CN115545584A - Air defense threat control method and device, electronic equipment and storage medium - Google Patents

Air defense threat control method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115545584A
CN115545584A CN202211534594.5A CN202211534594A CN115545584A CN 115545584 A CN115545584 A CN 115545584A CN 202211534594 A CN202211534594 A CN 202211534594A CN 115545584 A CN115545584 A CN 115545584A
Authority
CN
China
Prior art keywords
target
value
defended
aerial
threat
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211534594.5A
Other languages
Chinese (zh)
Inventor
孙勇
张少攀
赵金庆
卢广照
王虹富
周强
冯源
刘大卫
田建辉
张健
胡冰甦
郭志明
曹俊卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ordnance Science and Research Academy of China
Original Assignee
Ordnance Science and Research Academy of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ordnance Science and Research Academy of China filed Critical Ordnance Science and Research Academy of China
Priority to CN202211534594.5A priority Critical patent/CN115545584A/en
Publication of CN115545584A publication Critical patent/CN115545584A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Tourism & Hospitality (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Educational Administration (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Feedback Control In General (AREA)

Abstract

The application discloses air defense threat control method, device, electronic equipment and storage medium has solved that current air defense system threatens the target and carries out the accuracy of aassessment not high to air attack, leads to the not good problem of defense effect, air defense threat control method includes: acquiring air target information, guarded target information and fire unit information; determining a guarded target value based on the guarded target information; determining a threat level of the aerial target based on the defended target value and the aerial target information; and carrying out fire distribution based on the fire unit information and the threat degree of the aerial target, obtaining a fire distribution result, and controlling the aerial target according to the fire distribution result.

Description

Air defense threat control method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of air defense technology, and in particular, to a method and an apparatus for controlling air defense threats, an electronic device, and a storage medium.
Background
The air defense system is important defense equipment for air defense, and is mainly used for carrying out reasonable fire distribution on an air attacking target to carry out interception, attack and defense so as to protect the safety of the defended target of one party. Threat estimation aiming at an air attacking target is the basis of fire power distribution, and the accuracy of the threat estimation influences the defense effect of an air defense system. However, in the related art, threat assessment is usually performed on an airborne target based on its own attributes such as type, location, speed, etc., and fire power distribution is performed according to experience to control air defense threats, however, the accuracy of threat assessment on the airborne target is not high, which results in poor defense effect.
Disclosure of Invention
In order to solve the problem that the existing air defense system has poor defense effect due to low accuracy of threat assessment on an air attack target, the embodiment of the application provides an air defense threat control method, an air defense threat control device, electronic equipment and a storage medium.
In a first aspect, an embodiment of the present application provides an air defense threat control method, including:
acquiring air target information, guarded target information and fire unit information;
determining a guarded target value based on the guarded target information;
determining a threat level of the aerial target based on the defended target value and the aerial target information;
and performing fire distribution based on the fire unit information and the threat degree of the aerial target, obtaining a fire distribution result, and controlling the aerial target according to the fire distribution result.
In one possible embodiment, the guarded target information includes at least one or more of the following combinations of information: the number of said defended targets, the urgency of defending of said defended targets, the vulnerability of said defended targets and the degree of exposure of said defended targets;
determining a value of a guarded target based on the guarded target information, specifically comprising:
respectively determining a value quantized value corresponding to the number of the defended targets, a value quantized value corresponding to the defense urgency degree of the defended targets, a value quantized value corresponding to the vulnerability of the defended targets and a value quantized value of the exposure degree of the defended targets;
respectively carrying out normalization processing on each value quantization value to obtain a normalization value of each value quantization value;
determining a first weight corresponding to each of the number of the defended targets, the urgent defending degree of the defended targets, the vulnerability of the defended targets and the exposure degree of the defended targets based on an analytic hierarchy process;
and carrying out weighted summation on the normalized value of each value quantized value and the corresponding first weight to obtain the defended target value.
In one possible embodiment, the aerial target information includes at least one or more of the following: a type of the airborne target, a number of the airborne targets, a distance of the airborne target from the guarded target, a speed of the airborne target, and an air route projection shortcut of the airborne target relative to the guarded target;
determining the threat level of the aerial target based on the defended target value and the aerial target information, specifically comprising:
respectively determining a threat degree quantized value corresponding to the value of the defended target, a threat degree quantized value corresponding to the type of the aerial target, a threat degree quantized value corresponding to the number of the aerial targets, a threat degree quantized value corresponding to the distance between the aerial target and the defended target, a threat degree quantized value corresponding to the speed of the aerial target, and a threat degree quantized value corresponding to the route projection shortcut of the aerial target relative to the defended target;
respectively carrying out normalization processing on each threat degree quantized value to obtain a normalized value of each threat degree quantized value;
determining, based on an analytic hierarchy process, respective second weights for the defended target value, the type of the aerial target, the number of the aerial targets, the distance of the aerial target from the defended target, the velocity of the aerial target, and the aerial target's aerial path projection shortcut relative to the defended target;
and carrying out weighted summation on the normalized value of each quantized threat degree value and the corresponding second weight to obtain the threat degree of the aerial target.
In one possible embodiment, the urgency of defending of the defended target characterizes the urgency of defending of the defended target, the vulnerability of the defended target characterizes the difficulty of functionally damaging the defended target under the set attack condition and the ability to repair after damage, and the exposure of the defended target characterizes the difficulty of discovering the defended target.
In one possible embodiment, the method further includes:
and sorting and displaying the defended target value according to the size.
In one possible embodiment, the method further includes:
and sequencing and displaying the threat degrees of the aerial targets according to the sizes.
In a second aspect, an embodiment of the present application provides an air defense threat control apparatus, including:
the acquiring unit is used for acquiring air target information, guarded target information and fire unit information;
a value estimation unit for determining a guarded target value based on the guarded target information;
a threat estimation unit for determining a threat level of the aerial target based on the defended target value and the aerial target information;
and the control unit is used for carrying out firepower distribution on the basis of the firepower unit information and the threat degree of the aerial target, obtaining a firepower distribution result and controlling the aerial target according to the firepower distribution result.
In one possible embodiment, the defended target information includes at least one or more of the following information in combination: the number of the defended targets, the urgency of defending of the defended targets, the vulnerability of the defended targets and the degree of exposure of the defended targets;
the value estimation unit is specifically configured to determine a value quantization value corresponding to the number of the secured objects, a value quantization value corresponding to the urgency of security of the secured objects, a value quantization value corresponding to the vulnerability of the secured objects, and a value quantization value of the exposure of the secured objects, respectively; respectively carrying out normalization processing on each value quantization value to obtain a normalization value of each value quantization value; determining first weights corresponding to the number of the defended targets, the urgent defending degree of the defended targets, the vulnerability of the defended targets and the exposure degree of the defended targets respectively based on an analytic hierarchy process; and carrying out weighted summation on the normalized value of each value quantized value and the corresponding first weight to obtain the defended target value.
