CN112764429A - Fire interception threat assessment method and device for unmanned aerial vehicle cluster defense - Google Patents

Fire interception threat assessment method and device for unmanned aerial vehicle cluster defense Download PDF

Info

Publication number
CN112764429A
CN112764429A CN202110084994.XA CN202110084994A CN112764429A CN 112764429 A CN112764429 A CN 112764429A CN 202110084994 A CN202110084994 A CN 202110084994A CN 112764429 A CN112764429 A CN 112764429A
Authority
CN
China
Prior art keywords
unmanned aerial
air defense
aerial vehicle
interception
weapon system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110084994.XA
Other languages
Chinese (zh)
Inventor
王广学
杨华兵
刘剑豪
何缓
彭世蕤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Air Force Early Warning Academy
Original Assignee
Air Force Early Warning Academy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Air Force Early Warning Academy filed Critical Air Force Early Warning Academy
Priority to CN202110084994.XA priority Critical patent/CN112764429A/en
Publication of CN112764429A publication Critical patent/CN112764429A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05DSYSTEMS FOR CONTROLLING OR REGULATING NON-ELECTRIC VARIABLES
    • G05D1/00Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
    • G05D1/10Simultaneous control of position or course in three dimensions
    • G05D1/101Simultaneous control of position or course in three dimensions specially adapted for aircraft
    • G05D1/104Simultaneous control of position or course in three dimensions specially adapted for aircraft involving a plurality of aircrafts, e.g. formation flying

Landscapes

  • Engineering & Computer Science (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Aiming, Guidance, Guns With A Light Source, Armor, Camouflage, And Targets (AREA)

Abstract

The invention discloses a fire interception threat assessment method and a device for unmanned aerial vehicle cluster fire prevention, wherein the method comprises the following steps: receiving the sudden flight path setting of the unmanned aerial vehicle cluster, and determining the parameters of the unmanned aerial vehicle cluster; determining interception performance parameters of the air defense weapon system; distributing firepower of each air defense weapon system at different moments when the unmanned aerial vehicle cluster suddenly prevents and attacks according to a preset firepower distribution principle based on the parameters to obtain firepower attack mapping relations between the unmanned aerial vehicle cluster and the air defense weapon systems at different moments; calculating the number of remaining airplanes of the unmanned aerial vehicles of each batch at the corresponding moment under the fire protection interception according to the mapping relation; sending the number of the remaining airplanes at the sudden prevention ending moment into a preset evaluation model for calculation to obtain the average damage probability of the unmanned aerial vehicle completing the sudden prevention flight path; the method can accurately analyze the condition that the unmanned aerial vehicle is intercepted under the networking interception condition of the air defense system, and provides good support for the subsequent optimal regulation of the break-through flight path of the unmanned aerial vehicle or the deployment regulation of the air defense weapon system.

Description

Fire interception threat assessment method and device for unmanned aerial vehicle cluster defense
Technical Field
The invention relates to the technical field of unmanned aerial vehicles, in particular to a method and a device for evaluating firepower interception threats of unmanned aerial vehicle cluster defense outburst.
Background
With the continuous progress of the air defense weapon system, the fire interception of various air defense weapon systems is inevitable in the air defense process of the unmanned aerial vehicle, and accurate and reliable fire interception threat assessment is the key for optimizing the air defense path and improving the success probability of the air defense.
At present, in the process of planning a fire protection air route, two types of processing modes are mainly used for the fire interception threat: the method comprises the steps of performing a terrain equivalence method based on killing range analysis, and performing a damage probability modeling analysis method based on residence time.
The terrain equivalence method based on the damage range analysis generates a terrain bump with the same coverage space as the damage range through calculation and analysis of the damage range of the air defense weapon system, and on the basis, the firepower interception threat of the air-ground missile weapon is equivalent to the collision threat caused by the terrain bump.
The damage probability modeling analysis method based on the residence time firstly calculates the residence time of the penetration aircraft in the killing range of the air defense weapon system according to the penetration route, then obtains the impact times of the air defense weapon system according to the residence time, further carries out modeling calculation on the damage probability of the unmanned aerial vehicle under firepower interception according to the impact times, and takes the calculation result as the firepower interception threat evaluation result.
In the two firepower interception threat assessment processing methods, the firepower interception threat is equivalent to the terrain threat by a terrain equivalence method based on the killing range analysis. However, the terrain threat and the fire threat are fundamentally different, the terrain threat needs to be avoided in the penetration flight path planning, otherwise, the penetration aircraft must be crashed, the fire threat is only avoided as much as possible in the penetration flight path planning, the fire killing range sometimes needs to be forcibly penetrated for completing the combat mission, at the moment, if the penetration fire interception threat assessment is carried out by adopting a terrain equivalent method, the assessment result is that the penetration aircraft is intercepted and destroyed, and in practice, the penetration aircraft still has the possibility of penetration success by adopting a reasonable penetration strategy. Therefore, fire interception threat assessment by adopting a terrain equivalent method can cause the planning adjustment of the defense route to be limited and even cause the route planning to fail.
The damage probability modeling analysis method based on the residence time treats the penetration aircraft and the ground-to-air missile weapon system as isolated individuals, defines the attacked damage probability of the single penetration aircraft as a firepower interception threat assessment index, constructs a damage probability model of the penetration aircraft based on the residence time of the penetration aircraft in the killing range of the ground-to-air missile weapon system, and calculates the damage probability index of the penetration aircraft under the ground-to-air missile firepower interception. However, under the environment condition of the modern battlefield, in order to improve the success probability of the penetration of unmanned aerial vehicles, multiple batches of unmanned aerial vehicles are increasingly common in cooperation with penetration, and the damage probability of a single penetration aircraft obviously cannot accurately describe the fire interception threat to the whole penetration cluster under the background. Meanwhile, in order to improve the anti-saturation attack capability of the air defense system, networking interception of a plurality of ground-to-air missile weapon systems gradually becomes a mainstream operation style of air defense operation, and at the moment, factors such as a fire cooperative distribution principle of the air defense system, the number of target channels, the number of reserve missiles, the interception precision, the interception response time, the batch and the number of racks of the air defense unmanned aerial vehicles have important influence on the damage probability of the air defense cluster. Therefore, the accurate analysis of the damage probability of the penetration machine group under the networking interception condition of the air defense system can not be realized by only depending on the residence time, so that the difficulty is brought to the subsequent optimization and adjustment of the penetration flight path, and the provision of the penetration success probability of the unmanned aerial vehicle or the development of the penetration combat training of the unmanned aerial vehicle can not be favorably realized.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
The invention mainly aims to provide a fire interception threat assessment method and a fire interception threat assessment device for unmanned aerial vehicle cluster defense, and aims to solve the technical problem that due to the fact that interception threats suffered in the unmanned aerial vehicle defense process cannot be accurately analyzed under the networking interception condition of the existing air defense system, subsequent defense path optimization and adjustment are difficult. .
The fire interception threat assessment method for the unmanned aerial vehicle cluster defense includes the following steps:
receiving a sudden defense track setting operation of an unmanned aerial vehicle cluster;
determining the cluster number of the unmanned aerial vehicle cluster, the initial unmanned machine frame number of each batch of the unmanned aerial vehicle cluster and the speed of the unmanned aerial vehicle cluster;
receiving a deployment setup operation for an air defense weapons system;
determining interception performance parameters of an air defense weapon system, wherein the interception performance parameters at least comprise a deployment position, an interception range, interception precision, a target channel number, an intercepted projectile flying speed, a loading quantity and a standby projectile quantity;
traversing each batch of unmanned aerial vehicle cluster, calculating the relative distance between the traversed target unmanned aerial vehicle cluster and the air defense weapon systems at different positions in real time, and taking the air defense weapon system with the shortest relative distance with the target unmanned aerial vehicle cluster as the target air defense weapon system;
calculating the interception time of the target air defense weapon system to the target unmanned aerial vehicle cluster based on the speed of the target unmanned aerial vehicle cluster and the relative distance between the target unmanned aerial vehicle cluster and the target air defense weapon system;
distributing firepower of each air defense weapon system at different moments according to a preset firepower distribution principle based on the interception parameters of each air defense weapon system, the interception time of the target unmanned aerial vehicle cluster, the cluster batch number and the unmanned rack number to obtain firepower attack mapping relations between the unmanned aerial vehicle cluster and the air defense weapon systems at different moments;
respectively calculating the number of remaining airplanes of each batch of unmanned aerial vehicle cluster at the current moment under fire interception according to the fire attack mapping relation between the unmanned aerial vehicle cluster and the air defense weapon system at different moments and by combining the interception precision of the air defense weapon system in real time; sending the number of the remaining airplanes when the unmanned aerial vehicle cluster flies to the sudden prevention flight path end point into a preset evaluation model for calculation to obtain the average unmanned aerial vehicle damage probability of the unmanned aerial vehicle cluster finishing the sudden prevention flight path;
wherein the preset evaluation model is characterized by the following formula (1):
Figure BDA0002910524510000031
wherein L isPRepresenting the average damage probability of the unmanned aerial vehicle after the target unmanned aerial vehicle cluster finishes the penetration track;
m represents the number of the cluster batches of the unmanned aerial vehicle cluster, wherein the number of the unmanned aerial vehicles of the ith batch of target unmanned aerial vehicle cluster is Ui
ULiAnd the mathematical expected value represents the number of the remaining airplanes when the ith group of target unmanned aerial vehicles complete the penetration under the fire interception of the air defense weapon system.
Preferably, the preset fire power distribution principle represents the following three ways:
the first method is as follows: and for different moments when the unmanned aerial vehicle breaks through the air defense weapon system, when a single set of air defense aircraft is in the interception range of a plurality of air defense weapon systems in the air defense airspace of the air defense track, using the air defense weapon system closest to the air defense aircraft to carry out interception, and when the number of available target channels of the air defense weapon system is smaller than the number of airplanes to be attacked of the set of air defense aircraft, carrying out interception on the remaining airplanes to be attacked by the next-nearest air defense weapon system to the set of air defense aircraft until all the available target channels of the airplanes to be attacked or all the ground-air missile weapons are completely distributed, wherein the number of airplanes to be attacked refers to the mathematical expected value of the remaining number of the sets of air defense aircraft at the current moment.
The second method comprises the following steps: and for different moments when the unmanned aerial vehicle breaks through the air defense weapon system, when a plurality of groups of air defense aircraft exist in the air defense airspace of the air defense track and are positioned in the interception range of one air defense weapon system, the air defense weapon system preferentially attacks the nearest group of air defense aircraft, and when the number of the group of aircraft to be attacked is less than the number of the target channels available for the air defense weapon system, the rest target channels of the air defense weapon system are used for striking the next-close-range group of air defense aircraft until all the available target channels of all the air defense aircraft or ground-air missile weapons to be attacked are completely distributed.
The third method comprises the following steps: for different moments when the unmanned aerial vehicle breaks through the air defense weapon system, when a plurality of sets of air defense aircraft are positioned in the interception range of a plurality of air defense weapon systems in the air defense airspace of the air defense track, firstly, a pair of air defense aircraft and air defense weapon systems which are closest to each other are searched in all the air defense aircraft and air defense weapon systems, and a fire attack relation is established between the air defense aircraft and the air defense weapon systems; on the basis, if the number of the airplanes to be attacked of the batch of the penetration prevention airplanes is larger than the number of the available target channels of the air defense weapon system, all the available target channels of the air defense weapon system are judged to be used for attacking the batch of the airplanes, meanwhile, the number of the available target channels of the air defense weapon system is subtracted from the number of the airplanes to be attacked of the batch of the penetration prevention airplanes, the air defense weapon system is ignored, a pair of penetration prevention airplanes and air defense weapon systems with the next shortest distance is continuously searched between the rest air defense weapon systems and all the batches of the penetration prevention airplanes, and further, a fire attack relation is established between the rest air defense airplane systems and the air defense weapons; or if the number of the airplanes to be attacked of the batch of the penetration prevention airplanes is smaller than the number of available target channels of the air defense weapon system, judging that all the airplanes to be attacked of the batch of the penetration prevention airplanes are attacked by the air defense weapon system, simultaneously subtracting the number of the batch of the penetration prevention airplanes from the number of the available target channels of the air defense weapon system, neglecting the batch of the penetration prevention airplanes, continuously searching a pair of penetration prevention airplanes and air defense weapon systems with the next shortest distance between the rest of the penetration prevention airplanes and all the air defense weapon systems, and further establishing a fire attack relationship between the rest of the penetration prevention airplanes and the air defense weapon systems; and circularly iterating the process of the third condition until all the available target channels of the airplanes to be attacked or all the ground-to-air missile weapons are completely distributed.
Optionally, the step of determining the cluster number of the drone cluster, the initial drone rack number of the drone cluster of each batch, and the speed of the drone cluster specifically includes:
and responding to the initialization operation of a user, and receiving the cluster number of the unmanned aerial vehicle cluster, the initial unmanned aerial vehicle frame number of each batch of the unmanned aerial vehicle cluster and the speed of the unmanned aerial vehicle cluster, which are input by the user.
Optionally, the interception parameters of the air defense weapon system are determined by the air defense weapon system hardware;
correspondingly, the step of traversing the interception parameters of each air defense weapon system, wherein the interception parameters at least include the deployment position, the interception range, the interception precision, the number of target channels, the number of loaded bombs and the number of reserve bombs, specifically includes:
and responding to the initialization operation of the user, and respectively receiving the interception parameters of each air defense weapon system input by the user.
Optionally, the step of calculating, in real time, a relative distance between the traversed target drone swarm and the air defense weapon systems at different positions on the penetration flight path specifically includes:
determining a traversed target unmanned aerial vehicle cluster;
calculating a longitude coordinate, a latitude coordinate and an altitude coordinate of the target unmanned aerial vehicle cluster at the moment t when flying along the penetration track according to the speed of the target unmanned aerial vehicle cluster;
and determining the relative distance between the target unmanned aerial vehicle cluster and the air defense weapon systems at different positions at the time t based on the longitude coordinate, the latitude coordinate and the altitude coordinate at the time t.
In addition, in order to achieve the above object, the present invention further provides a fire interception threat assessment apparatus for unmanned aerial vehicle fleet defense, the apparatus comprising:
the flight path setting unit is used for receiving the sudden defense flight path setting operation of the unmanned aerial vehicle cluster;
the unmanned aerial vehicle parameter setting unit is used for determining the cluster number of the unmanned aerial vehicle cluster, the initial unmanned machine frame number of each batch of unmanned aerial vehicle cluster and the speed of the unmanned aerial vehicle cluster;
the air defense weapon parameter setting unit is used for receiving interception parameters of each air defense weapon system, wherein the interception parameters at least comprise deployment positions, interception ranges, interception precision, target channel numbers, loading numbers and standby numbers;
the relative distance calculation unit is used for traversing each batch of unmanned aerial vehicle cluster, calculating the relative distance between the traversed target unmanned aerial vehicle cluster and the air defense weapon systems at different positions in real time, and taking the air defense weapon system with the shortest relative distance with the target unmanned aerial vehicle cluster as the target air defense weapon system;
the intercepting time calculation unit is used for calculating the intercepting time of the target air defense weapon system to the target unmanned aerial vehicle cluster based on the speed of the target unmanned aerial vehicle cluster and the relative distance between the target unmanned aerial vehicle cluster and the target air defense weapon system;
the fire distribution unit is used for distributing fire of each air defense weapon system at different moments according to a preset fire distribution principle based on the interception parameters of each air defense weapon system, the interception time of the target unmanned aerial vehicle cluster, the cluster batch number and the unmanned rack number to obtain a fire attack mapping relation between the unmanned aerial vehicle cluster and the air defense weapon system at different moments;
the remaining airplane calculation unit is used for calculating the number of remaining airplanes of each batch of unmanned aerial vehicle cluster at the current moment under fire interception respectively according to the fire attack mapping relation between the unmanned aerial vehicle cluster and the air defense weapon system at different moments in real time and by combining the interception precision of the air defense weapon system;
the assessment unit is used for sending the number of remaining airplanes into a preset assessment model for calculation when the unmanned aerial vehicle cluster flies to the sudden prevention flight path end point, and obtaining the average unmanned aerial vehicle damage probability of the unmanned aerial vehicle cluster finishing the sudden prevention flight path;
wherein the preset evaluation model is characterized by the following formula (1):
Figure BDA0002910524510000061
wherein L isPRepresenting the average damage probability of the unmanned aerial vehicle after the target unmanned aerial vehicle cluster finishes the penetration track;
m represents the number of the cluster batches of the unmanned aerial vehicle cluster, wherein the number of the unmanned aerial vehicles of the ith batch of target unmanned aerial vehicle cluster is Ui
ULiRepresenting that the ith group of target unmanned aerial vehicles are in air defense weaponsAnd (3) intercepting the mathematical expected value of the number of the remaining airplanes when the break-through is finished under the firepower of the system.
In addition, to achieve the above object, the present invention further provides a storage medium, which is a computer-readable storage medium, and the storage medium stores a computer program, and the computer program is configured to execute the steps of the fire interception threat assessment method for drone swarm defense according to the above claims.
The invention has the beneficial effects that: the defects that fire interception threats are difficult to accurately evaluate and analyze under the situation of cooperative defense burst of a plurality of batches of unmanned aerial vehicles and multi-system networking interception in the prior art are overcome, and good support is provided for the subsequent optimization of a defense burst route of an unmanned aerial vehicle cluster;
by using the evaluation method and the evaluation device, the condition that the unmanned aerial vehicle is intercepted can be accurately analyzed under the networking interception condition of the air defense system, and good support is provided for subsequent anti-riot exercises of the unmanned aerial vehicle or prevention of the anti-riot exercises of the unmanned aerial vehicle.
Drawings
Fig. 1 is a schematic flow chart illustrating an embodiment of a fire interception threat assessment method for unmanned aerial vehicle fleet defense according to the present invention;
fig. 2 is a block diagram of an embodiment of a fire interception threat assessment apparatus for unmanned aerial vehicle fleet defense.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention conception of the application is as follows: receiving a sudden flight path setting operation of an unmanned aerial vehicle cluster, and determining parameters of the unmanned aerial vehicle cluster; receiving deployment setting operation of an air defense weapon system and determining interception performance parameters of the air defense weapon system; distributing firepower of each air defense weapon system at different moments when the unmanned aerial vehicle cluster suddenly prevents and attacks according to a preset firepower distribution principle based on the parameters to obtain firepower attack mapping relations between the unmanned aerial vehicle cluster and the air defense weapon systems at different moments; calculating the number of remaining airplanes of the unmanned aerial vehicles of each batch at the corresponding moment under fire protection interception according to the fire attack mapping relation at different moments; sending the number of remaining airplanes under firepower interception at the fire prevention ending moment into a preset evaluation model for calculation to obtain the average damage probability of the unmanned aerial vehicle cluster for completing the fire prevention track; the method can accurately analyze the condition that the unmanned aerial vehicle is intercepted under the networking interception condition of the air defense system, and provides good support for the subsequent optimal regulation of the break-through flight path of the unmanned aerial vehicle or the deployment regulation of the air defense weapon system.
Referring to fig. 1, a first embodiment of the present invention provides a fire interception threat assessment method for unmanned aerial vehicle fleet defense, where the method includes:
step S10, receiving the sudden defense track setting operation of the unmanned aerial vehicle cluster;
it can be understood that the fire interception threat assessment method for unmanned aerial vehicle fleet defense disclosed by the embodiment of the invention can represent a computer program, wherein the computer program is loaded in computer equipment (corresponding to a fire interception threat assessment device for unmanned aerial vehicle fleet defense);
it should be noted that the execution subject of the evaluation method of this embodiment is a computer device (i.e., the above evaluation apparatus), and the evaluation apparatus may receive the operation of the operator on the sudden defense track setting of the drone swarm;
in this embodiment, after the sudden flight path is set, the evaluation device may automatically calculate some processing steps of the unmanned aerial vehicle fleet in the sudden flight path process according to the parameters of the unmanned aerial vehicle fleet and the interception parameters of the air defense weapon system, and finally obtain the average damage probability of the unmanned aerial vehicle after the unmanned aerial vehicle fleet completes the sudden flight path
Step S20: determining the cluster number of the unmanned aerial vehicle cluster, the initial unmanned machine frame number of each batch of the unmanned aerial vehicle cluster and the speed of the unmanned aerial vehicle cluster;
in a specific implementation, the evaluation device may respond to an initialization operation of a user, and receive a cluster number of the drone swarm, an initial drone rack number of the drone swarm of each batch, and a speed of the drone swarm, which are input by the user.
It can be understood that, each time a user carries out the sudden prevention deduction of the unmanned aerial vehicle or prevents the unmanned aerial vehicle from performing sudden attack drilling, the previous parameters of the sudden prevention cluster of the unmanned aerial vehicle and the parameters of the ground-air missile weapon of the air defense weapon system need to be initialized so as to facilitate the execution of the drilling;
for m batches of unmanned aerial vehicle clusters appearing in one exercise and the number of unmanned racks of each batch of unmanned aerial vehicle clusters, the parameters are counted by an operator (namely a user) in advance, and then the user manually inputs the parameters of the unmanned aerial vehicles into an evaluation device;
the flight speeds of the unmanned aerial vehicle clusters in the same batch are the same, and the flight speeds of the unmanned aerial vehicle clusters in different batches may be the same or different.
Step S30: receiving a deployment setup operation for an air defense weapons system; determining interception performance parameters of an air defense weapon system, wherein the interception parameters at least comprise a deployment position, an interception range, interception precision, a target channel number, an intercepted projectile flying speed, a loading quantity and a standby projectile quantity;
it should be noted that the interception parameters of the air defense weapon system are determined by the hardware of the air defense weapon system, and the interception parameters of the air defense weapon systems in different position areas may be the same or different; for example, the interception accuracy of an air defense weapon system is related to the technical performance of the air defense weapon system, and the interception accuracy of an air defense weapon system with advanced technology is generally higher than that of an air defense weapon system with lagged technology.
In a specific implementation, the evaluation device respectively receives the interception parameters of each air defense weapon system input by the user in response to the initialization operation of the user.
Step S40: traversing each batch of unmanned aerial vehicle cluster, calculating the relative distance between the traversed target unmanned aerial vehicle cluster and the air defense weapon systems at different positions in real time, and taking the air defense weapon system with the shortest relative distance with the target unmanned aerial vehicle cluster as a target air defense weapon system;
it will be appreciated that for each batch of drone swarm, the present embodiment performs the following operations:
determining a traversed target unmanned aerial vehicle cluster;
calculating a longitude coordinate, a latitude coordinate and an altitude coordinate of the target unmanned aerial vehicle cluster at the moment t when flying along the penetration track according to the speed of the target unmanned aerial vehicle cluster;
determining the relative distance between the target unmanned aerial vehicle cluster and the air defense weapon systems at different positions at the time t based on the longitude coordinate, the latitude coordinate and the altitude coordinate at the time t;
taking the air defense weapon system with the shortest relative distance (closest relative distance) with the target unmanned aerial vehicle cluster as a target air defense weapon system;
step S50: calculating the interception time of the target air defense weapon system to the target unmanned aerial vehicle cluster based on the speed of the target unmanned aerial vehicle cluster and the relative distance between the target unmanned aerial vehicle cluster and the target air defense weapon system;
in a specific implementation, for each batch of unmanned aerial vehicle cluster, the calculation method of the interception time of the target unmanned aerial vehicle cluster by the target air defense weapon system is as follows: the relative distance between the target drone swarm and the target air defense weapon system is divided by the speed of the target drone swarm.
Step S60: distributing firepower of each air defense weapon system at different moments according to a preset firepower distribution principle based on the interception parameters of each air defense weapon system, the interception time of the target unmanned aerial vehicle cluster, the cluster batch number and the unmanned rack number to obtain firepower attack mapping relations between the unmanned aerial vehicle cluster and the air defense weapon systems at different moments;
step S70: respectively calculating the number of remaining airplanes of each batch of unmanned aerial vehicle cluster at the current moment under fire interception according to the fire attack mapping relation between the unmanned aerial vehicle cluster and the air defense weapon system at different moments and by combining the interception precision of the air defense weapon system in real time;
step S80: sending the number of the remaining airplanes when the unmanned aerial vehicle cluster flies to the sudden prevention flight path end point into a preset evaluation model for calculation to obtain the average unmanned aerial vehicle damage probability of the unmanned aerial vehicle cluster finishing the sudden prevention flight path;
wherein the preset evaluation model is characterized by the following formula (1):
Figure BDA0002910524510000091
wherein L isPRepresenting the average damage probability of the unmanned aerial vehicle after the target unmanned aerial vehicle cluster finishes the penetration track;
m represents the number of the cluster batches of the unmanned aerial vehicle cluster, wherein the number of the unmanned aerial vehicles of the ith batch of target unmanned aerial vehicle cluster is Ui
ULiAnd the mathematical expected value represents the number of the remaining airplanes when the ith group of target unmanned aerial vehicles complete the penetration under the fire interception of the air defense weapon system.
It can be understood that in the existing fire prevention fire interception threat assessment method, the terrain threat and the fire interception threat are essentially different, the fire prevention route planning is limited when the terrain threat and the fire interception threat are used as fire interception threat assessment indexes, and the attack damage probability of a single fire prevention aircraft is only suitable for a simple fire prevention operation scene, so that the fire attack threat faced by the cooperative fire prevention of a plurality of unmanned aerial vehicles cannot be accurately reflected. Therefore, fire interception threat assessment indexes need to be designed reasonably, and a new fire interception threat assessment index is introduced and provided in the invention: and the average damage probability when the sudden prevention cluster finishes the sudden prevention action. Suppose that the penetration cluster is divided into m groups, wherein the quantity of the ith group of penetration aircrafts is UiIf so, the average damage probability L of the sudden prevention cluster when completing the sudden prevention actionPIs defined as
Figure BDA0002910524510000101
U in formula (1)LiThe mathematic expected value of the number of the rest frames when the ith set of unmanned aerial vehicles finish the penetration under the fire interception of the ground-air missile weapon system is shown, and when the penetration is finished, the number of the rest frames is the mathematic expected valueWhen the group is only 1 batch 1 frame, LPNamely the damage probability when the monovalent unmanned plane completes the sudden prevention action.
Further, how to calculate and analyze the fire interception threat assessment index is as follows:
as can be seen from the formula (1), the evaluation index LPThe key of the calculation is to obtain the mathematical expected value U of the residual number of the aircraft in each batch of the penetration protection aircraft when the penetration protection is finishedLi(i ═ 1, …, m). Under the complex penetration countermeasure situation of cooperative penetration of multiple unmanned aerial vehicles and mesh interception of multiple ground-air missile weapon systems, U is adoptedLiThe method is not only related to the ith set of penetration resistant aircraft, but also related to various factors such as fire cooperative distribution principle, target channel number, reserve bomb quantity, interception precision, interception reaction time and the like of other sets of penetration resistant aircraft and air defense weapon systems. Therefore, the method introduces a fire distribution principle based on the nearest priority, and based on the principle, synthesizes factors such as the number of target channels, the number of loaded missiles, the number of reserve missiles, the interception time of each ground-air missile weapon system, the batch and the number of frames of the unmanned aerial vehicles for fire prevention, and the like to carry out simulation deduction on the fire prevention process of the unmanned aerial vehicles, so as to obtain the fire distribution mode of each ground-air missile weapon system at any moment of fire prevention attack, then obtains the mathematical expected value of the number of the remaining airplanes of each batch of unmanned aerial vehicles under fire prevention at the current moment by combining the interception precision of the ground-air missile weapon system, and finally obtains the corresponding average damage probability L by calculating the mathematical expected value of the remaining number of frames of each batch of unmanned aerial vehicles at the moment of fire prevention ending according toPAnd therefore, the assessment of fire interception threat of fire prevention is completed.
As mentioned above, in order to accurately describe the fire interception threat suffered by the penetration unmanned aerial vehicle under the complex countermeasure situation, the fire interception threat is defined as the average damage probability L when the penetration action is completedP(as shown in formula (1)). To calculate LPIn the embodiment of the present invention, the following distance closest priority power distribution rule is proposed (the above-described step S60 is explained):
(1) for different moments when the unmanned aerial vehicle breaks through the air defense weapon system to attack, when a single set of air defense aircraft is located in the intercepting range of a plurality of air defense weapon systems in the air defense airspace of the air defense track, the ground-air missile weapon system closest to the air defense aircraft is preferentially used for intercepting, and when the number of available target channels of the air missile weapon system is smaller than the number of airplanes to be attacked of the set of air defense aircraft (the number of airplanes to be attacked is the mathematical expected value of the rest number of frames of the set of air defense aircraft at the current moment), the ground-air missile weapon system next closest to the set of air defense aircraft is used for intercepting the rest of air defense aircraft to be attacked, and so on until all the available target channels of the air defense aircraft to be attacked or all the ground-air missiles are completely distributed.
(2) And for different moments when the unmanned aerial vehicle breaks through the air defense weapon system, when a plurality of groups of air defense aircraft are positioned in the interception range of one air defense weapon system in the air defense airspace of the air defense track, the ground-to-air missile weapon system preferentially attacks the nearest group of air defense aircraft, when the number of the group of aircraft to be attacked is less than the number of available target channels of the ground-to-air missile weapon system, the rest target channels of the ground-to-air missile weapon system are used for hitting the next short-range group of air defense aircraft, and the rest is repeated until all the available target channels of all the air defense aircraft to be attacked or the ground-to-air missile weapons are completely distributed.
(3) For different moments when the unmanned aerial vehicle breaks through the air defense weapon system to attack, when a plurality of sets of air defense aircraft are located in the interception range of a plurality of air defense weapon systems in the air defense airspace of the air defense track, firstly, a pair of air defense aircraft and ground-air missile weapon systems which are closest to each other are searched in all the air defense aircraft and ground-air missile weapon systems, and a fire attack relation is established between the air defense aircraft and the ground-air missile weapon systems. On the basis, if the number of the to-be-attacked airplanes of the batch of penetration resistant airplanes is larger than the number of available target channels of the ground-to-air missile weapon system, judging that all the available target channels of the ground-to-air missile weapon system are used for attacking the batch of airplanes, simultaneously subtracting the number of the available target channels of the ground-to-air missile weapon system from the number of the to-be-attacked airplanes of the batch of penetration resistant airplanes, neglecting the ground-to-air missile weapon system, continuously searching a pair of penetration resistant airplanes and ground-to-air missile weapon systems which are next closest in distance between the rest ground-to-air missile weapon system and all the batches of penetration resistant airplanes, and further establishing a fire attack relationship between the surplus ground-to; on the contrary, if the number of the to-be-attacked aircraft of the set of penetration resistant aircraft is smaller than the number of the available target channels of the ground-to-air missile weapon system, all the to-be-attacked aircraft of the set of penetration resistant aircraft are judged to be attacked by the ground-to-air missile weapon system, the number of the penetration resistant aircraft is subtracted from the number of the available target channels of the ground-to-air missile weapon system, the set of penetration resistant aircraft is ignored, a pair of penetration resistant aircraft and ground-to-air missile weapon system with the next shortest distance is continuously searched between the rest penetration resistant aircraft and all the ground-to-air missile weapon systems, and a fire attack relation is established between the two systems. And circularly iterating the process until all the available target channels of the to-be-attacked aircraft or all the ground-to-air missile weapons are completely distributed.
The embodiment of the invention overcomes the defect that fire interception threats are difficult to accurately evaluate and analyze under the situation of cooperative defense burst of a plurality of batches of unmanned aerial vehicles and multi-system networking interception, and provides good support for the subsequent optimization of the unmanned aerial vehicle fleet defense burst routes.
In addition, referring to fig. 2, fig. 2 is a schematic diagram of a fire interception threat assessment apparatus for unmanned aerial vehicle fleet defense, where the apparatus includes:
a track setting unit 10, configured to receive a sudden flight path setting operation of the drone swarm;
it can be understood that the method for evaluating fire-preventive interception threat of an unmanned aerial vehicle cluster according to the embodiment of the present invention can represent a computer program, and the computer program is loaded in a computer device (corresponding to an evaluation device for fire-preventive interception threat of an unmanned aerial vehicle cluster);
it should be noted that the execution subject of the evaluation method of this embodiment is a computer device (i.e., the above evaluation apparatus), and the evaluation apparatus may receive the operation of the operator on the sudden defense track setting of the drone swarm;
in this embodiment, after the sudden flight path is set, the evaluation device may automatically calculate some processing steps of the unmanned aerial vehicle fleet in the sudden flight path process according to the parameters of the unmanned aerial vehicle fleet and the interception parameters of the air defense weapon system, and finally obtain the average damage probability of the unmanned aerial vehicle after the unmanned aerial vehicle fleet completes the sudden flight path
An unmanned aerial vehicle parameter setting unit 20, configured to determine a cluster number of the unmanned aerial vehicle cluster, an initial unmanned aerial vehicle rack number of each cluster of the unmanned aerial vehicle cluster, and a speed of the unmanned aerial vehicle cluster;
in a specific implementation, the evaluation device may respond to an initialization operation of a user, and receive a cluster number of the drone swarm, an initial drone rack number of the drone swarm of each batch, and a speed of the drone swarm, which are input by the user.
It can be understood that each time a user carries out unmanned aerial vehicle fire-fighting interception threat assessment, initialization operation needs to be carried out on parameters of an unmanned aerial vehicle fire-fighting cluster and ground-air missile weapon parameters of an air defense weapon system, so that the exercise can be conveniently executed;
for m batches of unmanned aerial vehicle clusters appearing in one-time defense outburst and the number of unmanned racks of each batch of unmanned aerial vehicle clusters, the parameters are counted by an operator (namely a user) in advance, and then the user manually inputs the parameters of the unmanned aerial vehicles into an evaluation device;
the flight speeds of the unmanned aerial vehicle clusters in the same batch are the same, and the flight speeds of the unmanned aerial vehicle clusters in different batches may be the same or different.
The air defense weapon parameter setting unit 30 is configured to receive interception parameters of each air defense weapon system, where the interception parameters at least include a deployment position, an interception range, an interception precision, a target channel number, a loading number, and a reserve number;
it should be noted that the interception parameters of the air defense weapon system are determined by the hardware of the air defense weapon system, and the interception parameters of the air defense weapon systems in different position areas may be the same or different; for example, the interception accuracy of an air defense weapon system is related to the technical performance of the air defense weapon system, and the interception accuracy of an advanced air defense weapon system may be higher than that of a lagged air defense weapon system.
In a specific implementation, the evaluation device respectively receives the interception parameters of each air defense weapon system input by the user in response to the initialization operation of the user.
The relative distance calculation unit 40 is configured to traverse each batch of unmanned aerial vehicle cluster, calculate, in real time, a relative distance between the traversed target unmanned aerial vehicle cluster and the air defense weapon systems at different positions, and use the air defense weapon system with the shortest relative distance to the target unmanned aerial vehicle cluster as the target air defense weapon system;
it will be appreciated that for each batch of drone swarm, the present embodiment performs the following operations:
determining a traversed target unmanned aerial vehicle cluster;
calculating a longitude coordinate, a latitude coordinate and an altitude coordinate of the target unmanned aerial vehicle cluster at the moment t when flying along the penetration track according to the speed of the target unmanned aerial vehicle cluster;
determining the relative distance between the target unmanned aerial vehicle cluster and the air defense weapon systems at different positions at the time t based on the longitude coordinate, the latitude coordinate and the altitude coordinate at the time t;
taking the air defense weapon system with the shortest relative distance (closest relative distance) with the target unmanned aerial vehicle cluster as a target air defense weapon system;
an intercept time calculation unit 50, configured to calculate an intercept time of the target air defense weapon system to the target drone cluster based on a speed of the target drone cluster and a relative distance between the target drone cluster and the target air defense weapon system;
in a specific implementation, for each batch of unmanned aerial vehicle cluster, the calculation method of the interception time of the target unmanned aerial vehicle cluster by the target air defense weapon system is as follows: the relative distance between the target drone swarm and the target air defense weapon system is divided by the speed of the target drone swarm.
The fire power distribution unit 60 is configured to distribute fire power of each air defense weapon system at different times according to a preset fire power distribution principle based on the interception parameters of each air defense weapon system, the interception time of the target unmanned aerial vehicle cluster, the cluster batch number and the unmanned aerial vehicle rack number, so as to obtain a fire power attack mapping relationship between the unmanned aerial vehicle cluster and the air defense weapon system at different times;
the remaining aircraft calculating unit 70 is configured to calculate, according to the mapping relationship of fire attack between the unmanned aerial vehicle fleet and the air defense weapon system at different times, the number of remaining aircraft in fire interception of each batch of unmanned aerial vehicle fleet at the current time in real time by combining the interception accuracy of the air defense weapon system;
the evaluation unit 80 is configured to send the number of remaining airplanes when the drone swarm flies to the sudden prevention flight path end point into a preset evaluation model for calculation, so as to obtain an average drone damage probability of the drone swarm completing the sudden prevention flight path;
wherein the preset evaluation model is characterized by the following formula (1):
Figure BDA0002910524510000141
wherein L isPRepresenting the average damage probability of the unmanned aerial vehicle after the target unmanned aerial vehicle cluster finishes the penetration track;
m represents the number of the cluster batches of the unmanned aerial vehicle cluster, wherein the number of the unmanned aerial vehicles of the ith batch of target unmanned aerial vehicle cluster is Ui
ULiAnd the mathematical expected value represents the number of the remaining airplanes when the ith group of target unmanned aerial vehicles complete the penetration under the fire interception of the air defense weapon system.
The evaluation device has the advantages that: the defects that fire interception threats are difficult to accurately evaluate and analyze under the situation of cooperative defense burst of a plurality of batches of unmanned aerial vehicles and multi-system networking interception in the prior art are overcome, and good support is provided for the subsequent optimization of a defense burst route of an unmanned aerial vehicle cluster;
by using the evaluation device provided by the invention, the condition that the unmanned aerial vehicle is intercepted can be accurately analyzed under the networking interception condition of the air defense system, and a good support is provided for the subsequent sudden prevention exercise of the unmanned aerial vehicle or the prevention of the sudden attack exercise of the unmanned aerial vehicle.
It should be noted that, for further explanation of the above embodiments of the evaluation method and the evaluation apparatus, the present invention illustrates a simulation example,
simulation example:
based on the principle of closest priority fire distribution, the process for evaluating the fire interception threat of the simulation example of the invention consists of two parts, namely fire situation initialization and fire action simulation deduction.
(1) Sudden defense situation initialization
The part is mainly used for carrying out initialization setting on states of a penetration cluster and an air-ground missile weapon system according to equipment deployment of both penetration countermeasures.
a. Surge cluster initialization
According to the sudden prevention action scheme, the number m of batches of sudden prevention unmanned aerial vehicles and the number U of frames of each batch of sudden prevention unmanned aerial vehiclesiAnd sudden flight path (L)Pi(t),APi(t),HPi(t)) initializing and making the ith group of the aircraft for emergency protection remain ULiIs equal to UiI is 1, …, m. Here LPi(t)、APi(t)、HPiAnd (t) longitude, latitude and altitude coordinates of the ith group of the penetration unmanned aerial vehicle at the moment t when flying along a preset penetration track are obtained by recursion of the flying speed of the unmanned aerial vehicle.
b. Ground-to-air missile weapon system initialization
According to the air defense deployment of the penetration target, the number n of ground-air missile weapon systems in the penetration area and the target channel number C of each ground-air missile weapon systemjThe maximum loading number of the launching device is MFjThe remaining number of shots loaded by the launching device is MLFjThe total reserve ammunition number of the system is MCjThe number of the remaining reserve shots in the system is MLCjSystem kill probability PjDeployment location (L)Mj,AMj,hMj) And killing range phijPerforming an initialization assignment, wherein MLFjIs taken as MFj,MLCjIs taken as MCjJ is 1, … n. On the basis, let t for the jth ground-to-air missile system in the penetration areaPj(h) Representing the residual preparation time required for the h-th target channel to initiate next round of attack, and initializing tPj(h) Value equal to 0, h-1, … CjNamely, each target channel of the ground-air missile weapon system is in an idle available state at the initial moment;
it should be noted that the system killing probability P is described abovejRepresenting the interception precision, the probability of destruction, P, of an air defense weapon systemjDetermined by the air weapon system hardware.
(2) Simulation deduction of penetration
The average damage probability of the penetration machine group when the penetration action is completed is obtained mainly through simulation deduction, so that the accurate assessment of the penetration firepower interception threat is realized, and the support is provided for the subsequent penetration track optimization adjustment. In this example, after the sudden flight path is set, the evaluation device may automatically calculate some processing steps of the unmanned aerial vehicle fleet in the sudden flight path process according to the parameters of the unmanned aerial vehicle fleet and the interception parameters of the air defense weapon system, and finally obtain the average damage probability of the unmanned aerial vehicle after the unmanned aerial vehicle fleet completes the sudden flight path:
and recording the initial value of the simulation deduction iteration number l as 0, wherein the time step of the simulation deduction is delta t, and the value of the delta t is 1/5-1/10 of the target interception and tracking time of the ground-air missile system. Based on this, the specific process of simulation deduction is as follows.
Step a, updating the spatial position of the penetration aircraft
And (3) obtaining the space position coordinates (L) of each set of penetration prevention airplanes at the current moment according to the preset penetration prevention route with the current moment t being equal to L delta tPi(lΔt),APi(lΔt),HPi(l Δ t)), i is 1, … m. Meanwhile, the remaining preparation time of the next round of attack of all target channels of the ground-air missile weapon system is updated according to the formula (2)
tPj(h)=max(tPj(h)-Δt,0) (2)
Wherein j is 1, …, n, h is 1, …, Cj. After the treatment is finished, the step b is carried out to construct firepower interception distance mark momentAnd (5) arraying.
B, constructing a firepower interception distance mark matrix
Constructing an m multiplied by n dimensional firepower interception distance mark matrix F according to the space position information of the penetration aircraft at the current moment, wherein the (i, j) th element F in the matrix Fi,jIs taken as
Figure BDA0002910524510000161
In the formula ri,jAnd the distance from the ith batch of unmanned aerial vehicles to the jth ground-air missile system at the current moment is shown. And c, after the treatment is finished, the step is shifted to the step c to set the interception fire power density.
Step c. intercept fire power density setting
The interception fire power density refers to the number of missiles which are simultaneously launched to a single target when the air defense system intercepts the target. The greater the fire density, the higher the probability of killing, but the greater the number of missiles required.
According to the principle of improving the fire density as much as possible on the premise of full coverage of the target, for the jth (j is 1, …, N) ground-air missile system, the fire density N is intercepted in the simulation processAjThe method comprises the following steps:
Figure BDA0002910524510000162
in the formula (4)
Figure BDA0002910524510000163
Which represents a rounding-down operation, the rounding-down operation,
Figure BDA0002910524510000164
represents the maximum fire density that the jth ground-air missile system can adopt,
Figure BDA0002910524510000165
represents the sum of the penetration planes in the killing range of the jth ground-air missile system at the current moment, and the value of the sum can be represented by the following formula
Figure BDA0002910524510000166
And (d) after the steps are finished, the step is shifted to the step d to construct a firepower attack map.
Fire attack mapping
And searching the minimum non-zero element from the fire interception distance mark matrix F according to the closest priority fire distribution principle. If the smallest non-zero element in F is located at the second
Figure BDA0002910524510000167
Line and first
Figure BDA0002910524510000168
Column, the first one can be determined according to the closest priority fire power distribution rule
Figure BDA0002910524510000169
The primary attack target of the part-ground-air missile system is the first
Figure BDA00029105245100001610
Batching unmanned aerial vehicles, establishing firepower attack mapping
Figure BDA00029105245100001611
While simultaneously applying a second of the matrices F
Figure BDA00029105245100001612
Line and first
Figure BDA00029105245100001613
Setting the column element to 0, and proceeding to step e to count
Figure BDA00029105245100001614
And the number of current available target channels of the part-ground-to-air missile system.
If all elements in the matrix F are equal to 0, the fact that all possible fire attack analysis is completed at the current moment under the principle of closest priority fire distribution is indicated, and the step i is directly carried out.
Available target channel statistics
Statistics of
Figure BDA00029105245100001615
Aerial missile system
Figure BDA00029105245100001616
Remaining preparation time of next round of attack in each target channel
Figure BDA00029105245100001617
Figure BDA00029105245100001618
Target number of channels equal to 0, denoted Ncr. If N is presentcrWhen 0, it indicates the first
Figure BDA00029105245100001619
And e, if the local air missile system does not have an idle available target channel, returning to the step d to reconstruct the firepower attack mapping. If N is presentcrIf > 0, it indicates the first
Figure BDA0002910524510000171
Partially airborne missile system presence NcrOne free target channel is available for the second
Figure BDA0002910524510000172
And f, turning to the step f to analyze the damage condition of the penetration aircraft in the attack.
F, analyzing the attack loss of the penetration plane
According to the first
Figure BDA0002910524510000173
Number of remaining aircraft frames
Figure BDA0002910524510000174
First, the
Figure BDA0002910524510000175
Root of herbaceous plantNumber N of idle available target channels of air-missile systemcrThe remaining number of shots loaded by the launching device
Figure BDA0002910524510000176
The relative magnitude relationship between the three is divided into the following 5 cases to the current time
Figure BDA0002910524510000177
The batched penetration plane is on
Figure BDA0002910524510000178
Analyzing the residual number of the racks under the fire interception of the aerial missile system:
case 1: when in use
Figure BDA0002910524510000179
And is
Figure BDA00029105245100001710
Time of flight
First, the
Figure BDA00029105245100001711
Partially airborne missile system utilization
Figure BDA00029105245100001712
A target channel pair
Figure BDA00029105245100001713
The unmanned aerial vehicle carries out firepower interception, and firepower interception in the current round is carried out
Figure BDA00029105245100001714
The expected remaining number of the batched penetration aircraft is updated to
Figure BDA00029105245100001715
At the same time, first
Figure BDA00029105245100001716
Residual charge of partially guided system
Figure BDA00029105245100001717
Become into
Figure BDA00029105245100001718
Case 2: when in use
Figure BDA00029105245100001719
And is
Figure BDA00029105245100001720
Time of flight
First, the
Figure BDA00029105245100001721
Partially airborne missile system utilization NcrA target channel pair
Figure BDA00029105245100001722
The unmanned aerial vehicle carries out firepower interception, and firepower interception in the current round is carried out
Figure BDA00029105245100001723
The expected remaining number of the batched penetration aircraft is updated to
Figure BDA00029105245100001724
At the same time, first
Figure BDA00029105245100001725
Residual charge of partially guided system
Figure BDA00029105245100001726
Is updated to
Figure BDA00029105245100001727
Case 3: when in use
Figure BDA00029105245100001728
And is
Figure BDA00029105245100001729
Time of flight
First, the
Figure BDA00029105245100001730
Partially airborne missile system utilization
Figure BDA00029105245100001731
A target channel pair
Figure BDA00029105245100001732
The unmanned aerial vehicle is batched to implement single firepower interception, and the firepower is intercepted in the current round
Figure BDA00029105245100001733
The expected remaining number of the batched penetration aircraft is updated to
Figure BDA00029105245100001734
At the same time, first
Figure BDA00029105245100001735
Residual charge of partially guided system
Figure BDA00029105245100001736
Is updated to 0.
Case 4: when in use
Figure BDA00029105245100001737
And is
Figure BDA00029105245100001738
Time of flight
First, the
Figure BDA00029105245100001739
Partially airborne missile system utilization NcrA target channel, to
Figure BDA00029105245100001740
The unmanned aerial vehicle carries out firepower interception, and firepower interception in the current round is carried out
Figure BDA00029105245100001741
The expected remaining number of the batched penetration aircraft is updated to
Figure BDA00029105245100001742
At the same time, first
Figure BDA00029105245100001743
Residual charge of partially guided system
Figure BDA00029105245100001744
Is updated to
Figure BDA00029105245100001745
Case 5: when in use
Figure BDA00029105245100001746
And is
Figure BDA00029105245100001747
Time of flight
First, the
Figure BDA00029105245100001748
Partially airborne missile system utilization
Figure BDA00029105245100001749
A target channel pair
Figure BDA00029105245100001750
Batched unmanned aerial vehicle for implementing single fire interceptionAfter the wheel fire is intercepted, the
Figure BDA00029105245100001751
The expected remaining number of the batched penetration aircraft is updated to
Figure BDA0002910524510000181
At the same time, first
Figure BDA0002910524510000182
Residual charge of partially guided system
Figure BDA0002910524510000183
Is updated to 0.
On the basis of completing the analysis, the step h is carried out
Figure BDA0002910524510000184
And updating the state of each target channel of the local guidance system.
Step h. target channel status update
If after the attack
Figure BDA0002910524510000185
If the value is more than 0, assigning the remaining preparation time of the next round of attack of all target channels for the current round of attack as
Figure BDA0002910524510000186
In the formula, tsfThe time for intercepting and launching the target refers to the time for the ground guidance system to finish intercepting and tracking the target and control missile launching; t is tsbThe guided missile guidance and interception time refers to the time for the guided missile to fly to a target under the control of a guidance system and meet the target to complete system interception; t is tzyIndicating the fire transfer time of the ground lead weapon system.
If after the attack
Figure BDA0002910524510000187
Equal to 0, then it is necessary to
Figure BDA0002910524510000188
Partially guiding the system for refilling, after filling
Figure BDA0002910524510000189
Value is updated to
Figure BDA00029105245100001810
After refilling, the
Figure BDA00029105245100001811
The remaining reserve ammunition number of the partially guided system is updated to
Figure BDA00029105245100001812
After the attack, the first time
Figure BDA00029105245100001813
Assigning the next round of attack remaining preparation time of all targets of the partially guided system as
Figure BDA00029105245100001814
tztIndicating the missile loading time of the ground-borne weapon system.
And on the basis of completing the analysis, the step d is carried out again to construct a new fire attack mapping until all elements in the matrix F are equal to 0, namely all possible attacks at the current moment are completed.
Step i. penetration process judgment
If (L)Pi(lΔt),APi(lΔt),HPi(l Δ t)) is the sudden flight path end point, the simulation deduction is ended, andthe number U of the expected residual frames of each batch of the penetration prevention unmanned aerial vehicle at the current momentLiAnd (i-1, … m) substituting the formula (1) to obtain a final firepower interception threat assessment result and outputting the result.
If (L)Pi(lΔt),APi(lΔt),HPi(l Δ t)) is not the anti-collision track end point, let l be l +1, and go to step a to perform simulation deduction at the next time.
In addition, the present invention further provides a storage medium, where the storage medium is a computer-readable storage medium, and the storage medium stores a computer program, where the computer program is configured to execute the steps of the fire interception threat assessment method for unmanned aerial vehicle fleet defense.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (7)

1. A fire interception threat assessment method for unmanned aerial vehicle cluster defense is characterized by comprising the following steps:
receiving a sudden defense track setting operation of an unmanned aerial vehicle cluster;
determining the cluster number of the unmanned aerial vehicle cluster, the initial unmanned machine frame number of each batch of the unmanned aerial vehicle cluster and the speed of the unmanned aerial vehicle cluster;
receiving a deployment setup operation for an air defense weapons system;
determining interception performance parameters of an air defense weapon system, wherein the interception performance parameters at least comprise a deployment position, an interception range, interception precision, a target channel number, an intercepted projectile flying speed, a loading quantity and a standby projectile quantity;
traversing each batch of unmanned aerial vehicle cluster, calculating the relative distance between the traversed target unmanned aerial vehicle cluster and the air defense weapon systems at different positions in real time, and taking the air defense weapon system with the shortest relative distance with the target unmanned aerial vehicle cluster as the target air defense weapon system;
calculating the interception time of the target air defense weapon system to the target unmanned aerial vehicle cluster based on the speed of the target unmanned aerial vehicle cluster and the relative distance between the target unmanned aerial vehicle cluster and the target air defense weapon system;
distributing firepower of each air defense weapon system at different moments according to a preset firepower distribution principle based on the interception parameters of each air defense weapon system, the interception time of the target unmanned aerial vehicle cluster, the cluster batch number and the unmanned rack number to obtain firepower attack mapping relations between the unmanned aerial vehicle cluster and the air defense weapon systems at different moments;
respectively calculating the number of remaining airplanes of each batch of unmanned aerial vehicle cluster at the current moment under fire interception according to the fire attack mapping relation between the unmanned aerial vehicle cluster and the air defense weapon system at different moments and by combining the interception precision of the air defense weapon system in real time; sending the number of the remaining airplanes when the unmanned aerial vehicle cluster flies to the sudden prevention flight path end point into a preset evaluation model for calculation to obtain the average unmanned aerial vehicle damage probability of the unmanned aerial vehicle cluster finishing the sudden prevention flight path;
wherein the preset evaluation model is characterized by the following formula (1):
Figure FDA0002910524500000011
wherein L isPRepresenting the average damage probability of the unmanned aerial vehicle after the target unmanned aerial vehicle cluster finishes the penetration track;
m represents the number of the cluster batches of the unmanned aerial vehicle cluster, wherein the number of the unmanned aerial vehicles of the ith batch of target unmanned aerial vehicle cluster is Ui
ULiAnd the mathematical expected value represents the number of the remaining airplanes when the ith group of target unmanned aerial vehicles complete the penetration under the fire interception of the air defense weapon system.
2. The method of claim 1, wherein the preset fire distribution rule represents three ways:
the first method is as follows: and for different moments when the unmanned aerial vehicle breaks through the air defense weapon system, when a single set of air defense aircraft is in the interception range of a plurality of air defense weapon systems in the air defense airspace of the air defense track, using the air defense weapon system closest to the air defense aircraft to carry out interception, and when the number of available target channels of the air defense weapon system is smaller than the number of airplanes to be attacked of the set of air defense aircraft, carrying out interception on the remaining airplanes to be attacked by the next-nearest air defense weapon system to the set of air defense aircraft until all the available target channels of the airplanes to be attacked or all the ground-air missile weapons are completely distributed, wherein the number of airplanes to be attacked refers to the mathematical expected value of the remaining number of the sets of air defense aircraft at the current moment.
The second method comprises the following steps: and for different moments when the unmanned aerial vehicle breaks through the air defense weapon system, when a plurality of groups of air defense aircraft exist in the air defense airspace of the air defense track and are positioned in the interception range of one air defense weapon system, the air defense weapon system preferentially attacks the nearest group of air defense aircraft, and when the number of the group of aircraft to be attacked is less than the number of the target channels available for the air defense weapon system, the rest target channels of the air defense weapon system are used for striking the next-close-range group of air defense aircraft until all the available target channels of all the air defense aircraft or ground-air missile weapons to be attacked are completely distributed.
The third method comprises the following steps: for different moments when the unmanned aerial vehicle breaks through the air defense weapon system, when a plurality of sets of air defense aircraft are positioned in the interception range of a plurality of air defense weapon systems in the air defense airspace of the air defense track, firstly, a pair of air defense aircraft and air defense weapon systems which are closest to each other are searched in all the air defense aircraft and air defense weapon systems, and a fire attack relation is established between the air defense aircraft and the air defense weapon systems; on the basis, if the number of the airplanes to be attacked of the batch of the penetration prevention airplanes is larger than the number of the available target channels of the air defense weapon system, all the available target channels of the air defense weapon system are judged to be used for attacking the batch of the airplanes, meanwhile, the number of the available target channels of the air defense weapon system is subtracted from the number of the airplanes to be attacked of the batch of the penetration prevention airplanes, the air defense weapon system is ignored, a pair of penetration prevention airplanes and air defense weapon systems with the next shortest distance is continuously searched between the rest air defense weapon systems and all the batches of the penetration prevention airplanes, and further, a fire attack relation is established between the rest air defense airplane systems and the air defense weapons; or if the number of the airplanes to be attacked of the batch of the penetration prevention airplanes is smaller than the number of available target channels of the air defense weapon system, judging that all the airplanes to be attacked of the batch of the penetration prevention airplanes are attacked by the air defense weapon system, simultaneously subtracting the number of the batch of the penetration prevention airplanes from the number of the available target channels of the air defense weapon system, neglecting the batch of the penetration prevention airplanes, continuously searching a pair of penetration prevention airplanes and air defense weapon systems with the next shortest distance between the rest of the penetration prevention airplanes and all the air defense weapon systems, and further establishing a fire attack relationship between the rest of the penetration prevention airplanes and the air defense weapon systems; and circularly iterating the process of the third condition until all the available target channels of the airplanes to be attacked or all the ground-to-air missile weapons are completely distributed.
3. The method according to claim 1, wherein the step of determining the cluster number of the drone cluster, the initial drone rack number of the drone cluster of each batch, and the speed of the drone cluster specifically comprises:
and responding to the initialization operation of a user, and receiving the cluster number of the unmanned aerial vehicle cluster, the initial unmanned aerial vehicle frame number of each batch of the unmanned aerial vehicle cluster and the speed of the unmanned aerial vehicle cluster, which are input by the user.
4. The method of claim 1, wherein the interception parameters of the air defense weapon system are determined by the air defense weapon system hardware.
5. The method of claim 1, wherein the step of calculating in real time the relative distances between the traversed target drone swarm and the different-location air defense weapon systems comprises:
determining a traversed target unmanned aerial vehicle cluster;
calculating a longitude coordinate, a latitude coordinate and an altitude coordinate of the target unmanned aerial vehicle cluster at the moment t when flying along the penetration track according to the speed of the target unmanned aerial vehicle cluster;
and determining the relative distance between the target unmanned aerial vehicle cluster and the air defense weapon systems at different positions at the time t based on the longitude coordinate, the latitude coordinate and the altitude coordinate at the time t.
6. A fire interception threat assessment device for unmanned aerial vehicle cluster defense, characterized in that the device comprises:
the flight path setting unit is used for receiving the sudden defense flight path setting operation of the unmanned aerial vehicle cluster;
the unmanned aerial vehicle parameter setting unit is used for determining the cluster number of the unmanned aerial vehicle cluster, the initial unmanned machine frame number of each batch of unmanned aerial vehicle cluster and the speed of the unmanned aerial vehicle cluster;
the air defense weapon parameter setting unit is used for receiving interception parameters of each air defense weapon system, wherein the interception parameters at least comprise deployment positions, interception ranges, interception precision, target channel numbers, loading numbers and standby numbers;
the relative distance calculation unit is used for traversing each batch of unmanned aerial vehicle cluster, calculating the relative distance between the traversed target unmanned aerial vehicle cluster and the air defense weapon systems at different positions in real time, and taking the air defense weapon system with the shortest relative distance with the target unmanned aerial vehicle cluster as the target air defense weapon system;
the intercepting time calculation unit is used for calculating the intercepting time of the target air defense weapon system to the target unmanned aerial vehicle cluster based on the speed of the target unmanned aerial vehicle cluster and the relative distance between the target unmanned aerial vehicle cluster and the target air defense weapon system;
the fire distribution unit is used for distributing fire of each air defense weapon system at different moments according to a preset fire distribution principle based on the interception parameters of each air defense weapon system, the interception time of the target unmanned aerial vehicle cluster, the cluster batch number and the unmanned rack number to obtain a fire attack mapping relation between the unmanned aerial vehicle cluster and the air defense weapon system at different moments;
the remaining airplane calculation unit is used for calculating the number of remaining airplanes of each batch of unmanned aerial vehicle cluster at the current moment under fire interception respectively according to the fire attack mapping relation between the unmanned aerial vehicle cluster and the air defense weapon system at different moments in real time and by combining the interception precision of the air defense weapon system;
the assessment unit is used for sending the number of remaining airplanes into a preset assessment model for calculation when the unmanned aerial vehicle cluster flies to the sudden prevention flight path end point, and obtaining the average unmanned aerial vehicle damage probability of the unmanned aerial vehicle cluster finishing the sudden prevention flight path;
wherein the preset evaluation model is characterized by the following formula (1):
Figure FDA0002910524500000041
wherein L isPRepresenting the average damage probability of the unmanned aerial vehicle after the target unmanned aerial vehicle cluster finishes the penetration track;
m represents the number of the cluster batches of the unmanned aerial vehicle cluster, wherein the number of the unmanned aerial vehicles of the ith batch of target unmanned aerial vehicle cluster is Ui
ULiAnd the mathematical expected value represents the number of the remaining airplanes when the ith group of target unmanned aerial vehicles complete the penetration under the fire interception of the air defense weapon system.
7. A storage medium, wherein the storage medium is a computer-readable storage medium, and the storage medium stores a computer program for executing the steps of the fire interception threat assessment method for drone swarm defense according to any one of claims 1 to 5.
CN202110084994.XA 2021-01-22 2021-01-22 Fire interception threat assessment method and device for unmanned aerial vehicle cluster defense Pending CN112764429A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110084994.XA CN112764429A (en) 2021-01-22 2021-01-22 Fire interception threat assessment method and device for unmanned aerial vehicle cluster defense

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110084994.XA CN112764429A (en) 2021-01-22 2021-01-22 Fire interception threat assessment method and device for unmanned aerial vehicle cluster defense

Publications (1)

Publication Number Publication Date
CN112764429A true CN112764429A (en) 2021-05-07

Family

ID=75702579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110084994.XA Pending CN112764429A (en) 2021-01-22 2021-01-22 Fire interception threat assessment method and device for unmanned aerial vehicle cluster defense

Country Status (1)

Country Link
CN (1) CN112764429A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113325876A (en) * 2021-06-21 2021-08-31 四川大学 Unmanned aerial vehicle induced penetration strategy
CN113703479B (en) * 2021-08-26 2022-05-17 中国人民解放军国防科技大学 Weapon configuration method and system based on high-density value and large depth

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160097621A1 (en) * 2014-10-06 2016-04-07 The Charles Stark Draper Laboratory, Inc. Multi-hypothesis fire control and guidance
CN110782062A (en) * 2019-03-07 2020-02-11 北京航空航天大学 Many-to-many packet interception target distribution method and system for air defense system
CN111046343A (en) * 2019-12-31 2020-04-21 中国人民解放军海军大连舰艇学院 Method for determining horizontal distance of ship-air missile weapons based on minimum demand damage target probability

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160097621A1 (en) * 2014-10-06 2016-04-07 The Charles Stark Draper Laboratory, Inc. Multi-hypothesis fire control and guidance
CN110782062A (en) * 2019-03-07 2020-02-11 北京航空航天大学 Many-to-many packet interception target distribution method and system for air defense system
CN111046343A (en) * 2019-12-31 2020-04-21 中国人民解放军海军大连舰艇学院 Method for determining horizontal distance of ship-air missile weapons based on minimum demand damage target probability

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
K.HARIHARAN: "A PERSPECTIVE MATHEMATICAL MODEL FOR WEAPON TO TARGET ALLOCATION PROBLEM USING RANDOMIZED TECHNIQUE", 《JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY》, 30 September 2013 (2013-09-30) *
刘剑豪: "无人机蜂群对未来战争的影响及其对应措施分析", 《飞航导弹》, 10 September 2020 (2020-09-10) *
刘己斌: "防空兵抗击无人机蜂群能力分析与评估", 《军事运筹与系统工程》, 31 December 2019 (2019-12-31) *
张永芳;张安;张莉;汤志荔;史志富;: "防区外发射飞机武器系统突防效能分析", 火力与指挥控制, no. 10, 15 October 2007 (2007-10-15) *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113325876A (en) * 2021-06-21 2021-08-31 四川大学 Unmanned aerial vehicle induced penetration strategy
CN113703479B (en) * 2021-08-26 2022-05-17 中国人民解放军国防科技大学 Weapon configuration method and system based on high-density value and large depth

Similar Documents

Publication Publication Date Title
US11669110B2 (en) Control system based on multi-unmanned aerial vehicle cooperative strategic confrontation
CN111880563A (en) Multi-unmanned aerial vehicle task decision method based on MADDPG
CN109658770B (en) Air condition simulation system for civil air defense training
CN112764429A (en) Fire interception threat assessment method and device for unmanned aerial vehicle cluster defense
EP1901144B1 (en) Arrangement and method for generating input information to a simulation device
CN113791634A (en) Multi-aircraft air combat decision method based on multi-agent reinforcement learning
CN112580221B (en) Attack and defense confrontation simulation system
CN109857145B (en) Extended-range type intercepting missile prediction guidance method based on iterative prediction hit point
CN114239728A (en) Multi-domain battlefield situation assessment and threat ranking method
CN110928329A (en) Multi-aircraft track planning method based on deep Q learning algorithm
CN111766901B (en) Multi-unmanned aerial vehicle cooperative target distribution attack method
Wang et al. Multiple UAVs routes planning based on particle swarm optimization algorithm
CN112308422A (en) Task planning and solving simulation system and method for remote aerial support carrier
CN111859541A (en) PMADDPG multi-unmanned aerial vehicle task decision method based on transfer learning improvement
Fu et al. The overview for UAV air-combat decision method
CN110377054B (en) Unmanned aerial vehicle cluster control system and method based on airborne platform
CN115951695A (en) Dynamic tactical control domain resolving method based on three-party game in air combat simulation environment
CN108089456A (en) A kind of aircraft Information System mathematics simulation system based on Attack Defence
CN114357742A (en) Multi-machine air assault cooperative behavior simulation method under interference machine coordination
Wyatt The DARPA/air force unmanned combat air vehicle (UCAV) program
GB2522110A (en) System integration
CN113435005B (en) Automatic airplane design parameter sensitivity analysis and optimization method
CN112818496B (en) Anti-ground-defense strategy based on ant colony algorithm
RU2690234C1 (en) Method of automatic group target allocation of fighters based on priority of targets
Fedunov et al. The real-time approach to solving the problems for the multicriterial choice of alternatives in the knowledge bases of onboard real-time advisory expert systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination