期刊文献+
共找到193篇文章
< 1 2 10 >
每页显示 20 50 100
Research on three-dimensional attack area based on improved backtracking and ALPS-GP algorithms of air-to-air missile
1
作者 ZHANG Haodi WANG Yuhui HE Jiale 《Journal of Systems Engineering and Electronics》 2025年第1期292-310,共19页
In the field of calculating the attack area of air-to-air missiles in modern air combat scenarios,the limitations of existing research,including real-time calculation,accuracy efficiency trade-off,and the absence of t... In the field of calculating the attack area of air-to-air missiles in modern air combat scenarios,the limitations of existing research,including real-time calculation,accuracy efficiency trade-off,and the absence of the three-dimensional attack area model,restrict their practical applications.To address these issues,an improved backtracking algorithm is proposed to improve calculation efficiency.A significant reduction in solution time and maintenance of accuracy in the three-dimensional attack area are achieved by using the proposed algorithm.Furthermore,the age-layered population structure genetic programming(ALPS-GP)algorithm is introduced to determine an analytical polynomial model of the three-dimensional attack area,considering real-time requirements.The accuracy of the polynomial model is enhanced through the coefficient correction using an improved gradient descent algorithm.The study reveals a remarkable combination of high accuracy and efficient real-time computation,with a mean error of 91.89 m using the analytical polynomial model of the three-dimensional attack area solved in just 10^(-4)s,thus meeting the requirements of real-time combat scenarios. 展开更多
关键词 air combat three-dimensional attack area improved backtracking algorithm age-layered population structure genetic programming(ALPS-GP) gradient descent algorithm
在线阅读 下载PDF
Deep reinforcement learning and its application in autonomous fitting optimization for attack areas of UCAVs 被引量:14
2
作者 LI Yue QIU Xiaohui +1 位作者 LIU Xiaodong XIA Qunli 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第4期734-742,共9页
The ever-changing battlefield environment requires the use of robust and adaptive technologies integrated into a reliable platform. Unmanned combat aerial vehicles(UCAVs) aim to integrate such advanced technologies wh... The ever-changing battlefield environment requires the use of robust and adaptive technologies integrated into a reliable platform. Unmanned combat aerial vehicles(UCAVs) aim to integrate such advanced technologies while increasing the tactical capabilities of combat aircraft. As a research object, common UCAV uses the neural network fitting strategy to obtain values of attack areas. However, this simple strategy cannot cope with complex environmental changes and autonomously optimize decision-making problems. To solve the problem, this paper proposes a new deep deterministic policy gradient(DDPG) strategy based on deep reinforcement learning for the attack area fitting of UCAVs in the future battlefield. Simulation results show that the autonomy and environmental adaptability of UCAVs in the future battlefield will be improved based on the new DDPG algorithm and the training process converges quickly. We can obtain the optimal values of attack areas in real time during the whole flight with the well-trained deep network. 展开更多