In one possible embodiment, the aerial target information includes at least one or more of the following: a type of the airborne target, a number of the airborne targets, a distance of the airborne target from the guarded target, a speed of the airborne target, and an air route projection shortcut of the airborne target relative to the guarded target;
the threat estimation unit is specifically configured to determine a threat degree quantized value corresponding to a value of the guarded target, a threat degree quantized value corresponding to a type of the aerial target, a threat degree quantized value corresponding to a number of the aerial targets, a threat degree quantized value corresponding to a distance between the aerial target and the guarded target, a threat degree quantized value corresponding to a speed of the aerial target, and a threat degree quantized value corresponding to a route projection shortcut of the aerial target relative to the guarded target, respectively; respectively carrying out normalization processing on each threat degree quantized value to obtain a normalized value of each threat degree quantized value; determining a second weight corresponding to each of the defended target value, the type of the aerial target, the number of the aerial targets, the distance between the aerial target and the defended target, the speed of the aerial target, and the route projection shortcut of the aerial target relative to the defended target based on an analytic hierarchy process; and carrying out weighted summation on the normalized value of each quantified value of the threat degree and the corresponding second weight to obtain the threat degree of the aerial target.
In one possible embodiment, the degree of urgency of defending of the defended target characterizes the degree of urgency of defending of the defended target, the vulnerability of the defended target characterizes the difficulty of the defended target in function impairment and ability to repair after impairment under set attack conditions, and the degree of exposure of the defended target characterizes the difficulty of the defended target in discovery.
In a possible implementation, the apparatus further includes:
and the first display unit is used for sequencing and displaying the value of the defended target according to the size.
In a possible implementation, the apparatus further includes:
and the second display unit is used for sequencing and displaying the threat degrees of the aerial targets according to the size.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the air defense threat control method described in the present application when executing the program.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the steps in the air defense threat control method described in the present application.
The beneficial effect of this application is as follows:
compared with the prior art, in the air defense threat control scheme provided by the embodiment of the application, the control target information, the defended target information and the fire unit information are obtained, the value of the defended target is determined based on the defended target information, the threat degree of the air target is determined based on the defended target value and the air target information, fire distribution is carried out based on the fire unit information and the threat degree of the air target, a fire distribution result is obtained, and the air target is controlled according to the fire distribution result.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic view of an application scenario of an air defense threat control method provided in an embodiment of the present application;
fig. 2 is an operation flowchart of an initialization model of an air defense system according to an embodiment of the present application;
fig. 3 is a data flow diagram of an initialization model of an air defense system according to an embodiment of the present application;
fig. 4 is an operation flowchart of a dynamic data loading model of an air defense system according to an embodiment of the present application;
FIG. 5 is a data flow diagram of a dynamic data loading model of an air defense system according to an embodiment of the present application;
FIG. 6 is a flowchart illustrating the operation of a defended target value estimation model according to an embodiment of the present application;
FIG. 7 is a data flow diagram of a defended target value estimation model provided by an embodiment of the present application;
FIG. 8 is a flowchart illustrating the operation of an airborne target threat estimation model provided in an embodiment of the present application;
FIG. 9 is a data flow diagram of an airborne target threat estimation model provided by an embodiment of the present application;
FIG. 10 is a flowchart illustrating operation of a human-computer interaction model of the air defense system according to an embodiment of the present application;
FIG. 11 is a data flow diagram of a man-machine interaction model of the air defense system according to an embodiment of the present application;
fig. 12 is a schematic implementation flowchart of an air defense threat control method according to an embodiment of the present application;
FIG. 13 is a schematic diagram of an aerial target relative to a guarded target for route projection shortcuts according to an embodiment of the present application;
FIG. 14 is a schematic flow chart illustrating an implementation of determining a value of a defended target according to an embodiment of the present application;
FIG. 15 is a schematic flow chart illustrating an implementation of determining a threat level of an airborne target according to an embodiment of the present application;
fig. 16 is a schematic structural diagram of an air defense threat control apparatus according to an embodiment of the present application;
fig. 17 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to solve the problems in the background art, embodiments of the present application provide an air defense threat control method, apparatus, electronic device, and storage medium.
The preferred embodiments of the present application will be described in conjunction with the drawings of the specification, it should be understood that the preferred embodiments described herein are only for illustrating and explaining the present application, and are not intended to limit the present application, and the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
Referring first to fig. 1, which is an application scenario schematic diagram of the air defense threat control method provided in the embodiment of the present application, that is, a block diagram of an air defense system 100 applied by the air defense threat control method provided in the embodiment of the present application, where the air defense system 100 may include, but is not limited to: the method comprises an air defense system initialization model 101, an air defense system dynamic data loading model 102, a defended target value estimation model 103, an air target threat estimation model 104 and an air defense system human-computer interaction model 105. The air defense system initialization model 101 is used for loading deployment data of an operation unit and performance data of an air defense weapon system, wherein the deployment data of the operation unit comprises position information and state information (such as states of whether the system is normal, whether a fault occurs, whether maintenance is in progress and the like) of the air defense weapon system of one party (such as travel, group, camp and the like of an army), and the like, the air defense weapon system comprises an air defense antiaircraft system and an air defense missile system, the performance data of the air defense weapon system comprises air defense antiaircraft system performance data and air defense missile system performance data, and the air defense antiaircraft system performance data comprises: the number of antiaircraft guns, the launching distance, the launching speed and the like, and the performance data of the air defense missile system comprise: number of missiles, launch distance, launch speed, etc. The operation flow of the air defense system initialization model 101 is shown in fig. 2, and the input data includes: the combat unit deploys files, and the output data comprises: operational unit deployment data and air defense weapon system performance data. The data flow diagram of the initialization model of the air defense system is shown in fig. 3, and the data flow is as follows: and after the deployment file of the combat unit is read, analyzing deployment data of the combat unit and performance data of the air defense weapon system. The air defense system dynamic data loading model 102 is used for dynamically loading data such as air target (namely an air attack target) information, guarded target information, fire unit information, upper fire distribution result information and the like according to a preset time period. The preset time period may be set by itself, for example, may be set to 2s, which is not limited in the embodiment of the present application, and the air target information at least includes one or a combination of the following information: the type of the aerial target, the number of the aerial targets, the distance between the aerial target and the guarded target, the speed of the aerial target, the route projection shortcut of the aerial target relative to the guarded target and the like, wherein the aerial target information can be obtained by radar detection. Types of airborne targets may include, but are not limited to, the following: large aircraft, small aircraft, armed helicopters, cruise missiles, and the like. The targets to be defended can be divided into point targets and surface targets, the point targets are independent targets with small size and certain functions, such as bridges, radars, oil depots and the like, for a target group consisting of a plurality of single targets, if the aircraft can aim and bombe individual single targets in the target group when performing tasks, the target group also needs to be regarded as the point targets, the surface targets are a group of targets irregularly distributed in a certain area range, such as a plurality of same or different targets distributed in a certain area range, the same or different targets are not easily distinguished from each other, and the area occupied by the targets can be regarded as a whole, namely the surface targets