13 July 2019, Volume 37 Issue 13
    

  • Select all
    |
    Exclusive: System of Systems Engineering
  • ZHAO Guohong
    Science & Technology Review. 2019, 37(13): 6-13. https://doi.org/10.3981/j.issn.1000-7857.2019.13.001
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    This thesis explains the connotation and major features of battle management system and analyzes co-relationships among related notions. A generation-division method for battle management systems is presented. Some typical battle management systems are described. The development motivation and requirement of battle management system, architecture design, and organizing principle and method are sorted, as well as means of management on forces, resources, actions, battlefield knowledge and energy. Finally, the related key technologies are addressed.
  • YANG Dongsheng, JIANG Jun
    Science & Technology Review. 2019, 37(13): 14-22. https://doi.org/10.3981/j.issn.1000-7857.2019.13.002
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    Maritime composite formation (MCF) is the main combat force of future, and combat command information architecture construction (CCIAC) is important to support system combat capability formation. This paper clarifies combat command activity characteristics and information requirements, and provides a basic combat command pattern and function mechanism of MCF on the basis and environment of CCIAC of MCF. Then it presents a construction theory and method for command information architecture, and the main idea is all elements of combat command information system of systems should focus on actions and converge to the command and control of MCF, so as to sustain the multi-loop nested command pattern of MCF and meet the needs of information and decision, and shape relative superiorities of MCF including information superiority, decision superiority and action superiority.
  • LIU Zhaopeng, SI Guangya, TANG Yubo, LIU Shaojun
    Science & Technology Review. 2019, 37(13): 23-31. https://doi.org/10.3981/j.issn.1000-7857.2019.13.003
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    Aimed at the resource scheduling in joint operation planning, a reactive scheduling framework based on resource flow is proposed. To tackle the time uncertainty in the scheduling process, a method of fuzzy number modeling is proposed. To deal with the resource uncertainty in the scheduling process, a resource competition method based on double priority is proposed, and the global optimal solution is searched by genetic algorithm. For the problem of mission uncertainty, a reactive robust strategy model is designed. The validity of the model is verified by experiments.
  • JIAN Ping, XIONG Wei, GUO Lin
    Science & Technology Review. 2019, 37(13): 32-39. https://doi.org/10.3981/j.issn.1000-7857.2019.13.004
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    Networking information-centric system-of-systems (NISoS), as a new concept in recent years,features diversified networking methods, complex heterogeneous topology, constant information exchange and vulnerable to network attacks and emergency. On the basis of concept and features of NISoS, the paper adds service and security factors to the combat from a system perspective and proposes a modeling framework and design method for the networking information-centric system-of-systems in terms of multiple views, and constructs a typical NISoS top-level architecture model. The paper offers a necessary reference to the top-level design and safe development of the networking information-centric system-of-systems.
  • WEI Zhengxian, SONG Min, TONG Pengpeng, WANG Hongbin
    Science & Technology Review. 2019, 37(13): 40-46. https://doi.org/10.3981/j.issn.1000-7857.2019.13.005
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    When the system-of-systems (SoS) carries out its missions, it faces various risks of destruction, interference or threat from outside and inside. SoS flow vulnerability is expressed as the degree of impact of mission execution efficiency when a risk event occurs on the SoS flow. In this paper, a method for SoS flow vulnerability analysis based on information entropy is proposed. Firstly, for the risk events and flow structure characteristics, a vulnerability analysis process model is established. Secondly, the SoS flow is transformed into a directed graph model, and a vulnerability calculation model of node in the SoS flow is put forward based on information entropy. Thirdly, the directed graph model of complex SoS flow is decomposed and further simplified to three basic structures:series structure, parallel structure and combination structure, and vulnerability calculation models of these basic structures are also built. Finally, the SoS flow vulnerability can be calculated through the above process. A case study demonstrates the effectiveness of the proposed method.
  • GAO Jie, SHA Enlai, XIE Zheng, WANG Zheng
    Science & Technology Review. 2019, 37(13): 47-52. https://doi.org/10.3981/j.issn.1000-7857.2019.13.006
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    An active control technique using blowing method at the tail of aircraft carrier is presented to mitigate the effect of cock wake caused by deck wind on carrier-based aircraft. Computational fluid dynamics is used to calculate the characteristics of the CVN-73 carrier wake field. When the deck wind angle is zero, a comparative study is carried out under working conditions with and without active control technology, respectively, and the effect of blowing angle on the flow field is also analyzed. The result shows that with the increase of blowing angle, the inhibition effect of control technology on downwash in the wake field increases first and then decreases. When the blowing angle is 30 or 45 degrees, the inhibition effect is the most obvious, and the maximum downwash speed can be reduced to half. In conclusion, the active control technique using blowing method can improve the cock wake environment and increase landing safety of carrier-based aircraft.
