Supporting Ground Air Defense Operations
    Zhan-fu SONG, Quan-xi ZHAO, Wen-zhi HU, Yi HUANG
    2022, 50(5):  22-27.  doi:10.3969/j.issn.1009-086x.2022.05.004
    Asbtract ( 5189 )   HTML ( 409)   PDF (746KB) ( 771 )  
    Figures and Tables | References | Related Articles | Metrics

    With their low cost, low casualty, multi-energy and high-efficiency advantages, UAVs are constantly changing the rules of engagement of war, and have become the focus of competition among countries around the world. According to the advantages of UAV support operations, explore UAV support operations in air defense operations such as early warning detection, electronic countermeasures, information communication, guided strikes, camouflage protection, transportation and delivery, and actual combat training. The proposals for UAVs devlopments in ground air defense forces are put forward, which are important for the rapid integration of UAVs into the air defense combat system and the improvement of air defense combat effectiveness.

    Summary of Research on Security Issues of ADS-B Protocol
    Jia-wei BAO, Xiao-ping TIAN, Yu-na LIU, Chang-kuan ZOU, Yu-qing ZHANG
    2022, 50(5):  28-35.  doi:10.3969/j.issn.1009-086x.2022.05.005
    Asbtract ( 5081 )   HTML ( 349)   PDF (805KB) ( 473 )  
    Figures and Tables | References | Related Articles | Metrics

    As the core of the next-generation air transportation system, ADS-B is becoming a substitute for radar. It requires aircraft to broadcast its precise geographic location on a regular basis, thereby improving the safety of the aircraft. However, the ADS-B protocol lacks a security mechanism, which makes the ADS-B signal vulnerable to network attacks during transmission, causing signal interference or missing, and seriously threatening aviation safety. This article first reviews the development of ADS-B at home and abroad, and analyzes the three dimensions of ADS-B transmission process, ADS-B hardware and software, and ADS-B data on the basis of summarizing the security problems existing in the ADS-B. In the field of artificial intelligence technology, especially the deep learning method in machine learning is one of the ways to solve this problem.

    MILITARY INTELLIGENCE
    Multi-agent Autonomous Cooperative Confrontation based on Meta Curriculum Reinforcement Learning
    Ji-shi-yu DING, Ke-wu SUN, Bo DONG, Xi-rui YANG, Chang-chao FAN, Zhe MA
    2022, 50(5):  36-42.  doi:10.3969/j.issn.1009-086x.2022.05.006
    Asbtract ( 4779 )   HTML ( 298)   PDF (1899KB) ( 576 )  
    Figures and Tables | References | Related Articles | Metrics

    Multi-agent cooperation and competition has the characteristics of real-time and action continuity, incomplete information, huge search space, multi-complex tasks and time-space inference, etc. It is one of the most challenging problems in the current artificial intelligence field. Aiming at the problem of long training time for large-scale multi-agent reinforcement learning, this paper proposes an Actor-Critic-based cooperative confrontation framework, which uses meta curriculum reinforcement learning method to extract meta-models of basic tasks for small-scale scenarios. We carry out model migration to large-scale scenarios based on the curriculum learning, which continues training based on the meta-models and finally obtains a better collaboration strategy. This paper conducts simulation experiments on the "Star-Craft II" platform. The results show that the multi-agent cooperative confrontation technology based on the meta curriculum reinforcement learning can effectively accelerate the training process, and can achieve a higher win rate within a shorter time compared with the traditional training methods. The training speed is increased by about 40%. This method can effectively support the efficient generation of multi-agent cooperative confrontation strategies.