关键词 attack area neural network deep deterministic policy gradient(DDPG) unmanned combat aerial vehicle(UCAV)
在线阅读 下载PDF
A CALCULATING METHOD OF THE KILL PROBABILITY ATTACK AREA FOR AAM 被引量:1
3
作者 Li Ting-jie, Liu Run-quan and Wang Chao-zhiBeijing University of Aeronautics and Astronautics Zhu Gu-xiang and Wang Li-zhen014 Center of Ministry of Aeronautics and Astronautics 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 1991年第4期339-346,共8页
This paper provides a calculating method which can be used in calculation of the kill probability attack area for every AAM. At first, attack area of AAM and kill probability of every characteristic point are obtained... This paper provides a calculating method which can be used in calculation of the kill probability attack area for every AAM. At first, attack area of AAM and kill probability of every characteristic point are obtained by combining trajectory calculation with kill probability calculation. Then, coordinates of a fire point relative to standard kill probability value in terms of standardization method are found. At last, equivalent kill probability curve equations are formulated by means of curve fitting method. 展开更多
关键词 A CALCULATING METHOD OF THE KILL PROBABILITY attack area FOR AAM area
在线阅读 下载PDF
Fast-solving method for air-to-surface guided bombs' allowable attack area
4
作者 李强 夏群利 崔莹莹 《Journal of Beijing Institute of Technology》 EI CAS 2015年第2期164-168,共5页
A new method called local accurate search is put forward to calculate the allowable area for air-to-surface missiles based on the conventional methods. Comparing with traditional methods, the local accurate search met... A new method called local accurate search is put forward to calculate the allowable area for air-to-surface missiles based on the conventional methods. Comparing with traditional methods, the local accurate search method can search the area online and reduce the time of search with the required precision. Combining the traditional flight range table with a model calculation method, the new method employs the local search to fred an accurate result, which will meet the fast-calculation requirements for attacking moving targets. In this way, the missiles are adapted for the complex warfare situation. 展开更多
关键词 control technology of aircraft allowable attack area fast calculation search online
在线阅读 下载PDF
MULTI-FIGHTER COORDINATED MULTI-TARGET ATTACK SYSTEM 被引量:7
5
作者 耿延洛 姜长生 李伟浩 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2004年第1期18-23,共6页
