Volume 42 Issue 7
Jul.  2016
Turn off MathJax
Article Contents
LIU Jingshu, JIANG Wenzhi, LEI Yuyao, et al. Threat evaluation of air-targets for key positions air-defense under dynamic fire access[J]. Journal of Beijing University of Aeronautics and Astronautics, 2016, 42(7): 1422-1431. doi: 10.13700/j.bh.1001-5965.2015.0475(in Chinese)
Citation: LIU Jingshu, JIANG Wenzhi, LEI Yuyao, et al. Threat evaluation of air-targets for key positions air-defense under dynamic fire access[J]. Journal of Beijing University of Aeronautics and Astronautics, 2016, 42(7): 1422-1431. doi: 10.13700/j.bh.1001-5965.2015.0475(in Chinese)

Threat evaluation of air-targets for key positions air-defense under dynamic fire access

doi: 10.13700/j.bh.1001-5965.2015.0475
  • Received Date: 15 Jul 2015
  • Publish Date: 20 Jul 2016
  • Under the background of naval key position air-defense combat, air-targets threat evaluation model is established based on key positions relative value, target attack capability, target attack intent and targetarrival time. Firstly, the key positions air-defense combat system under dynamic access is introduced, and the dynamic access and quit strategy are presented. Secondly, the key positions relative value, air-target number and target killing probabilities are used to quantize the air-target threat capability. Then, air-target attack quantization model is proposed with the target-to-key positions course angle, and the time that targets arrived at key positions is calculated based on different target types. Finally, the threat level order is carried out by comparing the distance between the targets and air-defense system intercept area, and the air-target threat value is obtained. The simulation results show that the quantized method conforms with the ordinary tactics reasoning, and it can develop the air-target threat order results objectively. This paper can provide a decision reference for the key positions defense operation.

     

  • loading
  • [1]
    吴志飞,马曲立,饶世钧.空海一体战对海军要地防空作战的影响及对策[J].海军大连舰艇学院学报,2013,36(4):6-8.WU Z F,MA Q L,RAO S J.Influence of air-sea battle for protecting naval important place in air defense combat and countermeasures[J].Journal of Dalian Naval Academy,2013,36(4):6-8(in Chinese).
    [2]
    刘敬蜀,姜文志,代进进,等.动态火力接入下要地防空制导决策方法[J].海军航空工程学院学报,2015,30(5):537-542.LIU J S,JIANG W Z,DAI J J,et al.Guidance-making method of essential air-defense under dynamic fire access[J].Journal of Navel Aeronautical and Astronautical University,2015,30(5):537-542(in Chinese).
    [3]
    代进进,李相民.舰艇编队网络化防空作战空袭目标威胁评估[J].系统工程与电子技术,2013,35(3):532-538.DAI J J ,LI X M.Threat evaluation of air strike targets for warship formation networked air-defense operation[J].Journal of Systems Engineering and Electronics,2013,35(3):532-538(in Chinese).
    [4]
    何友,王国宏,关欣,等.信息融合理论及应用[M].北京:电子工业出版社,2010:393-395.HE Y,WANG G H,GUAN X,et al.Information fusion theory with applications[M].Beijing:Publishing House of Electronics Industry,2010:393-395(in Chinese).
    [5]
    MILLER G A.The magical number seven plus or minus two:Some limits on our capacity for processing information[J].Psychological Review,1956,63(2):81-97.
    [6]
    MACCRIMMON K R.Decision making among multiple-attribute alternatives:A survey and consolidated approach:RM-4823-ARPA[R].Santa Monica:RAND Corporation,1968.
    [7]
    张鑫,万新敏,李争,等.运用AHP和云重心评价法的弹道导弹威胁评估[J].空军雷达学院学报,2010,24(5):340-343.ZHANG X,WAN X M,LI Z,et al.Threat evaluation of ballistic missile by using AHP and cloud centroid method[J].Journal of Air Force Radar Academy,2010,24(5):340-343(in Chinese).
    [8]
    羊彦,张继光,景占荣,等.战术弹道导弹防御中的威胁评估算法[J].空军工程大学学报(自然科学版),2008,9(2):31-35.YANG Y,ZHANG J G,JING Z R,et al.Research on an algorithm of threat assessment in tactics ballistic missile defense[J].Journal of Air Force Engineer University(Natural Science Edition),2008,9(2):31-35(in Chinese).
    [9]
    张磊,童幼堂,徐奕航.舰艇编队空中目标威胁排序模型研究[J].舰船电子工程,2009,29(6):136-138.ZHANG L,TONG Y T,XU Y H.Research on air target threatening order model of warship formation[J].Ship Electronic Engineering,2009,29(6):136-138(in Chinese).
    [10]
    郭辉,徐浩军,周莉.基于区间数TOPSIS法的空袭目标威胁评估[J].空军工程大学学报(自然科学版),2011,12(1):40-45.GUO H,XU H J,ZHOU L.Evaluation of air attack threat against target based on interval numbers TOPSIS[J].Journal of Air Force Engineer University(Natural Science Edition),2011,12(1):40-45(in Chinese).
    [11]
    程明,周德云,张堃.基于混合型多属性决策方法的目标威胁评估[J].电光与控制,2010,17(1):11-13.CHENG M,ZHOU D Y,ZHANG K.Threat assessment of target based on a hybrid multi-attribute decision-making method[J].Electronics Optics & Control,2010,17(1):11-13(in Chinese).
    [12]
    万开方,高晓光,刘宇,等.结合离差最大化的多属性群体决策TOPSIS威胁评估[J].火力与指挥控制,2012,37(8):66-70.WAN K F,GAO X G,LIU Y,et al.TOPSIS threat assessment model based on the principle of maximum deviation and multi-attribute-group-decision-making[J].Fire Control & Command Control,2012,37(8):66-70(in Chinese).
    [13]
    LOONEY C G,LIANG L R.Cognitive situation and threat assessment of ground battle spaces[J].Information Fusion,2003,4(4):297-308.
    [14]
    PETTERSON G,AXELSSON L,JENSEN T,et al.Multi-source integration and temporal situation assessment in air combat[C]//Proceeding of Information,Decision and Control.Piscataway,NJ:IEEE Press,1999:371-375.
    [15]
    FENG L Y,XUE Q,LIU M X.Threat evaluation model of targets based on information entropy and fuzzy optimization theory[C]//2011 IEEE International Conference on Industrial Engineering and Engineering Management.Piscataway,NJ:IEEE Press,2011:1789-1793.
    [16]
    JOHANSSON F,FALKMAN G.A Bayesian network approach to threat evaluation with application to an air defense scenario[C]//2008 11th International Conference on Information Fusion.Piscataway,NJ:IEEE Press,2008:1-7.
    [17]
    FU L,WANG Q,XU J,et al.Target assignment and sorting for multi-target attack in multi-aircraft coordinated based on RBF[C]//2012 24th Chinese Control and Decision Conference.Xi'an:Northwestern Polytechnical University Press,2012:1935-1938.
    [18]
    黄大荣,郭安学,李云生,等.基于专家知识属性重要度的集群目标威胁评估方法[J].兵工学报,2009,30(10):1357-1362.HUANG D R,GUO A X,LI Y S,et al.An object group threat assessment method based on attribute significance of multi-field expert systems[J].Acta Armamentarii,2009,30(10):1357-1362(in Chinese).
    [19]
    郭辉,徐浩军,刘凌.基于回归型支持向量机的空战目标威胁评估[J].北京航空航天大学学报,2010,36(1):123-126.GUO H,XU H J,LIU L.Target threat assessment of air combat based on support vector machines for regression[J].Journal of Beijing University of Aeronautics and Astronautics,2010,36(1):123-126(in Chinese).
    [20]
    刘敬蜀,姜文志,刘涛,等.动态火力介入下要地防空作战系统研究[J].指挥控制与仿真,2015,37(5):24-29.LIU J S,JIANG W Z,LIU T,et al.Research on operation system of key position air-defense under dynamic fire access[J].Command Conetol & Simulation,2015,37(5):24-29(in Chinese).
    [21]
    陈怀瑾.防空导弹武器系统总体设计和试验[M].北京:中国宇航出版社,2009:522-530.CHEN H J.Overall design and trial of air-defense missile weapon system[M].Beijing:China Astronautic Publishing House,2009:522-530(in Chinese).
    [22]
    杨进佩,王俊,梁维泰.反导作战中的目标威胁排序方法研究[J].中国电子科学研究院学报,2012,7(4):432-436.YANG J P,WANG J,LIANG W T.Research on method of the threaten queuing based on an-missile[J].Journal of CAEIT,2012,7(4):432-436(in Chinese).
    [23]
    徐品高.空中目标威胁值的评定[J].战术导弹技术,2000(2):1-8.XU P G.Threat value assessment for air target[J].Tactical Missile Technology,2000(2):1-8(in Chinese).
    [24]
    刘博.基于ANFIS的空袭目标攻击意图量化方法[J].指挥控制与仿真,2012,34(5):14-17.LIU B.Quantitative method of targets attack intention based on ANFIS[J].Command Control & Simulation,2012,34(5):14-17(in Chinese).
    [25]
    温羡峤,刘谭军.反战术弹道导弹(ATBM)攻防对抗过程有关参数计算模型研究[J].现代防御技术,1996,(4):11-23.WEN X Q,LIU T J.Computational model of parameters of attack-defense confrontation process for anti-tactical ballistic missile[J].Modern Defense Technology,1996,24(4):11-23(in Chinese).
    [26]
    吴金平,陆铭华,黄文斌,等.水面舰艇编队对反舰导弹的威胁判断研究[J].系统仿真学报,2004,16(5):879-882.WU J P,LU M H,HUANG W B,et al.Threat estimation research of surface warship formation against anti-ship missiles[J].Journal of System Simulation,2004,16(5):879-882(in Chinese).
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(870) PDF downloads(642) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return