are regarded as surface targets, such as railway hubs, army collection areas, parking stalls and the like. The defended target information at least comprises one or more of the following information combinations: the method comprises the following steps that information such as the number of defended targets, the urgent degree of defending of the defended targets, the vulnerability of the defended targets, the exposure degree of the defended targets and the like is obtained, wherein the urgent degree of defending of the defended targets represents the urgent degree of defending of the defended targets, namely the safety degree of a war process and other targets is influenced, and the urgent degree of the defended targets is determined to be limited by the threat degree of aerial targets, such as attempts, scales of air attack, main directions and targets of air attack, input military force weapons, adopted war operation sections and the like; the vulnerability of the guarded target represents the difficulty level of the function damage of the guarded target under the set attack condition and the repair capability after the damage, and the vulnerability of the guarded target can be determined according to the relevant tactical and technical indexes of the guarded target, such as the correlation of factors such as the shape, the firmness degree and the repair difficulty of the guarded target; the exposure degree of the guarded target represents the difficulty degree of the guarded target being discovered, reflects the possibility that the guarded target is discovered by the aerial target, directly influences the battlefield viability of the guarded target, is reasonably configured, disguised and concealed, and can reduce the exposure degree of the guarded target. The fire unit information may include: state information of the antiaircraft gun and the missile: whether a fault has occurred, information on the amount of ammunition changed, whether it is being used (i.e., busy or idle information), etc. The command hierarchy of the air defense system may include: group command, grade command, cascade command, etc., the command mode can include: centralized commanding and decentralized commanding, when fire power distribution is performed, the distribution mode can include: the upper-level firepower distribution result refers to the firepower distribution result which is distributed for the protected target by one (or multiple) command level above the command level of the current level and is used for resisting the aerial target. The operation flow of the air defense system dynamic data loading model 102 is shown in fig. 4, and input data is read at regular time, and the input data includes: the air target information, the defended target information, the firepower unit information and the upper firepower distribution result information output data comprises: the data flow chart of the air target information, the guarded target information, the fire unit information and the upper fire distribution result information, and the dynamic data loading model 102 of the air defense system is shown in fig. 5, and the data flow is as follows: the air defense system dynamic data loading model 102 loads input data according to a preset time period. The defended target value estimation model 103 is used for calculating the defended target value, the operation flow of the defended target value estimation model 103 is shown in fig. 6, and the input data are: the defended target information outputs data as follows: the data flow of the guarded target value estimation model 103 is shown in fig. 7, and the data flow includes: the air defense system dynamic data loading model 102 sends the loaded defended target information to the defended target value estimation model 103, and the defended target value estimation model 103 estimates the defended target value after acquiring the defended target information sent by the air defense system dynamic data loading model 102. The aerial target threat estimation model 104 is configured to estimate a threat level of an aerial target (that is, a threat level of the aerial target to a protected target), and an operation flow of the aerial target threat estimation model 104 is as shown in fig. 8, and reads aerial target information, reads a value of the protected target, calculates a threat level of the aerial target to the protected target based on the value of the protected target and the aerial target information, further determines whether there is any defended target, and if yes, continues to read the value of the protected target, calculates a threat level of the aerial target to the protected target until no new defended target is introduced, sorts the calculated threat levels of the aerial targets according to magnitude, and may sort according to a sequence of the threat levels from large to small, or sort according to a sequence of the threat levels from small to large, which is not limited in the embodiment of the present application. The data flow of the aerial target threat estimation model 104 is as shown in fig. 9, the aerial target threat estimation model 104 obtains aerial target information sent by the air defense system dynamic data loading model 102 and guarded target value sent by the guarded target value estimation model 103, and estimates the threat degree of the aerial target based on the guarded target value and the aerial target information. The air defense system human-computer interaction model 105 is used for human-computer interaction, corresponding data in data obtained by loading or calculating the four models 101 to 104 are displayed according to a viewing instruction, the operation flow of the air defense system human-computer interaction model 105 is shown in fig. 10, and input data comprises: command level information, command mode information, firepower distribution mode information, information viewing instructions and the like, wherein the output data comprises: command level information, command mode information, firepower distribution mode information, information viewing instructions and the like, wherein the command mode information can also comprise firepower unit number information, and the display information can comprise: air target information, guarded target value information, air target threat degree information, fire unit information, upper-level fire distribution result information, local-level fire distribution result information and the like, when the designated command mode is centralized command, a next-level fire unit can be designated step by step, or a next-level (or multi-level) fire unit can be designated by step, fire distribution is automatically carried out based on the designated fire unit information and the threat degree of the air target to obtain an automatic fire distribution result, if a commander needs to adjust the automatic fire distribution result, the local-level fire unit which can be used for fire distribution can be selected in a drop-down frame of a table column of the fire unit corresponding to the guarded target, the fire distribution result is adjusted, when the designated command mode is decentralized command, fire distribution is carried out according to the designated fire unit through preset rules, and the preset rules can be set as follows: and if the position of the aerial target is determined to fall into the area range of the specified fire unit corresponding to the defended target, using the specified fire unit to defend the aerial target against the attack. The data flow of the air defense system human-computer interaction model 105 is shown in fig. 11, and the data flow includes: and reading data input by the models 101 to 104, reading and displaying man-machine interaction information.
The air defense system in the embodiment of the present application may be deployed on a server or may be deployed on a terminal device, which is not limited in the embodiment of the present application.
Based on the above application scenarios, exemplary embodiments of the present application will be described in detail below, and it should be noted that the above application scenarios are only shown for the convenience of understanding the spirit and principles of the present application, and the embodiments of the present application are not limited in any way herein. Rather, embodiments of the present application may be applied to any scenario where applicable.
As shown in fig. 12, which is a schematic implementation flow diagram of the air defense threat control method provided in the embodiment of the present application, applied to the air defense system shown in fig. 1, may include the following steps:
s21, acquiring air target information, guarded target information and fire unit information.
During specific implementation, air target information, guarded target information, firepower unit information and air defense weapon system performance data information are obtained. The aerial target information can be obtained by detecting the aerial target through a radar, and the aerial target information at least comprises one or more of the following information combinations: the type of airborne target, the number of airborne targets, the distance of the airborne target from the guarded target, the velocity of the airborne target, and the route projection shortcut of the airborne target relative to the guarded target. The defended target information at least comprises one or more of the following information combinations: the number of targets to be defended, the urgency of defending the targets to be defended, the vulnerability of the targets to be defended, the exposure of the targets to be defended, and the like. The air defense weapon system comprises an air defense antiaircraft gun system and an air defense missile system, the performance data of the air defense weapon system comprises the performance data of the air defense antiaircraft gun system and the performance data of the air defense missile system, and the performance data of the air defense antiaircraft gun system comprises the following steps: the number of antiaircraft guns, the launching distance, the launching speed and the like, and the performance data of the air defense missile system comprise: number of missiles, launch distance, launch speed, etc. The fire unit information includes at least the following information: state information of the antiaircraft gun and the missile: whether a fault has occurred, information on the amount of ammunition changed, whether it is being used (i.e., busy or idle), etc.