A definition of self-determined priority is used in airfight decision firstly. A scheme of grouping the whole fighters is introduced, and the principle of target assignment and fire control is designed. Based on the ... A definition of self-determined priority is used in airfight decision firstly. A scheme of grouping the whole fighters is introduced, and the principle of target assignment and fire control is designed. Based on the neutral network, the decision algorithm is derived and the whole coordinated decision system is simulated. Secondly an algorithm for missile-attacking area is described and its calculational result is obtained under initial conditions. Then the attacking of missile is realized by the proportion guidance. Finally, a multi-target attack system. The system includes airfight decision, estimation of missile attack area and calculation of missile attack procedure. A digital simulation demonstrates that the airfight decision algorithm is correct. The methods have important reference values for the study of fire control system of the fourth generation fighter. 展开更多
关键词 multi-target attack coordinated airfight decision missile attack area priority fire control
在线阅读 下载PDF
Real Time Vehicular Traffic Simulation for Black Hole Attack in the Greater Detroit Area
6
作者 Abdulaziz Alshammari Mohamed A Zohdy +1 位作者 Debatosh Debnath George Corser 《Journal of Information Security》 2020年第1期71-80,共10页
Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smar... Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smart cities. Wireless vehicular communication is employed to improve traffic safety and to reduce traffic congestion. Each vehicle in the ad-hoc network achieves as a smart mobile node categorized by high mobility and forming of dynamic networks. As a result of the movement of vehicles in a continuous way, VANETs are vulnerable to many security threats so it requisites capable and secure communication. Unfortunately, Ad hoc networks are liable to varied attacks like Block Hole attacks and Grey Hole attacks, Denial of service attacks, etc. Among the most known attacks are the Black Hole attacks while the malicious vehicle is able to intercept the data and drops it without forwarding it to the cars. The main goal of our simulation is to analyze the performance impact of black hole attack in real time vehicular traffic in the Greater Detroit Area using NS-2 and SUMO (Simulation of Urban). The simulation will be with AODV protocol. 展开更多
关键词 Black Hole attacks Vehicular Ad HOC Networks AODV Protocol SIMULATION SUMO GREATER DETROIT area
在线阅读 下载PDF
Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment 被引量:2
7
作者 Sanjeev Kumar Orifiel Gomez 《Journal of Information Security》 2010年第2期88-94,共7页
ARP-based Distributed Denial of Service (DDoS) attacks due to ARP-storms can happen in local area networks where many computer systems are infected by worms such as Code Red or by DDoS agents. In ARP attack, the DDoS ... ARP-based Distributed Denial of Service (DDoS) attacks due to ARP-storms can happen in local area networks where many computer systems are infected by worms such as Code Red or by DDoS agents. In ARP attack, the DDoS agents constantly send a