CN109344452A - A kind of target vulnerability analysis method - Google Patents

A kind of target vulnerability analysis method Download PDF

Info

Publication number
CN109344452A
CN109344452A CN201811053312.3A CN201811053312A CN109344452A CN 109344452 A CN109344452 A CN 109344452A CN 201811053312 A CN201811053312 A CN 201811053312A CN 109344452 A CN109344452 A CN 109344452A
Authority
CN
China
Prior art keywords
target
component
injure
injures
model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811053312.3A
Other languages
Chinese (zh)
Inventor
舒彬
王玉
王树山
梁振刚
范艺凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhongheng Tianwei Defense Technology Co Ltd
Original Assignee
Beijing Zhongheng Tianwei Defense Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhongheng Tianwei Defense Technology Co Ltd filed Critical Beijing Zhongheng Tianwei Defense Technology Co Ltd
Priority to CN201811053312.3A priority Critical patent/CN109344452A/en
Publication of CN109344452A publication Critical patent/CN109344452A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T17/00Three dimensional [3D] modelling, e.g. data description of 3D objects

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Geometry (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Graphics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of target vulnerability analysis method, detailed processes are as follows: the analysis that function and structure are carried out to determining goal in research establishes target three-dimensional digitalization model, provides object construction tree;Based on target analysis and structure tree, proposition injures grade and recognizes rapid wear/non-easily worn part, establishes and corresponding injures tree;According to the contour structures feature of target, judgement injures member to target typical case's beating position, determines presentation face, by projecting method, establishes target Equivalent model;Component is obtained by theory analysis and numerical simulation and injures data, in conjunction with metamessage is injured, obtains target vulnerability under the conditions of this injures member.Target vulnerability analysis method proposed by the present invention can obtain higher computing efficiency in the case where guaranteeing target vulnerability computational accuracy, injure vulnerability analysis of the member to targets such as vehicle, guided missile and aircrafts suitable for kinetic energy class.

Description

A kind of target vulnerability analysis method
Technical field
The present invention relates to a kind of target vulnerability analysis methods, belong to and injure theory analysis techniques field.
Background technique
It is theoretical with technology scope that target vulnerability belongs to injuring for armament science and technology, and broad object vulnerability is come It says, when referring to that target is under attack, the complexity injured needs to be injured phase after target is avoided to be hit and hit In conjunction with being considered;For narrow sense target vulnerability refer to target in the case where damage factors directly act on, target Damage to injure because The sensibility of element can provide Research on Target for the assessment of warhead damage effects and injure as the core component for injuring assessment Characteristic parameter and vulnerability model structure, basis can be provided for warhead power design injures criterion and criterion information, for force Tactics application and the warfare decision research of device system provide target characteristic data.Vulnerability modeling is the weight of target vulnerability analysis Want one of means, can be used for designing and constructing weapon (ammunition) or warhead range test target effect object, can be injure rule and Damage criterion research provides carrier, can characterize the basic data of vulnerability calculating.The modeling of goal in research vulnerability facilitates letter Change object construction, obtains accurate vulnerability analysis as a result, assessment technology, promotion weapons the reach of science and application are injured in development.
Vulnerability modeling is the basis of target vulnerability analysis, and there are mainly four types of the modeling methods of vulnerability analysis at present: Combine geometric method, Triangular object model method, quadrangle panel method and 3-dimensional digital model machine method.Wherein, combination geometric method is using substantially several Combination between He Ti, such as sphere, cube, cylindrical body and cone describes component, and modeling method is simple, and model accuracy can With control, but when establishing the curved surface or component of some complexity, accuracy is insufficient;Triangular object model method and quadrangle panel method are first used Engineering Modeling software establishes target three-dimensional, then by finite element software, by target shape and component it is discrete be three/tetra- Edged surface member, and the different shape of complexity and component are approached by the fineness of face element, due to the division of finite element software It is a more complicated and cumbersome job, thus this model has also carried out a large amount of simplification to the component of target, and needs Want researcher's specialized capability higher;3-dimensional digital model machine method is usually established using professional 3 d modeling software, and by means of height Equal graphics workstations and large capacity computer, need to consume vast resources.
Shortcomings and deficiencies of the prior art are as follows: most of at present to use finite element in terms of the modeling angle of vulnerability analysis Method establishes three-dimensional vulnerability model using 3 d modeling software, and not yet really establishing a kind of can not only guarantee computational accuracy but also have There is the vulnerability model of higher computing efficiency, to influence the accuracy and computational efficiency of vulnerability analysis result;It establishes more Accurate three-dimensional vulnerability model, needs to consume vast resources, while vulnerability analysis calculating is at high cost, cost is big.
Summary of the invention
It is an object of the invention to propose a kind of target in the case where guaranteeing computational accuracy with higher computing efficiency Vulnerability method injures vulnerability analysis of the member to targets such as vehicle, guided missile and aircrafts suitable for kinetic energy class.
In order to achieve the above object, the present invention uses following technical solution:
A kind of target vulnerability analysis method, detailed process are as follows: point of function and structure is carried out to determining goal in research Analysis, establishes target three-dimensional digitalization model, provides object construction tree;Based on target analysis and structure tree, proposition injures grade simultaneously Rapid wear/non-easily worn part is recognized, establishes and corresponding injures tree;According to the contour structures feature of target, it is right that member is injured in judgement Target typical case's beating position, determines presentation face, by projecting method, establishes target Equivalent model;Pass through theory analysis and numerical value Emulation obtains component and injures data, in conjunction with metamessage is injured, obtains target vulnerability under the conditions of this injures member.
The specific steps for calculating target vulnerability are as follows:
Step 1 carries out function and structural analysis to target, establishes object construction tree and target three-dimensional digitalization model;
Step 2 is based on target analysis and structure tree, and proposition injures grade and recognizes rapid wear/non-easily worn part, establishes target Injure tree;
Step 3, according to the different resemblance of target, judgement injures member to target typical case's beating position, and it is suitable to determine Target Equivalent model is established to each component by projecting method in presentation face;
Step 4 calculates that Vulnerable Area ratio of all parts in each presentation face, that area and equivalent thickness etc. is presented is easy Damage data;
Step 5, establish target injure rule model, for the destruction mechanism of each component, combining target easily worn part number According to table and metamessage is injured, is calculated under the conditions of single piece of kinetic energy class injures member and hits target jth presentation face, i-th component is ruined Hurt probability;
Step 6, calculate more pieces injure member hit target injure probability.
The method proposed by the present invention for establishing vulnerability model according to target difference resemblance, this calculating occupy resource Less, time-consuming short and high-efficient, it can quickly carry out target vulnerability analysis.
The invention proposes a kind of target vulnerability analysis methods, can assess for warhead damage effects and provide Research on Target Characteristic parameter and vulnerability model structure are injured, basis can be provided for warhead power design injures criterion and criterion information, Target characteristic data is provided for tactics application and the warfare decision research of weapon system.
Detailed description of the invention
Fig. 1 is a kind of target vulnerability modeling method basic principle block schematic illustration.
Fig. 2 is that certain tank injures target left view equivalent model under grade.
Fig. 3 is that the target that certain tank is injured under grade overlooks equivalent model.
Fig. 4 is that certain guided missile injures target side view equivalent model under grade.
Fig. 5 is aircraft class target Damage equivalent model orientation diagram.
Specific embodiment
Under conditions of target vulnerability refers to that target is detected, the possibility injured under element interaction is injured in ammunition Property, target vulnerability research is to the design and improvement of raising, the protection of target survival ability, the manipulation of Research on Target and using all It has very important significance.Vulnerability modeling avoids too simple previous vulnerability model or modeling complexity and calculates time-consuming The various characteristics such as longer, can effectively improve the Efficiency and accuracy of vulnerability analysis.