In practice, the route projection shortcut of the aerial target relative to the protected target can be obtained by the following modes: in the case of horizontal constant-velocity linear flight, a rectangular coordinate system with the protected target as the origin of coordinates is established, and the route projection shortcut of the aerial target j relative to the protected target can be calculated by the following formula:
Figure 839230DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 959633DEST_PATH_IMAGE002
for the component velocity of the aerial target j on the X-axis,
Figure 660741DEST_PATH_IMAGE003
for the component velocity of the aerial target j on the Y-axis,
Figure 118267DEST_PATH_IMAGE004
coordinates of an airborne target j in a coordinate system of a guarded target are shown in fig. 13, which is a schematic diagram of a route projection shortcut of the airborne target j relative to the guarded target,
Figure 247154DEST_PATH_IMAGE005
namely the route projection shortcut, when the aerial target flies to the point A, the OA is
Figure 600775DEST_PATH_IMAGE005
And S22, determining the value of the defended target based on the defended target information.
In specific implementation, the method for determining the value of the defended target according to the process shown in fig. 14 includes the following steps:
s221, respectively determining a value quantization value corresponding to the number of the guarded targets, a value quantization value corresponding to the guard urgency degree of the guarded targets, a value quantization value corresponding to the vulnerability of the guarded targets and a value quantization value of the exposure degree of the guarded targets.
In specific implementation, the value of each protected target is estimated as follows: when quantifying the value of the number of secured targets, the urgency of securing of secured targets, the vulnerability of secured targets, and the exposure of secured targets, the value can be quantified according to the value level set in advance for each value estimation factor.
Specifically, n value levels may be set in advance, for example, n =5, the higher the value is, and if the number of guarded targets is between [1, a 1), the value level is 1, and the value quantization value corresponding to the number of guarded targets is 1; when the number of the defended targets is between [ a1 and a 2), the value grade is 2 grade, and the value quantization value corresponding to the number of the defended targets is 2; when the number of the defended targets is between [ a2 and a 3), the value grade is 3 grade, and the value quantization value corresponding to the number of the defended targets is 3; when the number of the guarded targets is between [ a3 and a 4), the value grade is 4 grades, and the value quantization value corresponding to the number of the guarded targets is 4; when the number of the guarded targets is greater than or equal to a4, the value grade is 5 grades, and the value quantization value corresponding to the number of the guarded targets is 5. The values of a 1-a 4 can be set according to empirical values, and the method is not limited in the embodiment of the application.
The higher the guard urgency degree of the guarded target is, the higher the value of the guarded target is, the guard urgency degree of the guarded target can be divided into three grades, namely a high grade, a medium grade and a low grade, and the corresponding value grades are respectively as follows: 3. level 2, level 1, when the degree of urgency of defending of the defended target is "high", the value quantization value corresponding to the degree of urgency of defending of the defended target can be set as: 3; when the degree of urgency of defending the defended target is "medium", the value quantization value corresponding to the degree of urgency of defending the defended target can be set as: 2; when the degree of urgency of defending the defended target is "low", the value quantization value corresponding to the degree of urgency of defending the defended target can be set as: the embodiments of the present application are not limited thereto.
The higher the vulnerability of the defended target is, the higher the value of the defended target is, the vulnerability of the defended target can be divided into three grades of high, medium and low, and the corresponding value grades are respectively: 3. and 2, 1, when the vulnerability of the protected target is 'high', setting the value quantization value corresponding to the vulnerability of the protected target as follows: 3; when the vulnerability of the defended target is 'middle', the value quantization value corresponding to the vulnerability of the defended target can be set as: 2; when the vulnerability of the defended target is "low", the value quantization value corresponding to the vulnerability of the defended target can be set as: the embodiments of the present application are not limited thereto.
The higher the exposure degree of the guarded target is, the higher the value of the guarded target is, the exposure degree of the guarded target can be divided into three grades of high, medium and low, and the corresponding value grades are respectively: 3. level 2, level 1, when the exposure degree of the guarded target is "high", the value quantization value corresponding to the exposure degree of the guarded target can be set as: 3; when the exposure degree of the defended target is "medium", the value quantization value corresponding to the exposure degree of the defended target can be set as: 2; when the exposure degree of the guarded target is "low", the value quantization value corresponding to the exposure degree of the guarded target may be set as: the embodiments of the present application are not limited thereto.
S222, respectively carrying out normalization processing on each value quantized value to obtain a normalized value of each value quantized value.
In specific implementation, the value quantization value corresponding to the number of the secured target, the value quantization value corresponding to the security urgency degree of the secured target, the value quantization value corresponding to the vulnerability of the secured target, and the value quantization value corresponding to the exposure degree of the secured target are respectively normalized to obtain the normalized value of the value quantization value corresponding to the number of the secured target, the normalized value of the value quantization value corresponding to the security urgency degree of the secured target, the normalized value of the value quantization value corresponding to the vulnerability of the secured target, and the normalized value of the value quantization value corresponding to the exposure degree of the secured target.
S223, determining first weights corresponding to the number of the defended targets, the urgent defending degree of the defended targets, the vulnerability of the defended targets and the exposure degree of the defended targets based on the analytic hierarchy process.
In specific implementation, the quantity of the targets to be secured, the urgency of securing of the targets to be secured, the vulnerability of the targets to be secured, and the exposure of the targets to be secured are determined according to the comparison and analysis of the value estimation factors of the targets to be secured based on the analytic hierarchy process (which may be referred to as a first weight). The number of targets to be secured, the urgency of securing of the targets to be secured, the vulnerability of the targets to be secured, and the exposure of the targets to be secured may be set according to the empirical value, which is not limited in the embodiments of the present application.
S224, carrying out weighted summation on the normalized value of each value quantized value and the corresponding first weight to obtain the value of the defended target.
In specific implementation, the normalized value of the quantized value corresponding to the number of the secured target, the normalized value of the quantized value corresponding to the security urgency of the secured target, the normalized value of the quantized value corresponding to the vulnerability of the secured target, the normalized value of the quantized value corresponding to the exposure of the secured target, and the respective corresponding weights (i.e., the first weights) are weighted and summed to obtain the value of the secured target.
And after the value of the defended target in the current time period is calculated, the value of the defended target can be sorted according to the size and displayed.
And S23, determining the threat degree of the aerial target based on the value of the defended target and the aerial target information.
In specific implementation, the threat level of the aerial target may be determined according to the process shown in fig. 15, including the following steps:
s231, respectively determining a threat degree quantized value corresponding to the value of the guarded target, a threat degree quantized value corresponding to the type of the aerial target, a threat degree quantized value corresponding to the number of the aerial targets, a threat degree quantized value corresponding to the distance between the aerial target and the guarded target, a threat degree quantized value corresponding to the speed of the aerial target, and a threat degree quantized value corresponding to the route projection shortcut of the aerial target relative to the guarded target.
