Loading...

Table of Content

    30 October 2018, Volume 46 Issue 5
    Analysis of Damage Efficiency Based on Multiple Future Airspace Window Configuration Modes
    DUAN Xiu-sheng, WANG Ying-chen, SHAN Gan-lin
    2018, 46(5):  1-5.  doi:10.3969/j.issn.1009-086x.2018.05.01
    Asbtract ( 229 )  
    References | Related Articles | Metrics
    The principle of future airspace window shooting system is introduced, and the effect of ideal future airspace window caused by the time and position prediction error when the target meets with future airspace window is considered. The multiple future airspace window configurations and three dimensional ellipsoidal zone of future airspace district configuration are put forward, and the kill probability of the configuration modes is analyzed. The simulation results show that the damage efficiency of ellipsoid domain of future airspace district configuration mode is the best, the multiple future airspace window configuration modes are the second, and the influence of the time and position prediction errors is reduced.
    Forecast Model of Main Air Attack Direction Based on CNN
    MA Xin-xing, TENG Ke-nan, HOU Xue-long
    2018, 46(5):  6-12.  doi:10.3969/j.issn.1009-086x.2018.05.02
    Asbtract ( 224 )  
    References | Related Articles | Metrics
    Aiming at the problems that the traditional judgment methods of the main offensive direction of air attack have higher accuracy and completeness requirements on the evaluation index system, and their adaptability to some complex conditions, such as fuzzy information, missing and contradictory information is not strong, the convolution neural network is introduced into the main offensive direction judgment model. With its strong ability of nonlinear modeling and its strong adaptability to fuzzy and noisy information, the implied intuitive thinking of the person, such as experience, knowledge, and so on, is obtained through the study of large sample set. The experiments show that the new evaluation model has strong fault tolerance and good robustness.
    Analysis of Missile Defense of “Standard-2” of "Kongo" Class Destroyer
    LIU Feng, CUI Chao
    2018, 46(5):  13-18.  doi:10.3969/j.issn.1009-086x.2018.05.03
    Asbtract ( 261 )  
    References | Related Articles | Metrics
    Kongo-class destroyer is a kind of anti-air destroyer in Japan Self Defense Force. As equipped with the AGIS system and “Standard-2” missile, the destroyer can provide powerful anti-air and missile defense capability. Base on the reference of the AGIS system and “Standard-2” missile, the course of anti-air and missile defense are analyzed by using calculation method, and the capability of “Standard-2” missile with intercepting more than one anti-surface missiles is gotten. The conclusion provides the reference to the analysis of the synthesis anti-air capability of the "Kongo" destroyer.
    Analysis of Missile Penetration Probability Difference between Analytic Computation and Simulation Computation
    HU Zhen-zhen, WANG Liang, YANG Bao-qing, HU Yu-li, YANG Wen
    2018, 46(5):  19-25.  doi:10.3969/j.issn.1009-086x.2018.05.04
    Asbtract ( 269 )  
    References | Related Articles | Metrics
    The analytic and simulation computation methods with the same formula of boost, mid-course and terminal phases are established for the ballistic missile penetration probability. The given examples' results from both methods are computed on condition that the attack warheads are slightly over saturation (i.e. the number of attack warheads is slightly greater than number of interceptors), and the reason for the difference between the two methods is analyzed. Results indicate that procedure dependence between the warning and interception courses is the main cause, and the simulation method which has the ability to account the dependence problem is more close to the reality.
    Using Time of Floating Corner Reflector Centroid Jamming
    WANG Pin, HU Sheng-liang, ZHANG Jun
    2018, 46(5):  26-31.  doi:10.3969/j.issn.1009-086x.2018.05.05
    Asbtract ( 222 )  
    References | Related Articles | Metrics
    As a new type of electronic warfare equipment, the research on the operational use of floating corner reflector is basically blank. To correctly grasp the using time, a method to determine the effective interference distance of centroid jamming is put forward, and the timing of the centroid jamming under different operational backgrounds is analyzed. The methods are verified through simulation using two typical anti-ship missiles of subsonic and supersonic respectively, and the simulation results are consistent with the theoretical calculation. It provides a theoretical basis for the application of floating angle reflectors.