barrage of ARP requests to the gateway, or to a victim computer within the same sub-network, and tie up the resource of attacked gateway or host. In this paper, we set to measure the impact of ARP-attack on resource exhaustion of computers in a local area network. Based on attack experiments, we measure the exhaustion of processing and memory resources of a victim computer and also other computers, which are located on the same network as the victim computer. Interestingly enough, it is observed that an ARP-attack not only exhausts resource of the victim computer but also significantly exhausts processing resource of other non-victim computers, which happen to be located on the same local area network as the victim computer. 展开更多
关键词 ARP attack COMPUTER Network Security COMPUTER Systems DIRECT attack Distributed DENIAL of Service attackS (DDoS) Indirect attack Local area Networks
在线阅读 下载PDF
The Salt Attack Performance of Magnesium Oxychloride Cement Exposure to Three Kinds of Brines 被引量:5
8
作者 黄青 LI Ying +8 位作者 CHANG Chenggong WEN Jing DONG Jinmei ZHENG Weixin A Danchun LIU Pan DONG Fei ZHOU Yuan 肖学英 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS 2020年第1期155-166,共12页
Salt attack performance of magnesium oxychloride cement(MOC) in brine was investigated from the viewpoints of strength development and strength coefficient. Microstructure was studied using quantitative X-ray diffract... Salt attack performance of magnesium oxychloride cement(MOC) in brine was investigated from the viewpoints of strength development and strength coefficient. Microstructure was studied using quantitative X-ray diffraction(QXRD), thermogravimetry(TG) and scanning electron microscopy(SEM). The results show that MOC mortars have outstanding salt attack performance after aging brine and raw brine immersion. The salt attack coefficients of MOC mortars are higher than 0.8, which is qualified for application in saline soil and salt lake area. The reason is that salt brine solution enters into the voids of MOC and plays a role of toughening and strengthening in the MOC. 展开更多
关键词 magnesium OXYCHLORIDE cement SALT attack PERFORMANCE SALINE soil SALT lake area
原文传递
Security Analysis of Application Layer Protocols on Wireless Local Area Networks 被引量:1
9
作者 杨明豪 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期586-592,共7页
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries l... This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users' connection, the connection managers will automatically research the last access point's extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users' access points, they can pass AL's authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users' account details, passwords, data and privacy. 展开更多
关键词 man-in-the-middle (MITM) attacks session hijacking wireless local area network (WLAN)
原文传递
滨海环境下混凝土抗硫酸铵侵蚀性能提升研究
10
作者 谭洁 胡伟 刘洋 《硅酸盐通报》 北大核心 2025年第2期474-489,共16页
