Volume 45 Issue 6
Jun.  2019
Turn off MathJax
Article Contents
HAN Xinmin, SHANG Bolin, XU Haojun, et al. Combination analysis of susceptibility influencing factors of stealth aircraft[J]. Journal of Beijing University of Aeronautics and Astronautics, 2019, 45(6): 1185-1194. doi: 10.13700/j.bh.1001-5965.2018.0605(in Chinese)
Citation: HAN Xinmin, SHANG Bolin, XU Haojun, et al. Combination analysis of susceptibility influencing factors of stealth aircraft[J]. Journal of Beijing University of Aeronautics and Astronautics, 2019, 45(6): 1185-1194. doi: 10.13700/j.bh.1001-5965.2018.0605(in Chinese)

Combination analysis of susceptibility influencing factors of stealth aircraft

doi: 10.13700/j.bh.1001-5965.2018.0605
Funds:

National Basic Research Program of China 2015CB755802

National Natural Science Foundation of China 61374145

More Information
  • Corresponding author: XU Haojun, E-mail: xuhaojun1965@163.com
  • Received Date: 22 Oct 2018
  • Accepted Date: 07 Dec 2018
  • Publish Date: 20 Jun 2019
  • For the assessment of stealth aircraft susceptibiliiy under the influence of multiple factors, the combined analysis of the factors in typical combat scenarios is conducted. Firstly, the susceptibility model based on task cycle is established. Secondly, the susceptibility parameters such as radar, infrared, radio frequency (RF) and electronic jamming are analyzed and the calculation models of different factors are established. Finally, the simulation of influencing factors under different stealth configurations are carried out. The results indicate that the combination of multiple methods can effectively reduce the susceptibility of stealth aircraft, and then the influence degree of susceptibility under multi-factor coupling is analyzed within a certain parameter range. The proposed results are valuable for both susceptibility reduction of aircraft in service and design of new aircraft susceptibility scheme.

     

  • loading
  • [1]
    BALL R E.The fundamentals of aircraft combat survivability:Analysis and design[M].2nd ed.Reston:AIAA, 2015.
    [2]
    DAVID H H, RONALD M D, MICHAEL S R.Unmanned aerial system survivability: AIAA-2009-2401[R].Reston: AIAA, 2009.
    [3]
    DANIELLE S S, DIMITRI N M.Methodology for assessing survivability tradeoffs in the preliminary design process: 2000-01-5589[R].Reston: AIAA, 2000.
    [4]
    BALL R E, ATKINSON D B.A history of the survivability design of military aircraft: A95-30798[R].Reston: AIAA, 1995.
    [5]
    韩欣珉, 尚柏林, 沈安慰, 等.基于属性值为区间数的轰炸机敏感性评估[J].火力与指挥控制, 2017, 42(7):76-80. doi: 10.3969/j.issn.1002-0640.2017.07.017

    HAN X M, SHANG B L, SHEN A W, et al.Evaluation method of bomber susceptivity based on attribute value within interval numbers[J].Fire Control & Command Control, 2017, 42(7):76-80(in Chinese). doi: 10.3969/j.issn.1002-0640.2017.07.017
    [6]
    SEOW Y W.Survivability enhancement in a combat environment[D].Monterey, CA: Naval Postgradnate School, 2004.
    [7]
    PATERSON J.Survivability benefits from the use of standoff weapons by stealth aircraft: 1999-01-5503[R].New York: SAE International, 1999.
    [8]
    杨哲, 李曙林, 周莉.机载自卫压制干扰和箔条干扰下飞机生存力研究[J].北京理工大学学报, 2013, 33(4):375-379. doi: 10.3969/j.issn.1001-0645.2013.04.010

    YANG Z, LI S L, ZHOU L.Study of aircraft survivability under the conditions of self-defense jamming and chaff jamming[J].Transactions on Beijing Institute of Technology, 2013, 33(4):375-379(in Chinese). doi: 10.3969/j.issn.1001-0645.2013.04.010
    [9]
    郭晓辉, 宋笔锋, 王旭.具有电子对抗功能的飞机生存力评估方法[J].系统工程理论与实践, 2005, 25(6):71-75. doi: 10.3321/j.issn:1000-6788.2005.06.012

    GUO X H, SONG B F, WANG X.Evaluation of survivability to an aircraft with electrontic countermeasures system[J].Systems Engineering-Theory & Practice, 2005, 25(6):71-75(in Chinese). doi: 10.3321/j.issn:1000-6788.2005.06.012
    [10]
    石帅, 宋笔锋, 裴扬, 等.基于Agent理论的飞机敏感性评估方法[J].航空学报, 2014, 35(2):444-453. http://d.old.wanfangdata.com.cn/Periodical/hkxb201402015

    SHI S, SONG B F, PEI Y, et al.Assessment method of aircraft susceptibility based on agent theory[J].Acta Aeronautica et Astronautica Sinica, 2014, 35(2):444-453(in Chinese). http://d.old.wanfangdata.com.cn/Periodical/hkxb201402015
    [11]
    石帅, 宋笔锋, 裴扬, 等.数据链支持下飞机敏感性评估方法研究[J].西北工业大学学报, 2015, 33(5):811-818. doi: 10.3969/j.issn.1000-2758.2015.05.018

    SHI S, SONG B F, PEI Y, et al.An assessment of aircraft susceptibility under the support of data link[J].Journal of Northwestern Polytechnical University, 2015, 33(5):811-818(in Chinese). doi: 10.3969/j.issn.1000-2758.2015.05.018
    [12]
    宋海方, 肖明清, 吴华, 等.不同机载电子干扰条件下的飞机敏感性模型[J].航空学报, 2015, 36(11):3630-3639. http://d.old.wanfangdata.com.cn/Periodical/hkxb201511014

    SONG H F, XIAO M Q, WU H, et al.Genetic model of aircraft susceptibility to different airborne electronic counter measure[J].Acta Aeronautica et Astronautica Sinica, 2015, 36(11):3630-3639(in Chinese). http://d.old.wanfangdata.com.cn/Periodical/hkxb201511014
    [13]
    HUANG J, WU Z, XIANG J W, et al.Assessment of aircraft combat survivability enhanced by combined radar stealth and onboard electronic attack[J].Transactions of Nanjing University of Aeronautics and Astronautics, 2000, 17(2):150-156. http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=njhkhtdxxb-e200002007
    [14]
    LI X R, JILKOV V P.Survey of maneuvering target tracking Part Ⅰ:Dynamic models[J].IEEE Transactions on Aerospace and Electronic System, 2003, 39(4):1333-1364. doi: 10.1109/TAES.2003.1261132
    [15]
    张考, 马东立.军用飞机生存力与隐身设计[M].北京:国防工业出版社, 2002.

    ZHANG K, MA D L.Military aircraft survivability and stealth design[M].Beijing:National Defence Industry Press, 2002(in Chinese).
    [16]
    郑江安, 马东立, 赵娟娟.编队歼击机超视距截击效能评估[J].北京航空航天大学学报, 2010, 36(4):459-462. http://bhxb.buaa.edu.cn/CN/abstract/abstract8480.shtml

    ZHENG J A, MA D L, ZHAO J J.Beyoud visual range interception effectiveness evaluation of formation fighter[J].Journal of Beijing University of Aeronautics and Astronautics, 2010, 36(4):459-462(in Chinese). http://bhxb.buaa.edu.cn/CN/abstract/abstract8480.shtml
    [17]
    BARTON D K.Radar system analysis and modeling[M].Beijing:Publishing House of Electonics Industry, 2007.
    [18]
    DE MARTINO A.Introduction to modern EW systems[M].Boston:Artech House, 2012.
    [19]
    毛峡, 常乐, 刁伟鹤.复杂背景下红外点目标探测概率估算[J].北京航空航天大学学报, 2011, 37(11):1429-1434. http://bhxb.buaa.edu.cn/CN/abstract/abstract12132.shtml

    MAO X, CHANG L, DIAO W H.Estimation for detection probability of infrared point target under complex backgrounds[J].Journal of Beijing University of Aeronautics and Astronautics, 2011, 37(11):1429-1434(in Chinese). http://bhxb.buaa.edu.cn/CN/abstract/abstract12132.shtml
    [20]
    贾庆莲, 邓文渊.红外警戒系统的探测概率计算[J].红外与激光工程, 2011, 40(10):1856-1861. doi: 10.3969/j.issn.1007-2276.2011.10.006

    JIA Q L, DENG W Y.Detection probability calculation of infrared warning system[J].Infrared and Lazer Engineering, 2011, 40(10):1856-1861(in Chinese). doi: 10.3969/j.issn.1007-2276.2011.10.006
    [21]
    刘宏强, 魏贤智, 李飞, 等.基于射频隐身的雷达跟踪状态下单次辐射能量实时控制方法[J].电子学报, 2015, 43(10):2047-2052. doi: 10.3969/j.issn.0372-2112.2015.10.025

    LIU H Q, WEI X Z, LI F, et al.The real time control method of radar single radiation power based on RF stealth at the tracking[J].Acta Electronica Sinica, 2015, 43(10):2047-2052(in Chinese). doi: 10.3969/j.issn.0372-2112.2015.10.025
    [22]
    MAHA F Z A B R.Radar systems analysis and design using MATLAB[M].Boca Raton:Chapman & Hall/CRC, 2000.
    [23]
    LYNCH D L.Introduction to RF stealth[M].Bellingham:SPIE, 2003:2-6.
    [24]
    袁兴鹏.基于作战想定的战场电磁环境仿真技术研究[J].兵工自动化, 2017, 36(1):55-58. http://d.old.wanfangdata.com.cn/Periodical/bgzdh201701014

    YUAN X P.Study on simulating technology of battlefield electromagnetic environment based on warfare scenario[J].Ordnance Industry Automation, 2017, 36(1):55-58(in Chinese). http://d.old.wanfangdata.com.cn/Periodical/bgzdh201701014
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(6)  / Tables(3)

    Article Metrics

    Article views(652) PDF downloads(613) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return