  • ZHAO Xuejun, DONG Yuhao, YUAN Xiujiu, BAO Zhuangzhuang, LI Jialin, LIANG Xiaolong
    Science & Technology Review. 2019, 37(13): 53-58. https://doi.org/10.3981/j.issn.1000-7857.2019.13.007
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    Aiming at route planning of UAV cluster under various threats, this paper proposes a cluster control method and periodic bilevel optimization algorithm. Based on a fixed-point arrival mission, a cluster dynamic control model is constructed by combining d-norm, impact function and inverse function, which can realize Reynolds rules. A periodic bilevel optimization algorithm is designed to solve the route planning problem of central UAV. Eeffectiveness of the model and feasibility of the optimization algorithm are verified by simulation examples. Compared with the hybrid genetic algorithm ie. artificial potential field algorithm, the periodic bilevel optimization algorithm has a higher efficiency and better optimization effect.
  • GAO Fei, DU Liang, DU Zhiwei, MENG Wengong
    Science & Technology Review. 2019, 37(13): 59-65. https://doi.org/10.3981/j.issn.1000-7857.2019.13.008
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    In order to maintain the stochastic stability of flight control system of UAV, two Markov processes are used to model both GNSS system fault and integrity monitoring process. The relation between system noises and time to alert (TTA) of GNSS integrity monitor is studied, and a method to obtain the appropriate range of TTA is proposed.
  • CUI Shanshan, CUI Yuwei
    Science & Technology Review. 2019, 37(13): 66-69. https://doi.org/10.3981/j.issn.1000-7857.2019.13.009
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    The paper sorts out the basic process of multiple batches and multiple flights in the airport. In view of all kinds of influence factors of the safeguard work process, the paper defines the constraint conditions and optimization objectives for the optimization of airport security resource allocation, classifies the constraint conditions according to their characteristics, and constructs a mathematical model of airport security resource allocation.
  • HU Chujun, AN Qianglin, WANG Xiaocheng
    Science & Technology Review. 2019, 37(13): 70-75. https://doi.org/10.3981/j.issn.1000-7857.2019.13.010
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    In this paper, a new model for calculating shipboard helicopter's landing operating envelope at forward fight condition is established by means of the momentum-source CFD method. In the new model, unsteady Euler equations in inertial coordinate system are used as governing equations, finite volume method (FVM) is employed in spatial discretization, and a five-stage Runge-Kutta explicit time iteration algorithm is adopted in temporal discretization, which all can help well simulate the rotor/fuselage/ship coupled aerodynamic characteristics in a complex turbulent flowfield environment during landing on the ship. To improve efficiency significantly, momentumsource model is chosen to represent the effect of rotor on its flowfield. In addition, the helicopter's trim calculation is also considered determine the operating envelope. Then, a Helicopter UH-60 is selected as the research object, and the wind azimuths of 0, 60 and 300 degrees are chosen for trim calculations. By using the available test data, the capability of the present trim method combined with CFD model is examined. With this method, the sample helicopter's landing operating envelope is calculated based on the judging criteria determined by the main rotor and tail rotor's control, helicopter's attitude angle and required power. Results show that the present method is suitable for determining shipboard helicopter's landing operating envelope.
  • SUN Haoxiang, CHEN Changxing, CHI Wensheng, LING Yunfei
    Science & Technology Review. 2019, 37(13): 76-82. https://doi.org/10.3981/j.issn.1000-7857.2019.13.011
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    In the spectrum sensing process, cooperative sensing method is to fuse the sensing results of multiple nodes in space to eliminate the influence of path shadow and deep fading and effectively improve accuracy and reliability of results. In order to ensure that the detection probability and the false alarm probability of the fusion result reach the standard, the cooperative decision criterion based on weighted fusion needs to make the perceptual result of each node reach the corresponding standard. Therefore, this paper proposes a method to set an appropriate perceptual threshold for each perceptual node to achieve optimization. Firstly, the analysis of each sensory node can obtain the relationship between the threshold and node weight under the condition of fixed detection probability and false alarm probability. Secondly, using the genetic algorithm, the weight is optimized to realize the weight optimization, the adaptive optimization process of perceptual threshold optimization. Finally, simulation results show that the proposed method can efficiently and accurately realize adaptive optimization of sensing threshold, thus ensuring the actual performance of cooperative spectrum sensing.
  • ZHU Liang, LI Bo
    Science & Technology Review. 2019, 37(13): 83-87. https://doi.org/10.3981/j.issn.1000-7857.2019.13.012
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    In whichever jamming mode, the jamming effect of spaceborne SAR mainly lies on the similarity between jamming signal and spaceborne SAR echo, namely signal structure and character of similarity between the two. In this paper, an active jamming method for spaceborne SAR based on the scattering statistical characteristics (SSC) is proposed. The mathematical mode of clutter-like signal used for jamming spaceborne SAR is constructed, the scattering statistics characteristic similarity between spaceborne SAR echo and this jamming signal is analyzed and simulated. Results show that this method has a better interference effect under the same jamming signal ratio and a better application prospect.
  • CHEN Jianhua, MU Xihui, DU Fengpo, HE Yi, CUI Donghua
    Science & Technology Review. 2019, 37(13): 88-92. https://doi.org/10.3981/j.issn.1000-7857.2019.13.013
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    To improve the lower limb exoskeleton moving effect, an impedance self-adjusted control method by gait classification for support phase is presented, and a comparative analysis between traditional position control method and constant impedance control methods and the impedance self-adjusted control method is experimentally conducted by setting up an indicator system based on radar maps and evaluating the moving effects of different control methods during the support phase. Results show that the impedance self-adjusted control method can meet different sports needs at different stages of the supporting phase, which has optimal overall motion effect compared with the traditional impedance control method.
  • LIU Xubo, LIU Jingshu, LIU Bin, Qin Lingling, CHEN Tao
    Science & Technology Review. 2019, 37(13): 93-97. https://doi.org/10.3981/j.issn.1000-7857.2019.13.014
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    In modern warfare, the radar electronic warfare environment is more and more complicated. With the variety of radar types and the complexity of radar inter-pulse modulation, the difficulty in identifying signal sorting is increasing. This paper proposes a random forest algorithm to sort the characteristics of pulse descriptors, which can daptively select features and achieve classification. Random forest can make the error balance of unbalanced data. Meanwhile through the multi-decision tree voting method, it can quickly complete the rapid training of large amounts of data. In the case of a pulse loss, the recognition accuracy can still be maintained. Experimental results show that the proposed method is effective in presorting radar pulse descriptors.
  • SONG Min, JU Yang, WEI Zhengxian
    Science & Technology Review. 2019, 37(13): 98-103. https://doi.org/10.3981/j.issn.1000-7857.2019.13.015
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    Internetware is the software system in which various components in open and independent forms implement cross-network interconnections, intercommunications and collaborations in various collaborative methods. Dynamic evolution is an important characteristic of internetware and would lead to system failure when it occurs. So reliability analysis of internetware oriented dynamic evolution is one of the hot research topics. Firstly, the protocol relations of interaction at the interfaces between components and dynamic evolution error propagation reachability of internetware are analyzed, and a generation model of error propagation reachability graph is established. Secondly, in order to solve the problem of state space "explosion", a Markov state transition graph is generated from the error propagation reachability graph, and a Markov-based reliability analysis method for internetware oriented dynamic evolution is proposed. Finally, a case study demonstrates the effectiveness of the proposed method.
  • YIN Huaizhi, XU Songlin, WANG Junyan
    Science & Technology Review. 2019, 37(13): 104-108. https://doi.org/10.3981/j.issn.1000-7857.2019.13.016
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    The high energy characteristic of high energy propelled system makes the fighting efficiency of missile weapons stronger but also more dangerous to use and sustain. The nitrate ester polyether propellant and propelled systems of missiles and rockets using NEPE are generalized. Safety accidents of missiles and rockets in recent years are reviewed briefly. Technique preparation of certain rocket with high energy propelled system is introduced. Hazard source identification on technical preparation of high energy propelled vehicle is studied by PHA method, and the disposal measures are suggested a. The research can provide a technical support for the test of high energy propelled vehicle test in test range.
  • ZHANG Jia, YANG Hongyi, LIU Yizhe
    Science & Technology Review. 2019, 37(13): 117-123. https://doi.org/10.3981/j.issn.1000-7857.2019.13.018
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    This paper introduces the concept of DoDAF based on the definition of architecture, discusses the advantages of DoDAF 2.0, explains the meanings of 52 models in 8 viewpoints of DoDAF 2.0, and analyzes the principles and steps of architecture development under DoDAF 2.0. Then it briefly analyzes the application fields of DoDAF 2.0, and explains the operational viewpoint (OV) and system viewpoint (SV) by taking weapons and equipment requirement analysis as an example. Through comprehensive review and analysis, the paper provides a reference for application of DoDAF 2.0 in different fields.
  • HU Ping, LIU Kai, QIAN Chao, GU Xuefeng
    Science & Technology Review. 2019, 37(13): 124-128. https://doi.org/10.3981/j.issn.1000-7857.2019.13.019
    Abstract ( ) Download PDF ( ) HTML   Knowledge map   Save
    Vietnam has been equipped with Kilo class submarine, which is one of the best silent conventional power submarines in the world, and its "Club-S" submarine-launched anti-ship missile has advanced performance. In this paper, the performance, characteristics and working process of the missile are analyzed, and the anti-submarine and anti-missile capabilities of American aircraft carrier formation are also analyzed, with an emphasis on the anti-missile mode of operation. Since the anti-submarine and anti-missile operational capabilities and tactical application of the US carrier formation are typical representative and referential, we hope this[paper can provide important support for the theoretical research and practical operation of our naval carrier formation in dealing with the threat of submarinelaunched anti-ship missiles.