为解决滨海地区混凝土在硫酸铵环境中耐久性不足的问题,本研究采用了不同的水灰比(w/b)和表面涂层处理对混凝土在硫酸铵浸润下的抗侵蚀性能进行了系统评估。通过对混凝土试样施加胶体硅酸盐、硅烷/纳米复合材料、乙烯基酯/纳米复合材料... 为解决滨海地区混凝土在硫酸铵环境中耐久性不足的问题,本研究采用了不同的水灰比(w/b)和表面涂层处理对混凝土在硫酸铵浸润下的抗侵蚀性能进行了系统评估。通过对混凝土试样施加胶体硅酸盐、硅烷/纳米复合材料、乙烯基酯/纳米复合材料等涂层,并在基准浸润和复合浸润(冻融循环和干湿循环)条件下进行质量变化及微观结构的演变等测试。研究结果表明:与基准浸润条件相比,复合浸润对混凝土的破坏更为严重。将水灰比由0.6降低至0.4后,涂覆纯乙烯基酯的混凝土试样与无涂层试样相比,累积质量损失减少了约55%,降低水灰比会使混凝土的微结构致密化并降低渗透性。胶体硅酸盐表面处理虽然改善了初始流体抵抗性,但是由于胶体硅酸盐的亲水性和涂层的干缩微裂纹,未能有效保护混凝土抵抗硫酸铵侵蚀。水灰比为0.6,采用硅烷/纳米复合材料涂层时,由于其疏水性和纳米材料的增强效果,混凝土试样的累积质量损失相对涂覆纯硅烷的试样最多可减少56%,水灰比为0.4,采用乙烯基酯/纳米复合材料的涂层时,由于聚合物膜的强黏结性和化学稳定性,混凝土试样的累积质量损失相对涂覆纯乙烯基酯的试样最多可减少65%。硅烷和乙烯基酯纳米复合材料均在滨海地区混凝土的硫酸铵侵蚀防护中均表现出良好的效果,为滨海地区混凝土结构的设计和维护提供了有效的防护措施,可以显著延长混凝土结构在硫酸铵环境中的使用寿命,减少维修和更换成本。 展开更多
关键词 滨海地区 混凝土 耐久性 硫酸铵侵蚀 纳米复合材料 抗硫酸铵侵蚀性能 混凝土保护
在线阅读 下载PDF
变结构小水线面双体无人艇纵向稳定性及耐波性能研究
11
作者 李鑫禹 马川 +3 位作者 刘英浩 杨俊 王伟 庄佳园 《中国造船》 北大核心 2025年第3期270-284,共15页
将直、斜两种支柱形式小水线面双体船(SWATH)的优势结合,提出新型的变结构SWATH船型,对其进行了静水拖曳试验及耐波性试验。利用重叠网格技术和结合SST k-ω湍流模型及有限体积(VOF)方法对变结构SWATH进行数值模拟并与试验数据对比,验... 将直、斜两种支柱形式小水线面双体船(SWATH)的优势结合,提出新型的变结构SWATH船型,对其进行了静水拖曳试验及耐波性试验。利用重叠网格技术和结合SST k-ω湍流模型及有限体积(VOF)方法对变结构SWATH进行数值模拟并与试验数据对比,验证了数值模拟方法的可行性。计算了该船在不同海况下的水动力性能,分析水翼攻角和支柱旋转角对纵向稳定性的影响。结果表明:在低海况下合理调节水翼攻角可显著提升变结构SWATH的纵向稳定性性能;在中高海况下,以中低速在中高波长条件下航行时,适当增大支柱旋转角度可有效减小该船的纵倾角;而在低航速、小波长和高航速、大波长情况下则适合以较小支柱旋转角的状态航行。研究结果可为海上作业变结构SWATH提供高效和安全的航行策略。 展开更多
关键词 小水线面双体船 水翼攻角 耐波性 计算流体力学
原文传递
航空火箭杀爆弹对特定目标区域用弹量仿真分析
12
作者 刘建斌 万荣根 刘刚 《兵器装备工程学报》 北大核心 2025年第10期141-147,共7页
通过仿真的方法研究了航空火箭杀爆弹在特定区域内的毁伤面积百分比和用弹量与落点精度间的变化关系。针对人员目标,通过理论公式计算获得破片初速、飞散方向角和冲击波超压,结合火箭弹落速、落角,建立动态爆炸威力仿真计算模型,研究了... 通过仿真的方法研究了航空火箭杀爆弹在特定区域内的毁伤面积百分比和用弹量与落点精度间的变化关系。针对人员目标,通过理论公式计算获得破片初速、飞散方向角和冲击波超压,结合火箭弹落速、落角,建立动态爆炸威力仿真计算模型,研究了对于60 m×60 m目标区域,火箭弹数量分别为1、2、4、6、8、10、12和14枚,圆概率误差(CEP)为5、10、20、30 m时毁伤面积百分比分别随数量和圆概率误差(CEP)间的变化规律。结果表明:火箭弹数量从4枚增加至6枚时毁伤面积百分比的增幅最大,数量为14枚时毁伤面积百分比最大;相同火箭弹数量条件下,对于特定区域的毁伤面积百分比随火箭弹的圆概率误差(CEP)增加先增大后减小,在本文中选取的仿真计算条件下圆概率误差(CEP)为10 m时最大。 展开更多
关键词 航空火箭杀爆弹 武装直升机 人员目标 特定区域 用弹量
在线阅读 下载PDF
基于动态阈值的电力监控局域网DDoS攻击匹配检测方法
13
作者 裴军 万波 +2 位作者 彭纬伟 严汉秋 王思杰 《沈阳工业大学学报》 北大核心 2025年第6期800-807,共8页
[目的]DDoS攻击作为一种破坏性极强的网络威胁,严重影响电力系统的稳定运行。由于电力监控局域网中的数据流量复杂多变,DDoS攻击流量与正常流量在表现形式上存在较高相似性,导致二者难以有效区分。传统的静态阈值方法虽能在一定程度上... [目的]DDoS攻击作为一种破坏性极强的网络威胁,严重影响电力系统的稳定运行。由于电力监控局域网中的数据流量复杂多变,DDoS攻击流量与正常流量在表现形式上存在较高相似性,导致二者难以有效区分。传统的静态阈值方法虽能在一定程度上实现流量监测,但因无法适应流量的动态变化,常出现误判,从而削弱了对DDoS攻击的检测效果,难以为电力监控局域网提供可靠的安全保障。为此,提出一种基于动态阈值的电力监控局域网DDoS攻击检测方法。[方法]通过网络流量采集设备实时获取电力监控局域网的流量数据,并利用信息熵理论计算流量熵值。信息熵可反映数据的混乱程度:正常流量通常具有一定规律性,熵值相对稳定;而DDoS攻击流量因异常数据包的大量涌入,导致熵值显著波动。基于此特性,本文设定动态阈值,当流量熵值超过阈值时判定为异常流量。随后,提取异常流量的六元组特征集(包括平均流包数、平均字节数、源IP地址增速、流表生存时间变化、端口增速以及对流比),并将其输入预训练的最小二乘支持向量机(least squares support vector machine,LSSVM)分类器中。LSSVM通过对已知样本的学习建立特征与类别的映射关系,从而实现对异常流量的分类与判断,确定其是否为DDoS攻击流量。[结果]实验结果表明,本文方法在ROC曲线和PR曲线上均表现较好,ROC-AUC和PR-AUC值均较传统方法有所提高。这表明该方法在检测DDoS攻击时具备更高的准确率与召回率,能够有效识别隐藏于正常流量中的攻击流量,并显著降低误判率。[结论]基于动态阈值与LSSVM分类器的检测方法能够有效应对电力监控局域网中DDoS攻击与正常流量难以区分的问题,提升检测的准确性与可靠性,为电力监控局域网提供更为有效的DDoS攻击防护手段,有助于增强电力系统的安全性与稳定性,保障电力供应的可靠运行,对电力行业网络安全防护具有重要的实际应用价值。 展开更多
关键词 电力监控局域网 DDOS攻击 匹配检测 动态阈值 最小二乘支持向量机 异常流量 最优分类器 六元组特征
在线阅读 下载PDF
中远程空空导弹允许攻击区的快速模拟算法 被引量:18
14
作者 刘代军 高晓光 +1 位作者 李言俊 董秉印 《西北工业大学学报》 EI CAS CSCD 北大核心 1999年第4期530-533,共4页