    NAVIGATION,GUIDANCE AND CONTROL
    Finite Time Convergent Guidance Law for Intercepting Highly Maneuvering Targets
    Gang WU, Ke ZHANG
    2022, 50(5):  43-51.  doi:10.3969/j.issn.1009-086x.2022.05.007
    Asbtract ( 4453 )   HTML ( 269)   PDF (2026KB) ( 417 )  
    Figures and Tables | References | Related Articles | Metrics

    For intercepting highly maneuvering targets, an integral sliding mode guidance law with finite time convergence is proposed based on the integral sliding mode control theory. A radial basis function (RBF) neural network disturbance observer with adaptive parameter adjustment is used to estimate the disturbance of the guidance system caused by the target maneuver. In order to further improve the estimation accuracy, the adaptive law is used to eliminate the estimation error of the neural network observer. According to Lyapunov stability theory, the stability and finite time convergence of the guidance law are proved.The numerical simulation shows that the guidance law proposed in this paper has excellent performance both in miss distance and in the control accuracy of missile and target line of sight angle.

    An Improved Optimal Guidance Law with Angle Constraint
    Gui-dong LI, Hai-ying LU, Zhi-wei LI, Shi-shun WEI, Ou ZHANG
    2022, 50(5):  52-58.  doi:10.3969/j.issn.1009-086x.2022.05.008
    Asbtract ( 4218 )   HTML ( 238)   PDF (1514KB) ( 347 )  
    Figures and Tables | References | Related Articles | Metrics

    In order to achieve the intercept mission requirements, an improved optimal guidance law is derived considering the angle constraint of the interceptor and the premature loss of energy that cannot satisfy the subsequent interception requirements. Based on the structure of energy minimum objective function, a control weighted function is proposed to minimize the required overload in the initial phase and the terminal line of sight (LOS) angle can converge to the excepted value. An angle constraint optimal guidance law is derived in view of small angle assumption and optimal control theory. Based on the characteristics that the guidance law can make the terminal LOS angle converge, the problem of terminal LOS angle is converted into the problem of terminal encounter angle, and the optimal guidance law with terminal-intersection angle constraint is obtained. The simulation results show that the designed guidance law can not only realize terminal encounter angle control, and also ensure low energy consumption in the initial stage of guidance, as well as achieve high hit accuracy. The designed approach has certain reference and application values for the study on the optimal guidance law of interception missile.

    COMMAND CONTROL AND COMMUNICATION
    Targets Allocation Model of Muti-layer Anti-missile Cooperative Operation Based on Improved Hungarian Algorithm
    Jun-liang JI, Long-yue LI, Xiao-lei YANG, Wei ZHANG
    2022, 50(5):  59-67.  doi:10.3969/j.issn.1009-086x.2022.05.009
    Asbtract ( 4395 )   HTML ( 244)   PDF (590KB) ( 381 )  
    Figures and Tables | References | Related Articles | Metrics

    In order to explore a more applicable target allocation method for anti-missile operation, the connotation of target allocation model in multi-layer anti-missile cooperative operation is defined, and the basic idea of constructing the target allocation model of multi-layer anti-missile cooperative operation is clarified. The index system of ballistic missile threat assessment, and feasibility analysis of combat unit interception are established respectively. The ballistic missile threat assessment model and the strength analysis model of combat unit interception are established through normalization and weight assignment. On this basis, combined with the actual requirements of multi-layer and anti-missile cooperative combat firepower application, the Hungarian algorithm is improved based on vitality transfer, the target allocation model of multi-layer anti-missile cooperative operation based on improved Hungarian algorithm is constructed. And the model is used to simulate the case with the background of multi-layer anti-missile combat scenario to verify the rationality and effectiveness of the model.

    TARGET CHARACTERISTIC, DETECTION AND TRACKING TECHNOLOGY
    Study on Association Method Based on Two-Dimensional Angle Measurement Data
    Bin JIN, Shu-man WANG, Yun-he ZHAI, lin-feng LI
    2022, 50(5):  68-76.  doi:10.3969/j.issn.1009-086x.2022.05.010
    Asbtract ( 4102 )   HTML ( 220)   PDF (3158KB) ( 305 )  
    Figures and Tables | References | Related Articles | Metrics

    When the target information source is disturbed or the target is detected by passive cross-directional localization, only two-dimensional angle information exists in the single source target measurement data, so the problem of multi-source measurement data association must be solved. Aiming at the problem that the accuracy of association base on residual data association methods is limited, an association method based on angle deviation and distance variance over a period of time is proposed. The data is preliminarily correlated through the deviation of line of sight angle, and confirmed the association through the distance variance over a period of time based on the initial correlation results. The method can improve the accuracy of target data association and ensure the amount of calculation will not be too large, improve the association efficiency of two-dimensional information target data.

    Study of Full-polarization Interference Technology on Polarization Measurement of Array Radar
    Xiao-wen ZHANG, Zhi-mei HAO, Qiang WANG
    2022, 50(5):  77-84.  doi:10.3969/j.issn.1009-086x.2022.05.011
    Asbtract ( 4186 )   HTML ( 215)   PDF (3514KB) ( 329 )  
    Figures and Tables | References | Related Articles | Metrics

    To impair the accuracy of polarization measurement of radar and hinder the construction of polarization filter, a study of full-polarization interference technology on polarization measurement and a robust, adaptable and operational polarization modulation method are provided. A classic polarization measurement based on the elaborately deduced signal model is described along with its performance analysis. It clarifies that it is the lack of polarization freedom and the power-driven lead to the inherent disadvantage, which is of fundamental importance to interference. Furthermore, it predicts the results imposed by some commonly used interference modes and modulations theoretically, which are verified by simulation experiments. For all above research, the random-polarization interference performs more effective in polarization measurement.

    Study on Efficient Method of Interrupted Sampling Periodic Repeater Jamming Based on Frequency Shift
    Yi-bing LIU, Wen-tai CHANG, Zhong-fu XU, Bing-yin REN
    2022, 50(5):  85-92.  doi:10.3969/j.issn.1009-086x.2022.05.012
    Asbtract ( 4240 )   HTML ( 214)   PDF (1509KB) ( 306 )  
    Figures and Tables | References | Related Articles | Metrics

    For the conventional interrupted sampling periodic repeater jamming cannot be completely aligned with the real target, and the interference effect is single, this paper analyzes the parameters with the influence of interrupted sampling periodic repeater jamming effect and determines the frequency shift parameter to make the suppressed false target groups aligned with the real target. An efficient jamming method based on frequency shift repeater is proposed. For the sampled signals whose frequency are at both ends of the bandwidth, a segmented frequency shift method is used to make the sub-pulses superimposed on pulse compression gain to produce deceptive false target ahead or behind of the real target, and the sampled signals with the frequency located in the middle of the bandwidth use fixed frequency shift modulation to produce suppressed false target groups. Simulation results verify the derivation accuracy of the fake target spatial distribution, and the method can deceive and suppress the real target simultaneously, which has dual effects and high efficiency in resource utilization.

    Cooperative Detection and Tracking of UAV Swarms Based on Clonal Immune Decision-Making
    Fang-yu ZHOU, Jie ZHOU, Chao-bo CHEN, Song GAO
    2022, 50(5):  93-105.  doi:10.3969/j.issn.1009-086x.2022.05.013
    Asbtract ( 4688 )   HTML ( 196)   PDF (8916KB) ( 259 )  
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem of low efficiency of multi-target detection and tracking of unmanned aerial vehicle (UAV) swarms under the restricted sensing range, a detection and tracking method of UAV swarms based on the clonal selection-infection immunity model is proposed. The virus infection process is introduced into the information transmission of the UAV swarm, and the UAV decision-making activation mechanism is constructed to ensure the effective scheduling of cluster resources; the UAV strategy decision-making mechanism is constructed by introducing the clone selection process to ensure the reasonable operation of the UAV. At the same time, the "overheating" strategy judgment mechanism is introduced to prevent the same strategy from being executed by multiple drones, and to reduce the probability of missing targets. The simulation results show that the proposed method can effectively improve the detection coverage area of the cluster area and realize the tracking of more targets.

