Fire distribution simulation is an extensive research topic, which belongs to the important research content of system of systems confrontation simulation. This paper presents a model of air defense fire distribution loop, which is relatively efficient, convenient and reliable, and can be used to guide the implementation of related algorithms. The computational fire distribution loop model includes the calculation of target distribution line and target distribution loop. This model can realize the effective distribution of air defense fire to targets. This model can guide the analysis of fire superiority and the calculation of automatic fire distribution. Combined with the actual project, good results have been achieved.
This paper presents a design method of basic mathematical simulation model of damage effect. Based on this method, the basic components and software framework of damage effect simulation are realized. This method is composed of coordinate system definition and coordinate conversion components, plane normal vector simulation basic components, maneuver route change simulation basic components, 2D situation display components, and so on.
This paper presents a simulation algorithm for target to ground fire distribution. Taking battalion as an example, the algorithm for battalion level target to ground fire distribution includes the calculation model of optimal strike relationship, the cost function of missile control fire distribution and the solution method of linear programming. Based on this algorithm, the software is implemented and applied to related projects. Combined with the actual project, good results have been achieved.
We present a target discovery simulation method and software, including target environment module, photoelectric system module and search simulation module. The target environment module includes target / background radiation characteristic parameter module and transmission module, and the photoelectric system module includes visible light imaging system and infrared thermal imaging system, the search simulation module includes search model and dynamic detection probability model. This method can simulate the process of visible and infrared target discovery.
KEYWORDS: Data storage, Data communications, Control systems, Analytical research, Telecommunications, Power supplies, RF communications, Data analysis, Computing systems, Telescopes
The shelter vehicle is a common target in the battlefield, it is of great significance to study the damage of trees. We present a target damage tree modeling method for shelter vehicles, including target function and structure analysis, damage level, target damage tree modeling and so on. Through this method, the function and structure of shelter vehicles can be analyzed, their damage level can be determined, and the damage tree model can be established.
KEYWORDS: Explosives, 3D modeling, Visualization, Data modeling, Interfaces, Signal attenuation, 3D displays, Spherical lenses, Wave propagation, Motion analysis
This paper presents a design method of typical damage element simulation generator, and realizes the software based on this method. This method includes characteristic and structure model sub module, parametric design sub module, power parameter setting sub module, power index analysis sub module and so on. This method can provide damage meta related data for damage effectiveness evaluation and fire plan.
KEYWORDS: Data modeling, 3D modeling, Databases, 3D acquisition, 3D displays, Data storage, Systems modeling, Human-machine interfaces, Visualization, Laser damage threshold
This paper presents a design method of power field reconstruction system based on empirical formula, and realizes the software system based on this method. This method includes five parts: warhead structure parametric modeling subsystem, warhead power field calculation and simulation subsystem, warhead power field three-dimensional presentation subsystem, model setting and management subsystem, database management subsystem and so on. There is data exchange between various parts. Based on this method, the power field can be reconstructed.
This paper presents a global static planning algorithm for field road network. The algorithm is composed of obtaining or setting the starting point and key point model, setting the force type model, setting the planning mode model, global static planning model, etc. The global static planning model includes Astar path planning algorithm and the improvement of Astar path planning algorithm. Combined with the actual project, it has achieved good results.
This paper presents an obstacle recognition algorithm for field road network, including obstacle element extraction based on digital elevation model (DEM), determination of traffic factors affecting path planning, rasterization of terrain environment, obstacle recognition algorithm, establishment of overlapping grid of traffic area, description of passable area and non-passable area, etc. Combined with the actual project, it has achieved good results.
This paper presents a design method of radar jamming simulation software. The software is composed of radar jamming decision simulation model, radar jamming simulation master control model, radar automatic selection jamming simulation model, radar jamming simulation model, data transmission and integration model. Combined with the actual project, good results have been achieved.
This paper presents a simulation method and software for the interaction between environment and equipment mobility, including the simulation model of the interaction between natural geographical environment and equipment mobility performance, the simulation model of the interaction between man-made battlefield environment and equipment mobility performance. The simulation environment elements can simulate equipment trafficability, collision detection and passage, which can effectively support equipment simulation.
Satellite application simulation support software is used for the simulation of satellite applications such as satellite communication, positioning and navigation and reconnaissance. This paper proposes a design method of satellite application simulation software. The software consists of satellite scenario editing and three-dimensional visual display unit, satellite orbit simulation unit, satellite orbit simulation unit, satellite link simulation unit, satellite networking communication simulation unit, satellite reconnaissance and surveillance simulation unit and satellite navigation and positioning simulation unit.
This paper presents a design method of simulation result record base, which includes simulation result recording module, simulation result management module, simulation result analysis module and simulation result playback module. The simulation result record base records and manages the simulation results of system comprehensive evaluation, provides a comprehensive management platform for simulation data, and also provides data support for equipment system performance evaluation, analysis, report, simulation playback, equipment model verification and calibration in the later stage.
KEYWORDS: Computer simulations, 3D displays, 3D acquisition, Target detection, 3D modeling, Visualization, Rockets, Reconnaissance, Clouds, 3D imaging standards
According to the requirements of simulation support software of electronic sand table hardware, this paper proposes a design method of electronic sand table support software. The software is composed of three-dimensional battlefield environment simulation module, military standard, arrow and other plotting modules, a large number of dynamic target loading modules, situation simulation module and real-time communication module. After practical verification, the software can be used for three-dimensional situation generation, rendering and plotting of electronic sand table, supporting scenario generation, three-dimensional simulation, countermeasure deduction and other activities, and the application effect is good.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.