    BP Neural Network Optimized by Approved Firefly Algorithm and Its Application
    QI Chang-xing, BI Yi-ming, LI Yong, FAN Yang-tao
    2018, 46(5):  32-38.  doi:10.3969/j.issn.1009-086x.2018.05.06
    Asbtract ( 234 )  
    References | Related Articles | Metrics
    Firefly algorithm has problems of slow convergence and easy to get into local optimal. To solve the problems, a self-adaptive step firefly algorithm (SASFA) is presented, which replaces fixed search step by self-adaptive step associated with individual density. The algorithm combines self-adaptive step firefly algorithm and the BP neural network, and obtains the initial optimal weights and threshold value of BP neural network by using self-adaptive step firefly algorithm. The initial weights and threshold value are used as the initial parameters of BP neural network to improve the training precision and rate. Taking the penetration effectiveness evaluation of ballistic missile as an example, the penetration effectiveness index system is established, and the penetration effectiveness evaluation model of ballistic missile based on improved BP neural network is built. The example analysis and simulation experiments show that BP neural network optimized by approved firefly algorithm has high accuracy and strong convergence. It can be used in ballistic missile penetration effectiveness evaluation.
    Anti-Head-on Interception Penetration Guidance Law for Slide Vehicle
    LIU Kai-feng, MENG Hai-dong, WANG Chang-jiang, LI Jun-ying, CHEN Ying
    2018, 46(5):  39-45.  doi:10.3969/j.issn.1009-086x.2018.05.07
    Asbtract ( 212 )  
    References | Related Articles | Metrics
    Aimed at head-on interception situation of kinetic kill vehicle, the possibility of penetration using aerodynamics for hypersonic slide vehicle is analyzed, and the penetration guidance law is deduced perspective from maneuver interception scale escape according to the parameters at boost separating time of kinetic kill vehicle. Simulation result shows that the guidance law takes effect to escape maneuver interception scale while there is deviation between real initial interception condition and realistic interception condition.
    Method of Wide Band Concatenated Digital Down Conversion
    OU Chun-xiang, YANG Jia-wei
    2018, 46(5):  46-51.  doi:10.3969/j.issn.1009-086x.2018.05.08
    Asbtract ( 178 )  
    References | Related Articles | Metrics
    In the frequency hopping communication system, the receiver should supervise and copy the hopping frequency in the sample frequency band width timely to accomplish the digital down conversion. A method of wide band concatenated digital down conversion is proposed. The method includes two processes, channelization and the plurality down conversion. The channelization is independent and not related to the frequency offsets compensation so the whole system is less complex. The plurality down conversion is accomplished in low frequency and convenient for the frequency offsets compensation. The simulation result shows that the down conversion can be accomplished timely and the bit error rate is lower than 10-6 when the Eb/N0 equals to 12 dB.
    Optimal Deployment of Defense Weapons under Point Defense
    LIU Yao, ZHANG Zhan-yue, HUANG Zi-chen, ZHAO Cheng-liang
    2018, 46(5):  52-61.  doi:10.3969/j.issn.1009-086x.2018.05.09
    Asbtract ( 235 )  
    References | Related Articles | Metrics
    In view of the strategic defense problem, according to different operations two scenes including a single-directional threat and a fan-shaped threat are established, and the incoming targets are intercepted at the middle segment. According to the characteristics of the selected interceptor and the incoming missile, the space killing area of the interceptor mode and the model of protection zone and the covering angle of the ground assets are established, and the weapon deployment model under the two scene defense systems is established. The model is optimized by the comprehensive interception efficiency, the ground assets covering angle, and the deployment cost. The validity of the deployment model method is verified by a concrete example. The research results have certain reference value for the application of antimissile warfare.