    INTEGRATED LOGISTICS SUPPORT TECHNOLOGY
    Research on Rapid Troubleshooting Technology of Radar Products Based on Data
    Chao WANG, Tao LIN, Lei WANG, Xiao-na SUN, Xin-jun GAO, Li-jun SONG
    2022, 50(5):  106-113.  doi:10.3969/j.issn.1009-086x.2022.05.014
    Asbtract ( 3938 )   HTML ( 174)   PDF (927KB) ( 287 )  
    Figures and Tables | References | Related Articles | Metrics

    With the continuous development of electronic information technology, the integration and complexity of radar products are increasing, and the materials delivered by the product are difficult to guide the user to troubleshoot the product failures comprehensively and effectively. Furthermore, in the process of product usage, a large amount of fault data have not been effectively utilized. The data-based rapid troubleshooting technology for radar products uses a large amount of usage data of radar products as the main input, using hierarchical reasoning to aggregate search technology models, starting with the hierarchical structure of radar products, analyzing the relationship between functional failures and system failures, and using the propagation path of the directed graph to form a fault correlation matrix. Based on the fault correlation matrix, the technology infers effective troubleshooting strategies through the input of fault phenomena and other data, and forms guidance documents in the form of troubleshooting guides to guide users to quickly locate faults, solve problems, and improve uses’ own troubleshooting capability.

    Construction of Radar Fault Cause Knowledge Graph
    Yu-xi XIE, Jiang-ping YANG, Zhi-jian SUN, Yi-yuan LI, Xin HU
    2022, 50(5):  114-121.  doi:10.3969/j.issn.1009-086x.2022.05.015
    Asbtract ( 3898 )   HTML ( 170)   PDF (1561KB) ( 313 )  
    Figures and Tables | References | Related Articles | Metrics

    The analysis of radar fault cause text is helpful to locate the fault location, facilitate equipment maintenance and analyze equipment performance. Knowledge extraction, representation and management of radar fault cause text using knowledge graph technology can effectively improve the utilization efficiency of the text, quickly locate the fault location and analyze the equipment performance in time. On the basis of summarizing the characteristics of radar equipment fault cause text, radar equipment fault cause knowledge graph is constructed by a method combines both the scheme layer and the data layer. The scheme layer of the knowledge graph in the top-down style is designed, which defines the knowledge framework, the concept types, and the relationships between the concepts of the knowledge graph. For the text characteristics, the data layer of knowledge map is constructed in the bottom-up style: in order to solve the problems of small sample size and compound words entity recognition, entity naming recognition is carried out by Att-AlBERT-BiGRU-CRF model. The ALBERT-BiGRU-Att model is used for relationship extraction. Experiments show the effectiveness of the above extraction method. Based on the entities and relationship, the knowledge graph of radar fault causes is constructed.

    Camouflage Scheme Aided Design System Based on Military Target Ontology
    Chao-chang LIU, Wei-dong XU, Xin YANG, Jin-song SHE, Zhou YU
    2022, 50(5):  122-132.  doi:10.3969/j.issn.1009-086x.2022.05.016
    Asbtract ( 3870 )   HTML ( 153)   PDF (2820KB) ( 388 )  
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the problem that the determination of key elements such as force, time and camouflage resources in the camouflage scheme is based on the subjective experience of camouflage commanders, the ontology technology is used to describe the camouflage characteristic parameters of military targets, the operation rules of camouflage, camouflage and false target camouflage are designed and optimized, and the framework of camouflage scheme aided design system is established. The parameters of camouflage targets after ontology are analyzed, and the time of camouflage scheme is automatically deduced. The quantitative results of the key elements of the camouflage scheme of troops and camouflage resources are automatically reasoned to form the auxiliary suggestions of the camouflage scheme. Taking three types of typical military targets in the artillery position system as an example, the proposed system can ontologize their corresponding target parameters and generate reasoning results that conform to military reality, which has certain camouflage action guidance value.

    INTEGRATED TEST, LAUNCH CONTROL TECHNOLOGY
    Research on Error Correction Method for Segmentation Area of Infrared Theodolite with Large Field of View
    Qi ZHANG, Yu ZHOU, Xiao-ming ZHANG, Ming-yi CHI, Bing YI
    2022, 50(5):  133-139.  doi:10.3969/j.issn.1009-086x.2022.05.017
    Asbtract ( 3905 )   HTML ( 144)   PDF (1234KB) ( 339 )  
    Figures and Tables | References | Related Articles | Metrics

    The large field optical theodolite is an important test equipment for the shooting range. Usually, the full-field angle measurement error of the large-field optical theodolite is corrected by using the partition modeling error correction method based on the true value of the light pipe. In order to improve the full-field angle measurement accuracy of large-field infrared theodolites, this paper proposes a divisional error correction method that relies on the theodolite's pointing value as the reference value for optical calibration. Two different correction methods based on the true value and the pointing value are used to construct two correction models respectively, solve the spatial angle of the same measured target, and carry out comparative experiments. The results show that the divisional error correction method based on the pointing value can obtain better angle measurement accuracy.

    SIMULATION TECHNOLOGY
    Modeling and Simulation of the Initiation Control of the Warhead by the Hexagon-Detection Fuze
    Hong CHEN, Shi-zhong LI, Chao YANG
    2022, 50(5):  140-151.  doi:10.3969/j.issn.1009-086x.2022.05.018
    Asbtract ( 3903 )   HTML ( 131)   PDF (4169KB) ( 390 )  
    Figures and Tables | References | Related Articles | Metrics

    In order to meet the detonation control requirements of the aimable warhead during the fuze-warhead cooperation, a detonation control modeling method based on the detection and positioning of the hexagon laser fuze is presented for the dispersion rule of the prefabricated fragments of the aimable warhead. This method achieves the control of the detonation orientation of the aimable warhead by accurately recognizing the orientation of the target through the hexagon laser detection model. At the same time, in order to study the influence of different initiation methods on the performance of the warhead, the LS_DYNA finite element simulation software is used to simulate and study the fragments dispersion rule of the warhead under the different initiation methods and find the best initiation control position. Simulation results show that the directional fragment velocity gain under the eccentric 60° two lines Initiation is 9.32%, and the directional damage area is about 120°; the directional fragment velocity gains under eccentric 120° two lines, three lines and equidistant three lines initiation are 8.44%, 10.56% and 11.53%, respectively, and the directional damage area is about 60°. The established detection model can effectively cooperate with the detonation control of the aimable warhead to achieve the optimal damage effect on the target.

    Recognition Method of Modulation Mode of Non-cooperative Communication Signal
    De-xin XUE, Tao SHAN, Shi-jun DONG, Jin ZHANG
    2022, 50(5):  152-159.  doi:10.3969/j.issn.1009-086x.2022.05.019
    Asbtract ( 4144 )   HTML ( 141)   PDF (3176KB) ( 314 )  
    Figures and Tables | References | Related Articles | Metrics

    In recent years, the recognition of non-cooperative communication signals has become research focus in the field of communication countermeasures. In this paper, a recognition method of non-cooperative communication signals based on modulation is proposed. The characteristic parameters of non-cooperative communication signals are extracted by signal processing algorithm, and then the signal modulation mode is identified based on the decision tree combined with discriminant process. Various analog and digital modulation signals can be identified by this method. For frequency shift keying(FSK) signal, this paper proposes to construct a new signal by extracting the phase difference between the sampling points of the baseband signal, and the modulation type of the original signal is determined according to the recognition result of the constructed signal, avoiding the need for prior information. The signal modulation recognition method proposed in this paper has low computational cost and good real-time performance. Matlab simulation results show that this method has good recognition rate, and the correctness and feasibility of this method are proved.