KEYWORDS: Defense and security, Radar sensor technology, Motion models, Target detection, Process modeling, Computer simulations, Systems modeling, Modeling, Statistical modeling, Extremely high frequency
Active protection simulation is a part of the field of system-of-systems confrontation simulation, and is the content of extensive research in the field of system-of-systems confrontation simulation at home and abroad. The main objective of the research is to accurately describe the active protection process and support the rapid development of computer simulation. This paper proposes an active protection simulation method, and implements an active protection software based on this method, which consists of armor protection simulation component, incoming ammunition detection and warning simulation component, soft killing active protection simulation component, hard killing active protection simulation component, etc. It can simulate the active protection process of armored target against typical ammunition. It not only considers the relevant elements of the protection process, but also facilitates the software implementation. It effectively supports the simulation of system-of-systems confrontation.
Fire distribution simulation is an extensive research topic, which belongs to the important research content of system of systems confrontation simulation. This paper presents a model of air defense fire distribution loop, which is relatively efficient, convenient and reliable, and can be used to guide the implementation of related algorithms. The computational fire distribution loop model includes the calculation of target distribution line and target distribution loop. This model can realize the effective distribution of air defense fire to targets. This model can guide the analysis of fire superiority and the calculation of automatic fire distribution. Combined with the actual project, good results have been achieved.
KEYWORDS: Data storage, Data communications, Control systems, Analytical research, Telecommunications, Power supplies, RF communications, Data analysis, Computing systems, Telescopes
The shelter vehicle is a common target in the battlefield, it is of great significance to study the damage of trees. We present a target damage tree modeling method for shelter vehicles, including target function and structure analysis, damage level, target damage tree modeling and so on. Through this method, the function and structure of shelter vehicles can be analyzed, their damage level can be determined, and the damage tree model can be established.
According to the needs of engineering support simulation field, this paper proposes a design method of engineering support simulation support software, and realizes the corresponding software based on this method. The method includes engineering support simulation initialization and data receiving module, engineering support equipment simulation module, obstacle setting simulation module, obstacle removal simulation module, motion support simulation module, engineering support simulation data output and recording module. Based on this method, the problem of engineering support simulation can be solved.
KEYWORDS: 3D modeling, Data modeling, Visualization, Analytical research, Software development, Visual process modeling, 3D displays, 3D acquisition, Explosives, Signal attenuation
Ammunition damage effect is an important basis for system simulation and ammunition power analysis. To solve the problem of ammunition damage effect analysis, it is necessary to collect relevant data, model, simulate and analyze ammunition. Based on the theoretical formula and test data, this paper proposes a typical ammunition modeling, power field analysis and damage effect analysis method, and constructs the corresponding typical ammunition damage effect analysis software, which includes database, parametric modeling module, power field analysis module, three dimensional visualization module. Compared with the corresponding test data, the credibility of the method and the availability of the software are verified.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.