    Application of Improved Analytic Hierarchy Process in Reconnaissance Equipment Planning
    JIANG Tian-jiao, FAN Xiu-ying, HUANG Xin-yu
    2018, 46(5):  62-68.  doi:10.3969/j.issn.1009-086x.2018.05.10
    Asbtract ( 188 )  
    References | Related Articles | Metrics
    Manned reconnaissance aircraft can be equipped with a variety of reconnaissance equipment. In view of the fact that the selection of reconnaissance equipment mainly depends on the experience of professionals and lacks of scientificity and rationality, an evaluation index system is established. By combining the actual index parameters of reconnaissance equipment, the analytic hierarchy process (AHP) is improved, and the mission planning of reconnaissance equipment is modeled. According to the actual situation of reconnaissance mission, the simulation analysis is carried out. The analysis results are consistent with the actual situation, and the validity of the model is verified.
    An Improved Template-Matching Based Communication Object Recognition
    YU Xiao-hong, CHENG Jia-yuan
    2018, 46(5):  69-74.  doi:10.3969/j.issn.1009-086x.2018.06.11
    Asbtract ( 227 )  
    References | Related Articles | Metrics
    Communication object recognition is a critical section in military operations. With the continuous improvement of counter reconnaissance technologies, communication circumstances are becoming more and more complex. Complicated and variable of the communication parameters, error or deficiency of reconnaissance data make it difficult for object recognition. An improved template-matching method to address the communication parameters variability and deficiency problems is presented. The simulation results show that this method has high recognition rates and false-tolerance capabilities, and can be used to increase object recognition rates under large parameters error and deficiency conditions.
    Digital Array Radar Channel Equalization
    GONG Bo-wen, YAO Zhi-cheng, YANG Jian, HU Meng
    2018, 46(5):  75-81.  doi:10.3969/j.issn.1009-086x.2018.05.12
    Asbtract ( 271 )  
    References | Related Articles | Metrics
    In digital array radar (DAR), channel mismatch has a serious impact on many indicators such as low sidelobe beamforming, signal to interference ratio of output signal and anti-interference. To correct the error, the channel equalization technique is gradually applied to the array error correction and has been rapidly developed. The current channel equalization techniques are divided into time domain least square fitting method, frequency domain least square fitting method and Fourier transform method according to the equalizer weight coefficient solving method. The main principles and difficulties of each method are analyzed emphatically, and the advantages and disadvantages of various methods are compared. The difficulties of the digital array radar channel equalization technique in future development are summarized.
    Mechanism of High Repetition Frequency Jamming on Passive Seeker Fore-end
    NAN Hao, PENG Shi-rui, WANG Xiao-yan, XU Zheng-qiang
    2018, 46(5):  82-87.  doi:10.3969/j.issn.1009-086x.2018.05.13
    Asbtract ( 180 )  
    References | Related Articles | Metrics
    Based on the analysis of the signal characteristics of high pulse repetition frequency (PRF) pulse, a jamming mechanism of high PRF pulse is studied according to the working process of seeker fore-end; an evaluation index of interference effectiveness is set up and the analytic result is validated by simulation. The results show that transient response and nonlinear distortion produced by analogue devices are the main reason of interference; setting reasonable signal parameters can improve the effect of interference.
    Analysis of Laser Active Detection Technique Based on “Cat's Eye Effect”
    DU Yuan-song, DONG Wen-feng, LUO Wei, LI Bo-tao
    2018, 46(5):  88-93.  doi:10.3969/j.issn.1009-086x.2018.05.14
    Asbtract ( 292 )  
    References | Related Articles | Metrics
    Active detection technique based on “cat's eye effect” is an effective means of interference to implement strong laser jamming against drone photoelectric reconnaissance systems. According to the “cat's eye” return characteristics of the photoelectric reconnaissance target, the echo intensity model is established under difference conditions. Simulation analysis is carried out for a typical target in different reflectivity, different laser powers, and different laser divergence angles. The result shows that the simulation results are in accordance with the theoretical model. The conclusions can be used to guide the system design of high-altitude, strong laser jamming system based on active laser detection technique in the future.
    IMMCPF Algorithm for Tracking of Hypersonic Target in Near Space
    ZHAO Kai-li, GAO Huo-tao, CAO Ting
    2018, 46(5):  94-101.  doi:10.3969/j.issn.1009-086x.2018.05.15
    Asbtract ( 235 )  
    References | Related Articles | Metrics
    The hypersonic target in near space has the characteristics of high maneuverability, high speed and high nonlinearity,which usually result in some problems in the process of target tracking, such as the reduced tracking accuracy and the filter diverging. To solve the problems, an interactive multiple model cubature particle filter algorithm is proposed. This algorithm uses the interactive multiple model algorithm to track the hypersonic target in near space, and uses the cubature particle filter algorithm to predict the state. The simulation results show that, compared with the interactive multiple model Kalman filter algorithm and interactive multiple model particle filter algorithm, this algorithm has better tracking performance for the hypersonic target in near space.
    Quantitative Analysis and Prevention Methodology of Tire-burst Aviation Accident
    CUI Li-jie, CONG Ji-ping, ZHANG Jia-kui, REN Bo
    2018, 46(5):  102-108.  doi:10.3969/j.issn.1009-086x.2018.05.16
    Asbtract ( 222 )  
    References | Related Articles | Metrics
    By analyzing the merits and demerits of traditional important measures, their definitions are expanded to the aviation accident importance analysis. A new aviation accident important measure and its solution are proposed. Taking the tire burst accident as an example, the method and process of the aviation accident's Bow-tie model are provided to efficiently and directly display the relation between basic and outcomes events. The solution which can directly compute the possibility of each aviation accident's outcome by the probabilities of basic events and link events is provided, and the solution builds a quantitative relation between hazards and outcomes of aviation accidents. According to the computational results, a universal methodology to generate aviation accident's preventive measures and mitigate control measures is suggested, it's feasible and property are testified by the example of the tire burst accident.
    Reliability Assessment Method of Torpedo Navigation Based on Bootstrap Simulation
    XUE Lai, GAN Zu-wang
    2018, 46(5):  109-113.  doi:10.3969/j.issn.1009-086x.2018.05.17
    Asbtract ( 195 )  
    References | Related Articles | Metrics
    Torpedo working reliability assessment comes up against the condition of lacking sample, because of increasingly long lifetime and restricted reliability test by expenditure. In recent years, technical experts usually mine prior data combined with reliability test data to solve the problem using Bayes method. Considering that the existing prior data acquiring doesn't cover the performance reliability information, the Bootstrap simulation method is used to obtain the performance data as the prior data utilized by Bayes reliability method, which tremendously relieves the influence of lacking prior information on reliability assessment and has practical engineering value.
    Risk Evaluation Method for Complex System Engineering Works Based on Bayesian Network
    XIONG Na, ZHANG Xiao-dong, LI Fei, MA Chao
    2018, 46(5):  114-121.  doi:10.3969/j.issn.1009-086x.2018.05.18
    Asbtract ( 185 )  
    References | Related Articles | Metrics
    Confronted with the reality of engineering work in complex system involving multi-disciplines, rigid concealment and uncertain factors, a risk evaluation method based on Bayesian network is put forward. By analyzing the process of engineering work, all possible factors are determined for the establishment of Bayesian network model. Aiming at the problem of lacking data for multi-state root nodes, the probabilities are obtained by applying triangular fuzzy function. Aiming at the difficulty in obtaining conditional probability values for multi-state nodes, DS evidence theory is applied to fuse experts' information. Arrangement for missiles in combat duty is taken as an example to perform risk evaluation. The result shows that the risk probability of engineering work can be determined easily through reasoning forward. Through reasoning backward key factors can be pointed out when the risk happens and preventive maintenance policies can be made accordingly.
    Deep Learning Fusion Model Diagnosis Method of Analog Circuit Fault
    WANG Ying-chen, DUAN Xiu-sheng, SHAN Gan-lin
    2018, 46(5):  122-128.  doi:10.3969/j.issn.1009-086x.2018.05.19
    Asbtract ( 173 )  
    References | Related Articles | Metrics
    Aiming at the difficulty of diagnosis caused by the complexity of equipment circuit, noise of working environment and big data of traditional intelligent fault diagnosis method, a fusion model based on noise reduction self-encoder and deep belief network is proposed to realize the fault diagnosis of analog circuit. The denoising autoencoder is used to process the random noise of the original signal and to learn the low-level features. The deep belief network extracts the deep features based on the learned low-level features. The fused depth features are incorporated into Softmax classifier for intelligent diagnosis model training. The new diagnostic model is validated on typical analog circuits. The results show that the proposed method has superior diagnostic performance.
    Design and Realization of Synthetic Control Equipment Based on Dual Hot Redundancy Technology
    LUO Yue, TAO Ran, ZHAO Ming, LI Zheng-tian
    2018, 46(5):  129-134.  doi:10.3969/j.issn.1009-086x.2018.05.20
    Asbtract ( 199 )  
    References | Related Articles | Metrics
    To improve system reliability, a synthetic control equipment with dual CPU hot-redundancy technology is proposed, in which the real time state monitor and switching on master and slave are realized by arbitration. In consideration the complexity, reliability and implementation difficulty, a redundancy management method for task-level synchronization is proposed, which realizes the synchronization of task between the master and slave through the communication link and the task synchronization software running on the CPU module. This method not only meets the device synchronization requirement, but also easy to implement with low complexity.
    Automatic Verification System of Seeker Test Equipment
    ZENG Zhen-jie, ZHU Xiao-fei, QI Shi-ju, SHEN Xiao-wei, CAI Shang-jun
    2018, 46(5):  135-142.  doi:10.3969/j.issn.1009-086x.2018.05.21
    Asbtract ( 177 )  
    References | Related Articles | Metrics
    Aiming at the problems of low efficiency, complicated process and human errors, an automatic test verification system based on virtual instrument technology and database technology is designed for the current seeker test equipment. The system uses Labwindows/CVI as a software development platform, which makes the software run smoothly and has high operational efficiency through the flexible use of multi-thread technology. The use of the VISA library function as I/O driver enables the software to be unified at the I/O layer. SCPI language as the instrument control mode strengthens the versatility of the measuring and controlling procedure. Labwindows SQL tool kit is used to access the ODBC database, which realizes the data storage and the inquiry. The test results show that the operation of the system is stable and reliable, and can be used for automatic verification of equipment.
    Effectiveness Evaluation of Cyberspace Information Defense Combat Command
    WANG Jin-song, WANG Xiao-chao, LI Shi-kai
    2018, 46(5):  143-151.  doi:10.3969/j.issn.1009-086x.2018.05.22
    Asbtract ( 294 )  
    References | Related Articles | Metrics
    Based on the analysis of the effectiveness evaluation requirements of the cyberspace information defense combat command, an evaluation index system, evaluation model and evaluation framework are constructed according to the construction principles of the index system and the influencing factors. In traditional command effectiveness evaluation method of the contestant personnel evaluation, the problems such as randomicity and subjective uncertainty inevitably occur. Based on the fuzzy neural network, a network defense battle command effectiveness evaluation model of space information is proposed. The advantages of the fuzzy neural network such as self-learning, adaptive and strong fault tolerance are used to optimize the connection weights and fuzzy parameters of the network, and weaken the human factors in the effectiveness evaluation. The feasibility of the model is verified through the simulation experiment, which provides guidance and reference for the construction of cyberspace information defense combat command system.
    Technology of Constructive Simulation System Based on Installation Software
    DUAN Yu-xin, QING Du-zheng, ZHOU Min, WANG Yuan-yuan
    2018, 46(5):  152-158.  doi:10.3969/j.issn.1009-086x.2018.05.23
    Asbtract ( 213 )  
    References | Related Articles | Metrics
    To improve the credibility and reduce the repetitive work of modeling and development of simulation system, the architecture and technical methods of simulation integration based on installation software are studied and designed. These methods take installation software including middleware as a simulation node to participate in the simulation system. It enables installation software interact with simulation platform using the standard of HLA interaction class, and also unifies the time management strategy. According to these methods, the installation software can join the simulation platform as a member of simulation federation to perform simulation tasks. The application of simulation system which constructed by installation software is used to illustrate the feasibility of the technical methods.