In view of the vulnerability analysis requirements of system targets, this paper puts forward the concept of system target vulnerability, defines system target vulnerability, analyzes the difference between system targets and single targets, and puts forward the analysis process of system target vulnerability, including preliminary determination of system target range, determination of vulnerability purpose and level, determination of key entities, construction of system damage tree, determination of damage weight and damage criteria, based on the analysis of single target vulnerability research results and other steps, this method can guide relevant work.
This paper presents a design method of basic mathematical simulation model of damage effect. Based on this method, the basic components and software framework of damage effect simulation are realized. This method is composed of coordinate system definition and coordinate conversion components, plane normal vector simulation basic components, maneuver route change simulation basic components, 2D situation display components, and so on.
This paper presents a simulation algorithm for target to ground fire distribution. Taking battalion as an example, the algorithm for battalion level target to ground fire distribution includes the calculation model of optimal strike relationship, the cost function of missile control fire distribution and the solution method of linear programming. Based on this algorithm, the software is implemented and applied to related projects. Combined with the actual project, good results have been achieved.
KEYWORDS: Explosives, 3D modeling, Visualization, Data modeling, Interfaces, Signal attenuation, 3D displays, Spherical lenses, Wave propagation, Motion analysis
This paper presents a design method of typical damage element simulation generator, and realizes the software based on this method. This method includes characteristic and structure model sub module, parametric design sub module, power parameter setting sub module, power index analysis sub module and so on. This method can provide damage meta related data for damage effectiveness evaluation and fire plan.
KEYWORDS: Data modeling, 3D modeling, Databases, 3D acquisition, 3D displays, Data storage, Systems modeling, Human-machine interfaces, Visualization, Laser damage threshold
This paper presents a design method of power field reconstruction system based on empirical formula, and realizes the software system based on this method. This method includes five parts: warhead structure parametric modeling subsystem, warhead power field calculation and simulation subsystem, warhead power field three-dimensional presentation subsystem, model setting and management subsystem, database management subsystem and so on. There is data exchange between various parts. Based on this method, the power field can be reconstructed.
According to the needs of engineering support simulation field, this paper proposes a design method of engineering support simulation support software, and realizes the corresponding software based on this method. The method includes engineering support simulation initialization and data receiving module, engineering support equipment simulation module, obstacle setting simulation module, obstacle removal simulation module, motion support simulation module, engineering support simulation data output and recording module. Based on this method, the problem of engineering support simulation can be solved.
This paper presents a global static planning algorithm for field road network. The algorithm is composed of obtaining or setting the starting point and key point model, setting the force type model, setting the planning mode model, global static planning model, etc. The global static planning model includes Astar path planning algorithm and the improvement of Astar path planning algorithm. Combined with the actual project, it has achieved good results.
This paper presents an obstacle recognition algorithm for field road network, including obstacle element extraction based on digital elevation model (DEM), determination of traffic factors affecting path planning, rasterization of terrain environment, obstacle recognition algorithm, establishment of overlapping grid of traffic area, description of passable area and non-passable area, etc. Combined with the actual project, it has achieved good results.
This paper presents a design method of radar jamming simulation software. The software is composed of radar jamming decision simulation model, radar jamming simulation master control model, radar automatic selection jamming simulation model, radar jamming simulation model, data transmission and integration model. Combined with the actual project, good results have been achieved.
KEYWORDS: 3D modeling, Data modeling, Visualization, Analytical research, Software development, Visual process modeling, 3D displays, 3D acquisition, Explosives, Signal attenuation
Ammunition damage effect is an important basis for system simulation and ammunition power analysis. To solve the problem of ammunition damage effect analysis, it is necessary to collect relevant data, model, simulate and analyze ammunition. Based on the theoretical formula and test data, this paper proposes a typical ammunition modeling, power field analysis and damage effect analysis method, and constructs the corresponding typical ammunition damage effect analysis software, which includes database, parametric modeling module, power field analysis module, three dimensional visualization module. Compared with the corresponding test data, the credibility of the method and the availability of the software are verified.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.