In specific implementation, factors are estimated for each threat level of an airborne target: when the threat degree is quantified according to the value of the defended target, the type of the aerial target, the number of the aerial targets, the distance between the aerial target and the defended target, the speed of the aerial target and the route projection shortcut of the aerial target relative to the defended target, the threat degree can be quantified according to the threat degree grades which are preset for each threat degree estimation factor.
Specifically, the higher the value of the defended target is, the higher the threat of the aerial target to the defended target is, and if the value of the defended target is between (0, b 1), the threat degree level is 1 level, and the threat degree quantized value corresponding to the value of the defended target is 1; when the value of the defended target is between [ b1, b 2), the threat degree grade is 2 grade, and the threat degree quantized value corresponding to the value of the defended target is 2; when the value of the guarded target is between [ b2, b 3), the threat degree grade is 3 grade, and the threat degree quantized value corresponding to the value of the guarded target is 3; when the value of the guarded target is between [ b3, b 4), the threat degree grade is 4 grade, and the threat degree quantized value corresponding to the value of the guarded target is 4; when the value of the defended target is between [ b4 and 1], the threat degree grade is 5 grade, and the threat degree quantized value corresponding to the value of the defended target is 5. The values of b 1-b 4 can be set according to empirical values, and the method is not limited in the embodiment of the application.
The types of airborne targets can be divided into: the threat degree of the cruise missile to each medium-sized target is large, and based on the threat degree, the threat degree of the cruise missile to various aerial targets can be quantified based on the type of the guarded target. When the protected target is a planar target, the threat degree grade of the large airplane can be set as follows: and 3, the quantified value of the threat degree corresponding to the type of the aerial target is as follows: 3; the threat level of the small airplane is set as follows: 1, the quantified value of the threat degree corresponding to the type of the aerial target is as follows: 1; the threat degree grade of the armed helicopter is set as follows: and 2, the quantified value of the threat degree corresponding to the type of the aerial target is as follows: 2; the threat degree grade of the cruise missile is set as follows: and 4, the quantified value of the threat degree corresponding to the type of the aerial target is as follows: 4, this is not limited in the examples of the present application.
When the type of the aerial target is a mainframe, the aerial target can be a medium threat when the number of mainframes is set to be c1 (c 1 can be 1 or 2), the threat level can be set to be 3, and then the threat level quantization value corresponding to the type of the aerial target is: 3, if the number of mainframes is set as c2 (c 2 may be 3, 4 or 5), the mainframes are a large threat, the threat level may be set as 4, and the quantized value of the threat level corresponding to the type of the aerial target is: 4, when the number of mainframes is set to be greater than or equal to c3 (c 3 may be 6) frames, the maximum threat level is set to be 5, and then the quantized value of the threat level corresponding to the type of the aerial target is: 5. when the type of the aerial target is a mini-machine, the minimum threat can be set when the number of the mini-machines is d1 (d 1 can be 1), the threat degree grade can be set to 1, and then the threat degree quantized value corresponding to the type of the aerial target is: 1, if the number of the mini-machines is set to d2 (d 2 can be 2 or 3), the medium threat level is set to 3, and the quantified value of the threat level corresponding to the type of the aerial target is: 3, if the number of the small machines is set as d3 (d 3 can be 4, 5, 6 or 7), the larger threat level is set as 4, and then the quantified value of the threat level corresponding to the type of the aerial target is: 4, when the number of mainframes is set to be greater than or equal to d4 (d 4 may be 8) frames, the maximum threat level is set to be 5, and then the quantized value of the threat level corresponding to the type of the aerial target is: 5. when the type of the aerial target is cruise missile, the number of the cruise missiles can be set as e1 (e 1 can be 1), the threat degree grade can be set as 2, and then the threat degree quantized value corresponding to the type of the aerial target is as follows: 2, the number of the cruise missiles is set as e2 (e 2 may be 2), the number of the cruise missiles is set as a large threat, the threat degree grade may be set as 4, and then the threat degree quantized value corresponding to the type of the aerial target is: 4, setting the number of the cruise missiles to be greater than or equal to e3 (e 2 can be 3) frames as the maximum threat, setting the threat degree grade to be 5, and setting the threat degree quantized value corresponding to the type of the aerial target as: 5. when the type of the aerial target is a gunship, the number of cruise missiles can be set to be f1 (f 1 can be 1), the threat degree level can be set to be 2, and the corresponding threat degree quantized value of the type of the aerial target is as follows: 2, if the number of the cruise missiles is set to be f2 (f 2 can be 2), the medium threat is obtained, the threat degree grade can be set to be 3, and then the threat degree quantized value corresponding to the type of the aerial target is as follows: 3, when the number of the cruise missiles is set to be f3 (f 3 can be 3, 4 or 5), the missiles are a large threat, the threat degree grade can be set to be 4, and then the threat degree quantized value corresponding to the type of the aerial target is as follows: and 4, setting the number of the cruise missiles to be greater than or equal to f4 (f 4 can be 6) frames as the maximum threat, setting the threat degree grade to be 5, and setting the threat degree quantized value corresponding to the type of the aerial target to be 5. In implementation, the number value of the aerial targets on which the threat levels of the aerial targets of the various types are determined may be set according to actual experience, which is not limited in the embodiment of the present application.
The closer the distance between the aerial target and the defended target is, the higher the threat of the aerial target to the defended target is, and if the distance between the aerial target and the defended target is between (h 1 and h 2), the threat degree grade is 5 grade, and the threat degree quantized value corresponding to the distance between the aerial target and the defended target is 5; when the distance between the aerial target and the defended target is between [ h2, h 3), the threat degree grade is 4 grade, and the threat degree quantized value corresponding to the distance between the aerial target and the defended target is 4; when the distance between the aerial target and the defended target is between [ h3, h4 ], the threat degree grade is 3 grade, and the threat degree quantized value corresponding to the distance between the aerial target and the defended target is 3; when the distance between the aerial target and the defended target is between [ h4, h 5), the threat degree grade is 2 grade, and the threat degree quantized value corresponding to the distance between the aerial target and the defended target is 2; when the distance between the aerial target and the defended target is greater than or equal to h5, the threat degree grade is 1 grade, and the threat degree quantized value corresponding to the distance between the aerial target and the defended target is 1. The value of h 1-h 5 can be set according to an empirical value, and the embodiment of the application is not limited to the above. It should be noted that, when the distance between the aerial target and the guarded target is not less than the attack distance of the aerial target, the closer the distance between the aerial target and the guarded target is, the higher the threat degree of the aerial target to the guarded target is, and when the distance between the aerial target and the guarded target is less than the attack distance of the aerial target, the closer the distance between the aerial target and the guarded target is, the lower the threat degree of the aerial target to the guarded target is, therefore, the value of h1 is the value in the case that the distance is greater than or equal to the attack distance of the aerial target, if h1 is less than the attack distance of the aerial target, the threat level may be correspondingly lower, the specific setting of the threat level may be set according to an empirical value, which is not described herein again.