允许攻击区是衡量空空导弹瞬时最大攻击能力的一个重要指标。本文以某型中远程复合制导空空导弹为例,提出一种快速模拟算法来计算导弹的允许攻击区。仿真结果表明:本文提出的快速模拟攻击区算法在满足机载计算机实时性要求的前提下,... 允许攻击区是衡量空空导弹瞬时最大攻击能力的一个重要指标。本文以某型中远程复合制导空空导弹为例,提出一种快速模拟算法来计算导弹的允许攻击区。仿真结果表明:本文提出的快速模拟攻击区算法在满足机载计算机实时性要求的前提下,有较高的精度。 展开更多
关键词 允许攻击区 快速模拟 空空导弹 中远程导弹
在线阅读 下载PDF
空地制导炸弹可攻击区的快速解算方法 被引量:13
15
作者 李强 夏群利 +1 位作者 崔莹莹 温求遒 《兵工学报》 EI CAS CSCD 北大核心 2012年第4期390-394,共5页
提出了一种新型局部精确搜索的解算方法。该方法将传统机载射表与模型解算相结合,进行局部精确搜索,满足对动目标的打击和解算快速性的要求。与传统的攻击区解算方法相比,在保证解算精度的条件下,能够对攻击区进行在线搜索并明显减少解... 提出了一种新型局部精确搜索的解算方法。该方法将传统机载射表与模型解算相结合,进行局部精确搜索,满足对动目标的打击和解算快速性的要求。与传统的攻击区解算方法相比,在保证解算精度的条件下,能够对攻击区进行在线搜索并明显减少解算时间。能够更好地适应现代复杂多变的战场环境。 展开更多
关键词 飞行器控制、导航技术 攻击区 快速解算 在线搜索
在线阅读 下载PDF
过渡性射流形式对控火面积影响的试验研究
16
作者 范文恺 杜志朋 《消防科学与技术》 北大核心 2025年第7期903-910,共8页
为探究过渡性射流在灭火救援中的有效性,通过试验的方式,改变过渡性射流的射流打击点、射流压力、射流角度3个因素,研究过渡性射流在4.70 m×2.66 m房间中的控火面积情况。试验表明,过渡性射流难以有效控制射流入射口至打击点之间... 为探究过渡性射流在灭火救援中的有效性,通过试验的方式,改变过渡性射流的射流打击点、射流压力、射流角度3个因素,研究过渡性射流在4.70 m×2.66 m房间中的控火面积情况。试验表明,过渡性射流难以有效控制射流入射口至打击点之间的地面;射流角度为60°时,调整射流压力难以改变射流在房间内的分布情况,射流散射水流主要集中在房间进深4.14~4.70 m范围内;射流角度为70°、射流压力为0.20 MPa时,打击窗楣的射流散射水流控火面积最大,为房间总面积的68%;射流角度为80°、射流压力为0.25 MPa时,打击窗楣的射流散射水流控火面积最大,为房间总面积的72%。试验控制的3个影响因素中,射流角度对控火面积影响最大。 展开更多
关键词 过渡性射流 打击点位 射流压力 射流角度 控火面积
在线阅读 下载PDF
光电干扰对激光制导炸弹攻击效果的影响分析 被引量:8
17
作者 邢晖 丁振东 +2 位作者 雷萍 刘灵 王娟 《电光与控制》 北大核心 2007年第3期51-54,共4页
对激光制导炸弹的主要干扰方式有3种:激光角度欺骗干扰、激光有源压制干扰和光电无源干扰。主要讨论了激光制导炸弹的制导规律及其攻击特性,分析了3种光电干扰方式对激光制导炸弹的攻击效果的影响,给出了3种光电干扰情况下激光制导炸弹... 对激光制导炸弹的主要干扰方式有3种:激光角度欺骗干扰、激光有源压制干扰和光电无源干扰。主要讨论了激光制导炸弹的制导规律及其攻击特性,分析了3种光电干扰方式对激光制导炸弹的攻击效果的影响,给出了3种光电干扰情况下激光制导炸弹攻击偏差的数学模型。 展开更多
关键词 激光制导炸弹 光电干扰 攻击区 偏离量 正态分布
在线阅读 下载PDF
能量约束下的动能拦截弹逆轨拦截攻击区建模 被引量:17
18
作者 于大腾 王华 +1 位作者 李林森 王洪宇 《宇航学报》 EI CAS CSCD 北大核心 2017年第7期704-713,共10页
针对动能拦截弹(KKV)拦截高速目标的拦截末端对抗分析问题,提出一种末端拦截弹攻击区建模方法以及目标最优规避策略。首先,通过空间几何关系推导并得出了拦截弹与目标机动范围在攻击区中的投影计算方法。以所建立模型为基础,推导捕获区... 针对动能拦截弹(KKV)拦截高速目标的拦截末端对抗分析问题,提出一种末端拦截弹攻击区建模方法以及目标最优规避策略。首先,通过空间几何关系推导并得出了拦截弹与目标机动范围在攻击区中的投影计算方法。以所建立模型为基础,推导捕获区与逃逸区以及界栅的计算方法,并给出了显式表达式。随后,引入燃料消耗这一能量约束条件,进一步建立考虑能量约束的攻击区计算模型。对于目标,通过对所建立的攻击区及相应的投影进行分析得到了其最优规避策略。仿真结果表明,文中所建立的模型、投影计算方法及目标最优规避策略是正确的。利用本文提出的模型,可根据末端拦截弹与目标的参数对拦截弹捕获逃逸区进行快速计算。通过对不同情况下的攻击区进行分析,可为助推火箭与拦截弹末制导交接班条件的研究提供便利。 展开更多
关键词 动能拦截弹 逆轨拦截 攻击区 捕获区 逃逸区 能量约束 规避策略
在线阅读 下载PDF
一种空空导弹攻击区的快速解算方法 被引量:13
19
作者 王志刚 张宁 李伟 《固体火箭技术》 EI CAS CSCD 北大核心 2014年第4期448-452,共5页
针对传统空空导弹攻击区解算过程较慢的问题,结合变步长积分、气动系数拟合及最大最小边界快速搜索算法,建立了一种基于三自由度弹道模型的空空导弹攻击区快速解算方法。仿真结果表明,该算法在满足计算精度要求的前提下,大大提高了攻击... 针对传统空空导弹攻击区解算过程较慢的问题,结合变步长积分、气动系数拟合及最大最小边界快速搜索算法,建立了一种基于三自由度弹道模型的空空导弹攻击区快速解算方法。仿真结果表明,该算法在满足计算精度要求的前提下,大大提高了攻击区的解算速度,保证了机载武器系统的实时性要求,对火控系统实时解算攻击区边界具有重要的参考意义。 展开更多
关键词 空空导弹 攻击区 快速解算 变步长积分 气动系数拟合 边界快速搜索
在线阅读 下载PDF
中程空空导弹可攻击区解算的新方法 被引量:13
20
作者 周灿辉 周德云 +1 位作者 聂志强 何鹏 《火力与指挥控制》 CSCD 北大核心 2012年第7期54-56,60,共4页
建立空空导弹初始发射距离三维预估模型,提出一种空空导弹可攻击区解算的新算法。该算法将空空导弹初始发射距离预估模型与黄金分割法相结合,用导弹初始发射距离预估值构成黄金分割法的初始搜索区间,进行攻击区边界搜索。仿真结果表明,... 建立空空导弹初始发射距离三维预估模型,提出一种空空导弹可攻击区解算的新算法。该算法将空空导弹初始发射距离预估模型与黄金分割法相结合,用导弹初始发射距离预估值构成黄金分割法的初始搜索区间,进行攻击区边界搜索。仿真结果表明,该算法提高了空空导弹可攻击区的精度,降低了边界搜索循环次数,具有有效性。 展开更多
关键词 空空导弹 攻击区 发射距离预估 黄金分割法
在线阅读 下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部