As shown in figure, detailed process of the invention are as follows: the analysis that function and structure are carried out to determining goal in research is built Vertical target three-dimensional digitalization model, provides object construction tree;Based on target analysis and structure tree, proposition is injured grade and is recognized easy Damage/non-easily worn part is established and corresponding injures tree;According to the contour structures feature of target, judgement injures member to target allusion quotation Type beating position, determines presentation face, by projecting method, establishes target Equivalent model;It is obtained by theory analysis and numerical simulation It obtains component and injures data, in conjunction with metamessage is injured, obtain target vulnerability under the conditions of this injures member.
With reference to the accompanying drawing, the invention will be further described.
Step 1 carries out function and structural analysis to target, establishes object construction tree and target three-dimensional digitalization model;
Step 2 is based on target analysis and structure tree, and proposition injures grade and recognizes rapid wear/non-easily worn part, establishes target Injure tree;
Step 3, according to the different resemblance of target, judgement injures member to target typical case's beating position, and it is suitable to determine Target Equivalent model is established to each component by projecting method in presentation face;
Step 4 calculates rapid wear data of all parts in each presentation face;
Step 5, establish target injure rule model, for the destruction mechanism of each component, combining target easily worn part number According to table and metamessage is injured, is calculated under the conditions of single piece of kinetic energy class injures member and hits target jth presentation face, i-th component is ruined Hurt probability;
Step 6, calculate more pieces injure member hit target injure probability.
Preferably, in the step 3:
The target more regular for vehicle class shape, according to member is injured to the beating position of target, respectively it is upper and lower, Left and right, front and rear six direction establishes presentation face, obtains the equivalent model on six views.
It is the target of revolving body for guided missile class shape, side view and front view two head-on along shaft section projection The progress of presentation face is equivalent, establishes target Equivalent model.
Target is established along 26 direction of attack respectively and is presented by irregular for aircraft class shape and asymmetric target Target Equivalent model is established in face.
As shown in Figure 5, illustrate the orientation for establishing aircraft class target Damage equivalent model, ray PO can be by injuring in figure First direction is indicated relative to the pitch angle (E) and azimuth (A) of aircraft global coordinate.By direction of attack PO to XOY plane It is projected as CO, azimuth A is defined as the angle (0~360 degree) that X-axis is rotated in XOY plane, and pitch angle E is defined as CO and goes to PO The angle (- 90~+90 degree) passed through, the direction of firing line attack aircraft is as shown in table 1.
1 26 standard attacks directions of aircraft class target of table (unit: degree)
In the step 4, the rapid wear data include Vulnerable Area ratio, area and equivalent thickness are presented.
It calculates Vulnerable Area ratio of all parts in each view, the rapid wears data such as area and equivalent thickness is presented Method specifically includes:
The geometric parameters such as the positions and dimensions of target all parts are shown in equivalent model, due to equivalent model use with Target 1:1 mode is established, and is calculated each direction equivalent model and is injured the Vulnerable Area ratio of component and area is presented.
Determine that missile target injures component equivalent target thickness respectively using ballistic limit penetration speed method, equivalent target thickness Determination should consider it is equivalent between different materials, it is also contemplated that interval material between it is equivalent injure equivalent target model, from And calculate the equivalent thickness for injuring component.
Easily worn part is arranged in data such as the presentation area in each presentation face, Vulnerable Area ratio, material and equivalent thickness, Easily worn part is edited into injure in tables of data.
Equivalent data treating method is injured for critical component overlapping: overlapping region and non-overlap area to critical component Domain is respectively calculated.The presentation area of overlapping region is overlapping region area, and equivalent thickness is to respectively correspond overlay region Critical component equivalent thickness it is cumulative, meanwhile, the presentation area in non-overlap area should remove overlay region area and be calculated again.
Specifically, it in the step 5, calculates under the conditions of single piece of kinetic energy class injures member and hits target jth presentation face, i-th A component injures probability PK/h (i, j)Method is as follows:
Component injures probability: injuring member for kinetic energy class, bonded block injures data, is hitting using following formula calculating The degree of injury of situation lower component, obtain component injures probability.Member, which is injured, in single piece of kinetic energy class hits target jth presentation noodles Under part, i-th component injures probability PK/h (i, j)
PK/h (i, j)=PH (i, j)·(AV (i, j)/AP (i, j))·pc(k) (1)
P in formulaH (i, j)It is general in the hit that single piece of kinetic energy class injures i-th of component under the conditions of member hits target jth presentation face Rate, AV (i, j)The Vulnerable Area in face, A is presented in jth for i-th of componentP (i, j)The presentation face in face is presented in jth for i-th of component Product, pc(k) probability is injured to injure member i-th of component critical position component of hit, k is to injure first power parameter.
In the step 6, calculate more pieces injure that member hits target to injure probabilistic method as follows:
Injure first hit system for more pieces and injure probability calculation: bonded block injures the calculated result of probability, according to structure tree Analyze result and carry out logical operation, obtain it is each injure system under grade injure probability, finally calculate more pieces and injure member and beat Hit it is lower it is all injure the i.e. target of component injure probability PK/H
A indicates the number of the corresponding irredundant component for injuring grade in formula,Member, which is injured, for n pieces hits target condition Under, i-th component injures probability, and m indicates the corresponding species number for injuring the redundant component under grade, bmIndicate m-th of redundancy The redundancy number of component.
The present invention proposes the corresponding simplified object construction of one kind, increases operation for the target of different resemblances Rate and the modeling method for increasing vulnerability calculated result accuracy illustrate that equivalent data is injured in calculating based on this method, in conjunction with The destruction mechanism of different components and metamessage is injured, so that target vulnerability is calculated, under the same conditions, PK/HIt is worth higher, target It is easier to injure.
The present invention, for research object, is based on specific modeling method, passes through building with targets such as vehicle, guided missile and aircraft etc. Various object modules, and by analytic methods such as theory analysis and simulation calculations, obtain target vulnerability result and conclusion.
In conclusion the above is merely preferred embodiments of the present invention, being not intended to limit the scope of the present invention. All within the spirits and principles of the present invention, made any modification, equivalent substitute, improvement etc., should be included in of the invention Within protection scope.

Claims (7)

1. a kind of target vulnerability analysis method, which is characterized in that detailed process are as follows:
Step 1, function and structural analysis are carried out to target, establishes object construction tree and target three-dimensional digitalization model;
Step 2, it is based on target analysis and structure tree, proposition injures grade and recognizes rapid wear/non-easily worn part, establishes target Damage Tree;
Step 3, the resemblance different according to target, judgement injure member to target typical case's beating position, determine suitable present Target Equivalent model is established to each component by projecting method in face;
Step 4, it calculates Vulnerable Area ratio of all parts in each presentation face, the rapid wears number such as area and equivalent thickness is presented According to;
Step 5, that establishes target injures rule model, for the destruction mechanism of each component, combining target easily worn part tables of data And metamessage is injured, it calculates under the conditions of single piece of kinetic energy class injures member and hits target jth presentation face, injuring for i-th component is general Rate;
Step 6, calculate more pieces injure member hit target injure probability.
2. target vulnerability analysis method according to claim 1, which is characterized in that establish target Equivalent in the step 3 The process of model are as follows:
The target more regular for vehicle class shape, according to member is injured to the beating position of target, respectively it is upper and lower, left, Right, front and rear six direction establishes presentation face, obtains the equivalent model on six views.
3. target vulnerability analysis method according to claim 1, which is characterized in that establish target Equivalent in the step 3 The process of model are as follows:
It is the target of revolving body for guided missile class shape, is presented along the side view and front view two head-on of shaft section projection Face progress is equivalent, establishes target Equivalent model.
4. target vulnerability analysis method according to claim 1, which is characterized in that establish target Equivalent in the step 3 The process of model are as follows:
Target is established presentation face along 26 direction of attack respectively, built by irregular for aircraft class shape and asymmetric target Vertical target Equivalent model.
5. according to Claims 2 or 3 or the 4 target vulnerability analysis methods, which is characterized in that the component rapid wear data, It is Vulnerable Area ratio of the component in the presentation face, and area and equivalent thickness is presented.
6. target vulnerability analysis method according to claim 1, which is characterized in that in the step 5, calculate dynamic at single piece Can class injure under the conditions of member hits target jth presentation face, i-th component injures probability PK/h (i, j)Method is as follows:
PK/h (i, j)=PH (i, j)·(AV (i, j)/AP (i, j))·pc(k)
P in formulaH (i, j)The hit probability of i-th of component under the conditions of member hits target jth presentation face is injured in single piece of kinetic energy class, AV (i, j)The Vulnerable Area in face, A is presented in jth for i-th of componentP (i, j)The presentation area in face is presented in jth for i-th of component, pc(k) probability is injured to injure member i-th of component critical position component of hit, k is to injure first power parameter.
7. target vulnerability analysis method according to claim 6, which is characterized in that calculate more pieces and injure what member was hit target It is as follows to injure probabilistic method: bonded block injures the calculated result of probability, carries out logical operation according to structure tree analysis result, obtains To it is each injure system under grade injure probability, finally calculate more pieces and injure all i.e. targets of component of injuring under member strike Injure probability PK/H,
A indicates the number of the corresponding irredundant component for injuring grade in formula,It is injured under the conditions of member hits target for n pieces, i-th A component injures probability, and m indicates the corresponding species number for injuring the redundant component under grade, bmIndicate m-th of redundant component Redundancy number.
CN201811053312.3A 2018-09-11 2018-09-11 A kind of target vulnerability analysis method Pending CN109344452A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811053312.3A CN109344452A (en) 2018-09-11 2018-09-11 A kind of target vulnerability analysis method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811053312.3A CN109344452A (en) 2018-09-11 2018-09-11 A kind of target vulnerability analysis method

Publications (1)

Publication Number Publication Date
CN109344452A true CN109344452A (en) 2019-02-15

Family

ID=65304819

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811053312.3A Pending CN109344452A (en) 2018-09-11 2018-09-11 A kind of target vulnerability analysis method

Country Status (1)

Country Link
CN (1) CN109344452A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110705032A (en) * 2019-09-07 2020-01-17 沈阳理工大学 Rapid modeling method for target vulnerability model of armored vehicle
CN112685843A (en) * 2021-02-04 2021-04-20 中国人民解放军63863部队 Construction method of vulnerability model of typical armed helicopter
CN112685842A (en) * 2021-02-04 2021-04-20 中国人民解放军63863部队 Method for establishing damage criterion of target typical key components
CN112800536A (en) * 2021-01-12 2021-05-14 河海大学 Method for establishing special vehicle damage model and analyzing damage
CN113868759A (en) * 2021-09-10 2021-12-31 中国兵器科学研究院 Method, device, equipment and medium for establishing shelter vehicle equivalent model
CN113987833A (en) * 2021-11-12 2022-01-28 中国人民解放军国防科技大学 Vulnerability analysis method for concrete gravity dam target
CN114048637A (en) * 2022-01-11 2022-02-15 中国人民解放军96901部队 Meta-normal-form-based rapid target damage calculation method
CN114117850A (en) * 2021-11-12 2022-03-01 中国人民解放军国防科技大学 Method for analyzing vulnerability of frame building
CN114818471A (en) * 2022-03-28 2022-07-29 北京航天飞腾装备技术有限责任公司 Damage probability calculation method based on machine learning neural network
CN115984590A (en) * 2022-12-27 2023-04-18 中船重工奥蓝托无锡软件技术有限公司 Target vulnerability assessment method and device based on image recognition and electronic equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104143028A (en) * 2014-08-12 2014-11-12 中国人民解放军装甲兵工程学院 Armored equipment damage rule analysis method based on simulation experiment

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104143028A (en) * 2014-08-12 2014-11-12 中国人民解放军装甲兵工程学院 Armored equipment damage rule analysis method based on simulation experiment

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
"典型坦克在破甲弹作用下的易损性评估", pages 032 - 200 *
"导弹目标在破片式战斗部作用下的易损性评估" *
司凯: "破片式战斗部对飞机类目标毁伤评估方法研究", pages 52 - 57 *
吴旭辉: "飞机类目标易损性数据库软件设计" *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110705032A (en) * 2019-09-07 2020-01-17 沈阳理工大学 Rapid modeling method for target vulnerability model of armored vehicle
CN110705032B (en) * 2019-09-07 2023-06-16 沈阳理工大学 Rapid modeling method for armored vehicle target vulnerability model
CN112800536A (en) * 2021-01-12 2021-05-14 河海大学 Method for establishing special vehicle damage model and analyzing damage
CN112685842B (en) * 2021-02-04 2022-11-22 中国人民解放军63863部队 Method for establishing damage criterion of target typical key components
CN112685843A (en) * 2021-02-04 2021-04-20 中国人民解放军63863部队 Construction method of vulnerability model of typical armed helicopter
CN112685842A (en) * 2021-02-04 2021-04-20 中国人民解放军63863部队 Method for establishing damage criterion of target typical key components
CN113868759A (en) * 2021-09-10 2021-12-31 中国兵器科学研究院 Method, device, equipment and medium for establishing shelter vehicle equivalent model
CN113987833A (en) * 2021-11-12 2022-01-28 中国人民解放军国防科技大学 Vulnerability analysis method for concrete gravity dam target
CN114117850A (en) * 2021-11-12 2022-03-01 中国人民解放军国防科技大学 Method for analyzing vulnerability of frame building
CN113987833B (en) * 2021-11-12 2024-06-07 中国人民解放军国防科技大学 Vulnerability analysis method for concrete gravity dam target
CN114048637A (en) * 2022-01-11 2022-02-15 中国人民解放军96901部队 Meta-normal-form-based rapid target damage calculation method
CN114048637B (en) * 2022-01-11 2022-04-08 中国人民解放军96901部队 Meta-normal-form-based rapid target damage calculation method
CN114818471A (en) * 2022-03-28 2022-07-29 北京航天飞腾装备技术有限责任公司 Damage probability calculation method based on machine learning neural network
CN115984590A (en) * 2022-12-27 2023-04-18 中船重工奥蓝托无锡软件技术有限公司 Target vulnerability assessment method and device based on image recognition and electronic equipment
CN115984590B (en) * 2022-12-27 2023-07-14 中船奥蓝托无锡软件技术有限公司 Target vulnerability assessment method and device based on image recognition and electronic equipment

Similar Documents

Publication Publication Date Title
CN109344452A (en) A kind of target vulnerability analysis method
CN104143028B (en) Armored equipment damage rule analysis method based on simulation experiment
CN104156507B (en) Method used for vulnerability sorting of aircraft components
CN105740557B (en) A kind of intensive scattering velocity capabilities method
Wen et al. Modeling on the shock wave in spheres hypervelocity impact on flat plates
Cenko Store separation lessons learned during the last 30 years
CN109063331B (en) Evaluation method for damage effect of small off-target fragment warhead on reentry warhead
CN105069245A (en) Multiple-searching technology based three-dimensional wave-rider rapid design method
Xu et al. Application of situation function in air combat differential games
CN108694281A (en) A kind of target damage probability computational methods based on multidimensional angle fragment spatial distribution penetration
CN116858039A (en) Hypersonic aircraft game guidance method, system, equipment and medium
Sakong et al. Determination of impact fragments from particle analysis via smoothed particle hydrodynamics and k-means clustering
Lomazzi et al. Vulnerability assessment to projectiles: Approach definition and application to helicopter platforms
CN110390141A (en) A kind of torpedo firing parameter general-purpose computations and analysis method
CN110991059A (en) Runway failure rate analysis and calculation method based on Weili ring cutting method
CN114580094A (en) Bird collision damage engineering prediction method for rotation state of metal blade
Welterlen et al. Application of viscous, Cartesian CFD to aircraft stores carriage and separation simulation
CN116415518A (en) WENO-based high-resolution high-precision shock wave intermittent capturing method
You et al. Distributed synergetic guidance law for multiple missiles with angle-of-attack constraint
Wen et al. Defence Technology
Peng et al. Terminal attitude selection method of missile attack aircraft
O’Brien et al. Effects of targeting pod modification on F/A-18C Hornet weapons release
CN109992817B (en) Method for judging intersection of missile and target and terminal equipment
CN115345035B (en) Optimization method for aiming point of body target multidirectional striking space
Yang et al. Method for assessing vulnerability of aircraft to spray fragments of missile

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Shu Bin

Inventor after: Wang Yu

Inventor after: Wang Shushan

Inventor after: Liang Zhengang

Inventor after: Fan Yikai

Inventor after: Ma Xiaole

Inventor after: Wang Wenze

Inventor after: Wei Xiangyuan

Inventor before: Shu Bin

Inventor before: Wang Yu

Inventor before: Wang Shushan

Inventor before: Liang Zhengang

Inventor before: Fan Yikai

WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190215