The larger the speed of the aerial target is, the higher the threat of the aerial target to the defended target is, and if the speed of the aerial target is between (0, v1), the threat degree grade is 1 grade, and the threat degree quantized value corresponding to the speed of the aerial target is 1; when the speed of the aerial target is between [ v1, v 2), the threat degree grade is 2 grade, and the threat degree quantized value corresponding to the speed of the aerial target is 2; when the speed of the aerial target is between [ v2, v 3), the threat degree grade is 3 grade, and the threat degree quantized value corresponding to the speed of the aerial target is 3; when the speed of the aerial target is between [ v3, v 4), the threat degree grade is 4 grade, and the threat degree quantized value corresponding to the speed of the aerial target is 4; when the speed of the aerial target is greater than or equal to v4, the threat degree grade is 5 grade, and the threat degree quantized value corresponding to the speed of the aerial target is 5. The values of v1 to v4 can be set according to empirical values, and the embodiment of the application is not limited to the values.
The smaller the route projection shortcut of the aerial target relative to the protected target is, the higher the threat of the aerial target to the protected target is, and if the route projection shortcut of the aerial target relative to the protected target is between (l 1, l 2), the threat degree grade is 5 grade, and the threat degree quantized value corresponding to the route projection shortcut of the aerial target relative to the protected target is 5; when the route projection shortcut of the aerial target relative to the protected target is between [ l2, l3 ], the threat degree grade is 4 grade, and the threat degree quantized value corresponding to the route projection shortcut of the aerial target relative to the protected target is 4; when the route projection shortcut of the aerial target relative to the defended target is between [ l3, l 4), the threat degree grade is 3 grade, and the threat degree quantization value corresponding to the route projection shortcut of the aerial target relative to the defended target is 3; when the route projection shortcut of the aerial target relative to the protected target is between [ l4, l5 ], the threat degree grade is 2 grade, and the threat degree quantized value corresponding to the route projection shortcut of the aerial target relative to the protected target is 2; when the route projection shortcut of the aerial target relative to the protected target is greater than or equal to l5, the threat degree grade is 1 grade, and the threat degree quantized value corresponding to the route projection shortcut of the aerial target relative to the protected target is 1. The values of l1 to l5 can be set according to empirical values, and the values are not limited in the embodiment of the application.
And S232, respectively carrying out normalization processing on each threat degree quantized value to obtain a normalized value of each threat degree quantized value.
During specific implementation, normalization processing is respectively carried out on a threat degree quantized value corresponding to the value of a guarded target, a threat degree quantized value corresponding to the type of an aerial target, a threat degree quantized value corresponding to the number of aerial targets, a threat degree quantized value corresponding to the distance between the aerial target and the guarded target, a threat degree quantized value corresponding to the speed of the aerial target, and a threat degree quantized value corresponding to the aerial route projection shortcut of the aerial target relative to the guarded target, so as to obtain a normalized value of the threat degree quantized value corresponding to the value of the guarded target, a normalized value of the threat degree quantized value corresponding to the type of the aerial target, a normalized value of the threat degree quantized value corresponding to the number of the aerial target, a normalized value of the threat degree quantized value corresponding to the distance between the aerial target and the guarded target, a normalized value of the threat degree quantized value corresponding to the speed of the aerial target, and a normalized value of the threat degree quantized value corresponding to the aerial route projection shortcut of the aerial target relative to the guarded target.
And S233, determining the value of the defended target, the type of the aerial target, the number of the aerial targets, the distance between the aerial target and the defended target, the speed of the aerial target and second weights respectively corresponding to the aerial route projection shortcuts of the aerial target relative to the defended target based on the analytic hierarchy process.
In specific implementation, the evaluation factors of the threat degree of the aerial target are compared and analyzed based on an analytic hierarchy process, and the evaluation factors of the threat degree are determined as follows: the value of the defended target, the type of the aerial target, the number of aerial targets, the distance between the aerial target and the defended target, the speed of the aerial target, and the weight (which can be referred to as a second weight) corresponding to each of the aerial target's projected shortcuts of the air path relative to the defended target. The value of the defended target, the type of the aerial target, the number of the aerial targets, the distance between the aerial target and the defended target, the speed of the aerial target, and the weight corresponding to the route projection shortcut of the aerial target relative to the defended target can be set according to the empirical value, which is not limited in the embodiment of the present application.
And S234, carrying out weighted summation on the normalized value of each threat degree quantized value and the corresponding second weight to obtain the threat degree of the aerial target.
During specific implementation, the normalized value of the quantized value of the threat degree corresponding to the value of the guarded target, the normalized value of the quantized value of the threat degree corresponding to the type of the aerial target, the normalized value of the quantized value of the threat degree corresponding to the number of the aerial targets, the normalized value of the quantized value of the threat degree corresponding to the distance between the aerial target and the guarded target, the normalized value of the quantized value of the threat degree corresponding to the speed of the aerial target, the normalized value of the quantized value of the threat degree corresponding to the route projection shortcut of the aerial target relative to the guarded target, and the respective corresponding weights (i.e., the second weights) are weighted and summed to obtain the threat degree of the aerial target.
And after the threat degree of the aerial target in the current time period is calculated, the threat degrees of the aerial target can be ranked and displayed according to the size.
And S24, performing fire power distribution based on the fire power unit information and the threat degree of the air target, obtaining a fire power distribution result, and controlling the air target according to the fire power distribution result.
In specific implementation, fire distribution can be carried out according to the damage capability of the fire unit and the threat degree of the aerial target, and the threat degree of the aerial target is positively correlated with the damage capability of the fire unit distributed to the aerial target.
Specifically, the fire units with large damage capability can be distributed to the aerial targets with large threat degree, the fire units with small damage capability can be distributed to the aerial targets with low threat degree, the specific distribution rules can be set according to the requirements, and the embodiment of the application is not limited to the specific distribution rules.
Compared with the prior art, in the embodiment of the application, the defended target value is determined based on the defended target information, the threat degree of the air target is determined based on the defended target value and the air target information, the firepower distribution is carried out based on the firepower unit information and the threat degree of the air target, the firepower distribution result is obtained, and the air target is controlled according to the firepower distribution result.
Based on the same inventive concept, the embodiment of the application also provides an air defense threat control device, and as the principle of solving the problems of the air defense threat control device is similar to that of the air defense threat control method, the implementation of the device can be referred to the implementation of the method, and repeated parts are not described again.
As shown in fig. 16, which is a schematic structural diagram of an air defense threat control apparatus provided in an embodiment of the present application, the air defense threat control apparatus may include:
an acquiring unit 31 for acquiring air target information, guarded target information and fire unit information;
a value estimation unit 32 for determining a guarded target value based on the guarded target information;
a threat estimation unit 33 for determining a threat level of the aerial target based on the defended target value and the aerial target information;
and the control unit 34 is used for performing fire power distribution based on the fire power unit information and the threat degree of the aerial target, obtaining a fire power distribution result, and controlling the aerial target according to the fire power distribution result.
In one possible embodiment, the guarded target information includes at least one or more of the following combinations of information: the number of said defended targets, the urgency of defending of said defended targets, the vulnerability of said defended targets and the degree of exposure of said defended targets;
the value estimation unit 32 is specifically configured to determine a value quantization value corresponding to the number of the secured objects, a value quantization value corresponding to the urgency of securing of the secured objects, a value quantization value corresponding to the vulnerability of the secured objects, and a value quantization value of the exposure of the secured objects, respectively; respectively carrying out normalization processing on each value quantization value to obtain a normalization value of each value quantization value; determining a first weight corresponding to each of the number of the defended targets, the urgent defending degree of the defended targets, the vulnerability of the defended targets and the exposure degree of the defended targets based on an analytic hierarchy process; and carrying out weighted summation on the normalized value of each value quantization value and the corresponding first weight to obtain the value of the defended target.
In one possible embodiment, the aerial target information includes at least one or more of the following: a type of the airborne target, a number of the airborne targets, a distance of the airborne target from the guarded target, a velocity of the airborne target, and an aerial route projection shortcut of the airborne target relative to the guarded target;
the threat estimation unit 33 is specifically configured to determine a threat level quantized value corresponding to a value of the guarded target, a threat level quantized value corresponding to a type of the aerial target, a threat level quantized value corresponding to a number of the aerial targets, a threat level quantized value corresponding to a distance between the aerial target and the guarded target, a threat level quantized value corresponding to a speed of the aerial target, and a threat level quantized value corresponding to a route projection shortcut of the aerial target relative to the guarded target, respectively; respectively carrying out normalization processing on each threat degree quantized value to obtain a normalized value of each threat degree quantized value; determining, based on an analytic hierarchy process, respective second weights for the defended target value, the type of the aerial target, the number of the aerial targets, the distance of the aerial target from the defended target, the velocity of the aerial target, and the aerial target's aerial path projection shortcut relative to the defended target; and carrying out weighted summation on the normalized value of each quantified value of the threat degree and the corresponding second weight to obtain the threat degree of the aerial target.
In one possible embodiment, the degree of urgency of defending of the defended target characterizes the degree of urgency of defending of the defended target, the vulnerability of the defended target characterizes the difficulty of the defended target in function impairment and ability to repair after impairment under set attack conditions, and the degree of exposure of the defended target characterizes the difficulty of the defended target in discovery.
In a possible implementation, the apparatus further includes:
and the first display unit is used for sequencing and displaying the value of the defended target according to the size.
In a possible implementation, the apparatus further includes:
and the second display unit is used for sequencing and displaying the threat degrees of the aerial targets according to the size.
Based on the same technical concept, an embodiment of the present application further provides an electronic device 400, and referring to fig. 17, the electronic device 400 is configured to implement the air defense threat control method described in the foregoing method embodiment, where the electronic device 400 of this embodiment may include: a memory 401, a processor 402, and a computer program, such as an air defense threat control program, stored in the memory and executable on the processor. The processor, when executing the computer program, implements the steps in each of the above embodiments of the air defense threat control method, for example, step S21 shown in fig. 12.
In the embodiment of the present application, a specific connection medium between the memory 401 and the processor 402 is not limited. In the embodiment of the present application, the memory 401 and the processor 402 are connected by the bus 403 in fig. 17, the bus 403 is indicated by a thick line in fig. 17, and the connection manner between other components is merely illustrative and is not limited thereto. The bus 403 may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 17, but this does not mean only one bus or one type of bus.
The memory 401 may be a volatile memory (RAM), such as a random-access memory (RAM); the memory 401 may also be a non-volatile memory (non-volatile memory) such as, but not limited to, a read-only memory (rom), a flash memory (flash memory), a Hard Disk Drive (HDD) or a solid-state drive (SSD), or the memory 401 may be any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 401 may be a combination of the above memories.
And the processor 402 is configured to implement the air defense threat control method according to the embodiment of the application.
The embodiment of the present application further provides a computer-readable storage medium, which stores computer-executable instructions required to be executed by the processor, and includes a program required to be executed by the processor.
In some possible embodiments, the aspects of the air defense threat control method provided by the present application may also be implemented in the form of a program product including program code for causing an electronic device to perform the steps of the air defense threat control method according to various exemplary embodiments of the present application described above in this specification when the program product is run on the electronic device.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (14)

1. An air defense threat control method is characterized in that,
acquiring air target information, guarded target information and fire unit information;
determining a guarded target value based on the guarded target information;
determining a threat level of the aerial target based on the defended target value and the aerial target information;
and performing fire distribution based on the fire unit information and the threat degree of the aerial target, obtaining a fire distribution result, and controlling the aerial target according to the fire distribution result.
2. The method of claim 1, wherein the guarded target information includes at least a combination of one or more of: the number of said defended targets, the urgency of defending of said defended targets, the vulnerability of said defended targets and the degree of exposure of said defended targets;
determining a value of a guarded target based on the guarded target information, specifically comprising:
respectively determining a value quantized value corresponding to the number of the defended targets, a value quantized value corresponding to the defense urgency degree of the defended targets, a value quantized value corresponding to the vulnerability of the defended targets and a value quantized value of the exposure degree of the defended targets;
respectively carrying out normalization processing on each value quantization value to obtain a normalization value of each value quantization value;
determining a first weight corresponding to each of the number of the defended targets, the urgent defending degree of the defended targets, the vulnerability of the defended targets and the exposure degree of the defended targets based on an analytic hierarchy process;
and carrying out weighted summation on the normalized value of each value quantized value and the corresponding first weight to obtain the defended target value.
3. The method of claim 1, wherein the over-the-air target information comprises at least a combination of one or more of: a type of the airborne target, a number of the airborne targets, a distance of the airborne target from the guarded target, a velocity of the airborne target, and an aerial route projection shortcut of the airborne target relative to the guarded target;
determining the threat level of the aerial target based on the defended target value and the aerial target information, specifically comprising:
respectively determining a threat degree quantized value corresponding to the value of the defended target, a threat degree quantized value corresponding to the type of the aerial target, a threat degree quantized value corresponding to the number of the aerial targets, a threat degree quantized value corresponding to the distance between the aerial target and the defended target, a threat degree quantized value corresponding to the speed of the aerial target, and a threat degree quantized value corresponding to the route projection shortcut of the aerial target relative to the defended target;
respectively carrying out normalization processing on each threat degree quantized value to obtain a normalized value of each threat degree quantized value;
determining a second weight corresponding to each of the defended target value, the type of the aerial target, the number of the aerial targets, the distance between the aerial target and the defended target, the speed of the aerial target, and the route projection shortcut of the aerial target relative to the defended target based on an analytic hierarchy process;
and carrying out weighted summation on the normalized value of each quantized threat degree value and the corresponding second weight to obtain the threat degree of the aerial target.
4. The method of claim 2, wherein the degree of urgency of defending of the defended target characterizes the degree of urgency of defending of the defended target, wherein the vulnerability of the defended target characterizes the difficulty of the defending target being functionally impaired and the ability to repair after impairment under set attack conditions, and wherein the degree of exposure of the defended target characterizes the difficulty of the defending target being discovered.
5. The method of claim 1, further comprising:
and sorting and displaying the defended target value according to the size.
6. The method of claim 1, further comprising:
and sequencing and displaying the threat degrees of the aerial targets according to the sizes.
7. An air defense threat control apparatus, comprising:
the acquiring unit is used for acquiring air target information, guarded target information and fire unit information;
a value estimation unit for determining a guarded target value based on the guarded target information;
a threat estimation unit for determining a threat level of the aerial target based on the defended target value and the aerial target information;
and the control unit is used for carrying out firepower distribution on the basis of the firepower unit information and the threat degree of the aerial target, obtaining a firepower distribution result and controlling the aerial target according to the firepower distribution result.
8. The apparatus of claim 7, wherein said guarded target information includes at least one or a combination of: the number of said defended targets, the urgency of defending of said defended targets, the vulnerability of said defended targets and the degree of exposure of said defended targets;
the value estimation unit is specifically configured to determine a value quantization value corresponding to the number of the secured objects, a value quantization value corresponding to the urgency of security of the secured objects, a value quantization value corresponding to the vulnerability of the secured objects, and a value quantization value of the exposure of the secured objects, respectively; respectively carrying out normalization processing on each value quantization value to obtain a normalization value of each value quantization value; determining a first weight corresponding to each of the number of the defended targets, the urgent defending degree of the defended targets, the vulnerability of the defended targets and the exposure degree of the defended targets based on an analytic hierarchy process; and carrying out weighted summation on the normalized value of each value quantization value and the corresponding first weight to obtain the value of the defended target.
9. The apparatus of claim 7, wherein the air target information comprises at least a combination of one or more of: a type of the airborne target, a number of the airborne targets, a distance of the airborne target from the guarded target, a speed of the airborne target, and an air route projection shortcut of the airborne target relative to the guarded target;
the threat estimation unit is specifically configured to determine a threat degree quantized value corresponding to a value of the guarded target, a threat degree quantized value corresponding to a type of the aerial target, a threat degree quantized value corresponding to a number of the aerial targets, a threat degree quantized value corresponding to a distance between the aerial target and the guarded target, a threat degree quantized value corresponding to a speed of the aerial target, and a threat degree quantized value corresponding to a route projection shortcut of the aerial target relative to the guarded target, respectively; respectively carrying out normalization processing on each threat degree quantized value to obtain a normalized value of each threat degree quantized value; determining a second weight corresponding to each of the defended target value, the type of the aerial target, the number of the aerial targets, the distance between the aerial target and the defended target, the speed of the aerial target, and the route projection shortcut of the aerial target relative to the defended target based on an analytic hierarchy process; and carrying out weighted summation on the normalized value of each quantified value of the threat degree and the corresponding second weight to obtain the threat degree of the aerial target.
10. The apparatus of claim 8, wherein the urgency of security of the secured target characterizes how urgent the secured target is to be secured, the vulnerability of the secured target characterizes how difficult and how easily the secured target is to be functionally compromised under set attack conditions and how easily the secured target is exposed characterizes how difficult the secured target is to be discovered.
11. The apparatus of claim 7, further comprising:
and the first display unit is used for sequencing and displaying the value of the defended target according to the size.
12. The apparatus of claim 7, further comprising:
and the second display unit is used for sequencing and displaying the threat degrees of the aerial targets according to the size.
13. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the air defense threat control method according to any one of claims 1 to 6 when executing the program.
14. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the steps of the air defense threat control method according to any one of claims 1 to 6.
CN202211534594.5A 2022-12-02 2022-12-02 Air defense threat control method and device, electronic equipment and storage medium Pending CN115545584A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211534594.5A CN115545584A (en) 2022-12-02 2022-12-02 Air defense threat control method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211534594.5A CN115545584A (en) 2022-12-02 2022-12-02 Air defense threat control method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115545584A true CN115545584A (en) 2022-12-30

Family

ID=84721930

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211534594.5A Pending CN115545584A (en) 2022-12-02 2022-12-02 Air defense threat control method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115545584A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108734334A (en) * 2018-04-04 2018-11-02 西北工业大学 A kind of missile-gun combined Algorithm of Firepower Allocation preferential based on D numbers and menace
CN108805406A (en) * 2018-05-03 2018-11-13 西安电子工程研究所 Air defence weapon system Object Threat Evaluation method
CN114444203A (en) * 2022-01-25 2022-05-06 中国人民解放军空军工程大学 Battlefield situation variable-weight-based aerial cluster threat assessment method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108734334A (en) * 2018-04-04 2018-11-02 西北工业大学 A kind of missile-gun combined Algorithm of Firepower Allocation preferential based on D numbers and menace
CN108805406A (en) * 2018-05-03 2018-11-13 西安电子工程研究所 Air defence weapon system Object Threat Evaluation method
CN114444203A (en) * 2022-01-25 2022-05-06 中国人民解放军空军工程大学 Battlefield situation variable-weight-based aerial cluster threat assessment method

Similar Documents

Publication Publication Date Title
US5153366A (en) Method for allocating and assigning defensive weapons against attacking weapons
KR101235149B1 (en) Threat evaluation system and method against antiair target and computer-readerable storage medium having a program recorded thereon where the program is to carry out its method
KR101502397B1 (en) A virtual combat simulation system for combat effectiveness analysis of weapon system and method thereof
US9400158B2 (en) Tactics support apparatus and tactics support method
CN113705102A (en) Deduction simulation system, method, equipment and storage medium for sea-air cluster confrontation
JP6071625B2 (en) Thermal power distribution apparatus, thermal power distribution method, and program
CN111583083A (en) Method and system for determining degree of threat to ground by non-cooperative target in low-altitude flight
CN115238226A (en) Air defense effective killing area calculation method
CN114757051A (en) Method and device for verifying confrontation function level simulation of air-defense missile weapon system
CN115545584A (en) Air defense threat control method and device, electronic equipment and storage medium
You et al. Air combat command and guidance situation assessment based on attack area
CN111537956B (en) Single radar responsibility sector determination method and system based on real-time and spatial situations
KR102578568B1 (en) Threat assessment system and method for anti-air target in surface fleet combat system
Pelletier Battlefield simulations for canadian army indirect fire modernization options analysis
KR102489371B1 (en) System and method for mananging zones engagement automatically for defending naval sheep fleet zones
KR102565906B1 (en) Artificial intelligence for establishing the operation plan of strike packages in air operations
CN115660444A (en) Defense control method and device, electronic equipment and storage medium
Kui et al. General Design of Research-oriented Rehearsal System under Data Rules
Evensen Modelling and implementation of a generic active protection system for entities in Virtual Battlespace (VBS)
Polk et al. Ship self‐defense performance assessment methodology
Gardner Dragonfire: Countering hypersonic threats
Zhao et al. Ranking Method for the Importance of Aircraft Damage Spare Parts
Anastasiei et al. MATHEMATICAL ASPECTS REGARDING THE BASIS OF DECISION MAKING IN MILITARY ACTIONS
Kvaale A decision support simulation model for design of fast patrol boats
CN116824494A (en) Security monitoring method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination