CN117077889A - Target threat assessment method and system and electronic equipment - Google Patents

Target threat assessment method and system and electronic equipment Download PDF

Info

Publication number
CN117077889A
CN117077889A CN202310995661.1A CN202310995661A CN117077889A CN 117077889 A CN117077889 A CN 117077889A CN 202310995661 A CN202310995661 A CN 202310995661A CN 117077889 A CN117077889 A CN 117077889A
Authority
CN
China
Prior art keywords
target
area
radius
intention
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310995661.1A
Other languages
Chinese (zh)
Other versions
CN117077889B (en
Inventor
蒲宇清
刘颢
陈炜
王海鹏
潘新龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
709th Research Institute of CSSC
Original Assignee
709th Research Institute of CSSC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 709th Research Institute of CSSC filed Critical 709th Research Institute of CSSC
Priority to CN202310995661.1A priority Critical patent/CN117077889B/en
Publication of CN117077889A publication Critical patent/CN117077889A/en
Application granted granted Critical
Publication of CN117077889B publication Critical patent/CN117077889B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Tourism & Hospitality (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Educational Administration (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Radar Systems Or Details Thereof (AREA)

Abstract

The invention provides a target threat assessment method, a target threat assessment system and electronic equipment, wherein the method comprises the following steps: determining a first target and a second target; wherein the second target has a tendency to move toward the first target; dividing the peripheral region of the first target into a first region, a second region and a third region according to the radiation radius of the first target; the second radius is determined according to the range of the third target and the movement speed of the second target so as to ensure that the second target and the third target can meet in a second area, and the third target is emitted by the first target and used for blocking the second target from continuing to move towards the first target; determining the accommodation angle of the second target according to the heading of the second target and the azimuth relative to the first target, and determining the course hook path of the second target relative to the first target based on the distance between the first target and the second target and the accommodation angle; and evaluating the threat degree of the second target according to the distance between the first target and the second target, the regional division condition of the periphery of the first target, the gangway angle, the navigation path and the limit path. The target threat result evaluated by the method is high in reliability.

Description

Target threat assessment method and system and electronic equipment
Technical Field
The invention belongs to the field of target threat assessment, and in particular relates to a target threat assessment method, a target threat assessment system and electronic equipment.
Background
Threat assessment (Threat Assessment, TA) technology has received close attention from domestic and foreign specialists, and since 1970, researchers have shown a great deal of interest in threat assessment, have conducted intensive research on the content of definition and functional models thereof, and the application fields relate to various fields such as air combat environments, offshore targets and the like, and have obtained a series of research results.
The existing target threat assessment method depends on expert experience, and parameters such as target characteristics, characteristics of a threatened object and the like are not comprehensively considered, so that the threat assessment result is lack of reliability.
Disclosure of Invention
Aiming at the defects of the prior art, the invention aims to provide a target threat assessment method, a target threat assessment system and electronic equipment, and aims to solve the problem that the existing target threat assessment method lacks reliability.
To achieve the above object, in a first aspect, the present invention provides a target threat assessment method, including the steps of:
determining a first target and a second target; wherein the second target has a tendency to move toward the first target;
dividing the peripheral area of the first target into a first area, a second area and a third area according to the radiation radius of the first target; wherein the radiation radius of the first area is not larger than the first radius, the radiation radius of the second area is between the first radius and the second radius, and the radiation radius of the third area is not smaller than the second radius; the first radius is a preset value and is smaller than the second radius; the second radius is determined according to the range of the third target and the movement speed of the second target so as to ensure that the second target and the third target can meet in a second area, and the third target is emitted by the first target and used for blocking the second target from continuing to move towards the first target;
determining the accommodation angle of the second target according to the heading of the second target and the azimuth of the second target relative to the first target, and determining the course hook path of the second target relative to the first target based on the distance between the first target and the second target and the accommodation angle;
evaluating the threat degree of the second target according to the distance between the first target and the second target, the regional division condition of the periphery of the first target, the gangway angle, the navigation path collude and the limit collude; the limit hook is determined according to the maximum search width and the search sector angle of the second target.
In one possible implementation, when the second target is in the first region, setting the second target as a primary intent target;
when the second target is in the second area and the broadside angle is larger than 90 degrees, setting the second target as a three-level intention target;
when the second target is in the second area, the accommodation angle is not more than 90 degrees and the course approach is more than the limit approach, setting the second target as a second-level intention target;
when the second target is in the second area, the accommodation angle is not more than 90 degrees, and the route hook is not more than the limit hook, determining which target of the first-stage intention target or the second-stage intention target is the second target according to the time of the second target reaching the first target or the distance between the second target and the first target;
when the second target is in the third area, setting the second target as a three-level intention target; wherein, the threat level from the first level intention target to the third level intention target is gradually reduced.
In one possible implementation, when the second target is in the second area, the broadside angle is not greater than 90 ° and the course approach is not greater than the limit approach, if the distance between the second target and the first target or the time for the second target to reach the first target is smaller than a preset value, the second target is a primary intention target, otherwise, the second target is a secondary intention target.
In one possible implementation, the second radius is determined by:
determining a maximum range of the third target;
determining the time taken for the second object to move to the maximum range where it meets the third object;
multiplying the movement speed of the second target by the time, and then adding the multiplication result to the maximum range to obtain a second radius.
In a second aspect, the present invention provides a target threat assessment system comprising:
the target determining module is used for determining a first target and a second target; wherein the second target has a tendency to move toward the first target;
the area dividing module is used for dividing the peripheral area of the first target into a first area, a second area and a third area according to the radiation radius of the first target; wherein the radiation radius of the first area is not larger than the first radius, the radiation radius of the second area is between the first radius and the second radius, and the radiation radius of the third area is not smaller than the second radius; the first radius is a preset value and is smaller than the second radius; the second radius is determined according to the range of the third target and the movement speed of the second target so as to ensure that the second target and the third target can meet in a second area, and the third target is emitted by the first target and used for blocking the second target from continuing to move towards the first target;
the target threat assessment module is used for determining the accommodation angle of the second target according to the heading of the second target and the azimuth of the second target relative to the first target, and determining the course hook path of the second target relative to the first target based on the distance between the first target and the second target and the accommodation angle; the threat degree of the second target is evaluated according to the distance between the first target and the second target, the regional division condition of the periphery of the first target, the gangway angle, the route hook and the limit hook; the limit hook is determined according to the maximum search width and the search sector angle of the second target.
In one possible implementation, the target threat assessment module assesses the threat of the second target by: when the second target is in the first area, setting the second target as a first-level intention target; when the second target is in the second area and the broadside angle is larger than 90 degrees, setting the second target as a three-level intention target; when the second target is in the second area, the accommodation angle is not more than 90 degrees and the course approach is more than the limit approach, setting the second target as a second-level intention target; when the second target is in the second area, the accommodation angle is not more than 90 degrees, and the route hook is not more than the limit hook, determining which target of the first-stage intention target or the second-stage intention target is the second target according to the time of the second target reaching the first target or the distance between the second target and the first target; when the second target is in the third area, setting the second target as a three-level intention target; wherein, the threat level from the first level intention target to the third level intention target is gradually reduced.
In one possible implementation, the target threat assessment module assesses the threat of the second target by: when the second target is in the second area, the accommodation angle is not more than 90 degrees, and the route hook is not more than the limit hook, if the distance between the second target and the first target or the time for the second target to reach the first target is less than a preset value, the second target is a primary intention target, otherwise, the second target is a secondary intention target.
In one possible implementation, the region dividing module determines the second radius by: determining a maximum range of the third target; determining the time taken for the second object to move to the maximum range where it meets the third object; and multiplying the movement speed of the second target by the time, and then adding the multiplication result to the maximum range to obtain a second radius.
In a third aspect, the present invention provides an electronic device comprising: at least one memory for storing a program; at least one processor for executing a memory-stored program, which when executed is adapted to carry out the method described in the first aspect or any one of the possible implementations of the first aspect.
In a fourth aspect, the present invention provides a computer readable storage medium storing a computer program which, when run on a processor, causes the processor to perform the method described in the first aspect or any one of the possible implementations of the first aspect.
In a fifth aspect, the invention provides a computer program product which, when run on a processor, causes the processor to perform the method described in the first aspect or any one of the possible implementations of the first aspect.
In general, the above technical solutions conceived by the present invention have the following beneficial effects compared with the prior art:
the invention provides a target threat assessment method, a system and electronic equipment, wherein the method is characterized in that target intention grade assessment rules are divided according to command decision requirements, and boundary ranges corresponding to target threat grades are clearly defined based on the target intention threat grade division rules, so that accurate description is given; and summarizing expert experience, establishing a group target threat judgment criterion knowledge base to form a quantitative evaluation model of target intention and threat level, and determining the target intention and threat level by calculating the boundary hook of the my and opposite target path on the basis. Compared with the traditional method, the method is simple in calculation, can accurately evaluate the threat to the target, and assists the commander to take more effective countermeasures.
Drawings
FIG. 1 is a flowchart of a target threat assessment method provided by an embodiment of the invention;
FIG. 2 is a flow chart of another method for dynamic intent-based targeted threat assessment provided by an embodiment of the invention;
FIG. 3 is a schematic diagram of the relative situation between two targets provided by an embodiment of the invention;
FIG. 4 is a schematic diagram of a second target search width provided by an embodiment of the present invention;
FIG. 5 is a schematic diagram of a second target intent assessment provided by an embodiment of the present invention;
FIG. 6 is a diagram of a target threat assessment system architecture provided by an embodiment of the invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The terms "first" and "second" and the like in the description and in the claims are used for distinguishing between different objects and not for describing a particular sequential order of objects. For example, the first radius and the second radius are used to distinguish between different radii and not to describe a particular order of radii, and for another example, the first object and the second object are used to distinguish between different objects and not to describe a particular order of objects, the objects being objects of actual mass and shape.
In embodiments of the invention, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g." in an embodiment should not be taken as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
The target threat assessment method provided by the invention is suitable for being used between two targets, wherein the target of the opposite side (namely the second target) has a trend of moving towards the target of the opposite side (namely the first target), the target of the opposite side possibly collides with the first target, the first target is threatened, and the second target with threat can be an unmanned plane, an early warning machine, a false target or a decoy target. The first target may be a drone formation, a drone command post, or the like; in addition, the first and second targets may be military targets, if desired.
Next, the technical scheme provided in the embodiment of the present invention is described.
The invention provides a target threat assessment method based on dynamic intention, which extracts relevant elements according to the current situation and acquired information of an attack target and deduces the threat condition of the attack target. In order to accurately and effectively evaluate the threat level of the enemy target.
Firstly, the invention provides a target threat assessment method based on dynamic intention, which comprises the steps of dividing target intention grade assessment rules according to needs, clearly defining boundary ranges corresponding to target threats corresponding to each grade based on the rule for dividing the intention threat grade, and giving accurate description; and summarizing expert experience, establishing a group target threat judgment criterion knowledge base to form a quantitative evaluation model of intention and threat level, and determining the intention and threat level of the target by calculating the path shortcuts and limit hooks of the my target and the counterpart target on the basis. Compared with the traditional method, the method is simple in calculation, can accurately carry out threat assessment on the enemy target, and assists the commander to take more effective countermeasures.
FIG. 1 is a flowchart of a target threat assessment method provided by an embodiment of the invention; as shown in fig. 1, the method comprises the following steps:
s101, determining a first target and a second target; wherein the second target has a tendency to move toward the first target;
s102, dividing the peripheral area of the first target into a first area, a second area and a third area according to the radiation radius of the first target; wherein the radiation radius of the first area is not larger than the first radius, the radiation radius of the second area is between the first radius and the second radius, and the radiation radius of the third area is not smaller than the second radius; the first radius is a preset value and is smaller than the second radius; the second radius is determined according to the range of the third target and the movement speed of the second target so as to ensure that the second target and the third target can meet in a second area, and the third target is emitted by the first target and used for blocking the second target from continuing to move towards the first target;
s103, determining the accommodation angle of the second target according to the heading of the second target and the heading of the second target relative to the first target, and determining the course hook path of the second target relative to the first target based on the distance between the first target and the second target and the accommodation angle;
s104, evaluating the threat degree of the second target according to the distance between the first target and the second target, the regional division condition of the periphery of the first target, the shipside angle, the route hook and the limit hook; the limit hook is determined according to the maximum search width and the search sector angle of the second target.
Optionally, when the second target is in the first area, setting the second target as a first-level intention target;
when the second target is in the second area and the broadside angle is larger than 90 degrees, setting the second target as a three-level intention target;
when the second target is in the second area, the accommodation angle is not more than 90 degrees and the course approach is more than the limit approach, setting the second target as a second-level intention target;
when the second target is in the second area, the accommodation angle is not more than 90 degrees, and the route hook is not more than the limit hook, determining which target of the first-stage intention target or the second-stage intention target is the second target according to the time of the second target reaching the first target or the distance between the second target and the first target;
when the second target is in the third area, setting the second target as a three-level intention target; wherein, the threat level from the first level intention target to the third level intention target is gradually reduced.
Optionally, when the second target is in the second area, the accommodation angle is not greater than 90 ° and the course hook is not greater than the limit hook, if the distance between the second target and the first target or the time for the second target to reach the first target is smaller than a preset value, the second target is a primary intention target, otherwise, the second target is a secondary intention target.
Optionally, the second radius is determined by:
determining a maximum range of the third target;
determining the time taken for the second object to move to the maximum range where it meets the third object;
multiplying the movement speed of the second target by the time, and then adding the multiplication result to the maximum range to obtain a second radius.
In order to verify the effectiveness of the method, the method for evaluating the target threat based on the dynamic intention provided by the invention, as shown in fig. 2, comprises the following steps:
s1, setting a target intention level evaluation rule. The invention divides the target intention into 3 levels, which are respectively as follows: primary intent, secondary intent, tertiary intent; wherein:
(1) First level intention
Abbreviated as level 1. The first intention is that the target threat is high and the defending time is urgent, and defending measures should be immediately taken.
(2) Secondary intention
Abbreviated as level 2. The secondary intention means that the threat degree of the target is moderate and the defense time is more sufficient; or there is sufficient defense time compared to level 1 targeting, albeit at a greater threat level. For such targets, defensive measures are immediately taken or temporarily waited for according to factors such as the type, defensive fire resources and the like. But the commander is sufficiently alert to the level 2 targets.
(3) Three-level intention
Abbreviated as level 3. The three-level intention means that the threat level of the target is small, the sufficient defending time is provided, and defending measures are not needed to be taken for the target in a short time.
S2, setting intent threat level classification rules. And (5) defining corresponding threat level judgment rules according to the three-level intention. Comprising the following steps: a short-range impact power judgment area, a medium-range impact power judgment area and a long-range warning power judgment area.
Wherein:
(1) Short-range percussion power judging area
The target threat degree of the short-range hit judgment area is quite high, the defense time is quite urgent, and the target property judgment and attack attempt analysis are not carried out in excessive time. The area is a forbidden area of the counterpart target, which is intended to be level 1.
The boundary of the short-range hit-and-miss zone is the near-range D from the my target Beating-min =0, to my target far distance D Beat-max Is a circular region of (a). Normally short-range defensive area D Beat-max =30km。
(2) Mid-range impact-resistant judgment area
The target information available in the middle-range impact-resistant judgment area is rich, the target threat is urgent, the directions of target attacks need to be divided, and the threat degree of each target attack direction to the targets on the my side and the threat degree of each target in each attack direction are required to be quantitatively judged as accurately as possible.
The middle range anti-collision zone is limited from the near range D of the my target Anti-min =D Beat-max To its far end D Anti-max Is a circular region of [ D ] Anti-min ,D Anti-max ]。
Taking a first target and a second target as unmanned aerial vehicles as examples, taking the other unmanned aerial vehicle as the target, taking the area anti-empty unmanned aerial vehicle as a formation, so that when the other unmanned aerial vehicle is attacked, the unmanned aerial vehicle is intercepted by the unmanned aerial vehicle command room or the unmanned aerial vehicle array to the other unmanned aerial vehicle command room or the unmanned aerial vehicle array to intercept the other unmanned aerial vehicle, and the remote D of the unmanned aerial vehicle is the same as the remote D Anti-max The unmanned aerial vehicle can meet the target at the maximum range of the unmanned aerial vehicle. Then combat judgment area D Anti-max The far-end of (c) can be expressed as follows:
D anti-max =D Zone guide-max +T Zone total ·V Target object
Wherein: d (D) Zone guide-max : maximum range of the anti-empty unmanned aerial vehicle;
V target object : the flight speed of an incoming unmanned aerial vehicle;
T zone total : and (5) examining the total time from the start of threat judgment to the meeting of the unmanned aerial vehicle and the attack unmanned aerial vehicle at the maximum range.
T Zone total =T Wei-ban +T Decision making +T Reaction +T Flying
Wherein: t (T) Wei-ban : the time required from the investigation of a certain batch of targets by threat judgment to the giving of threat judgment results;
T decision making : the commander makes a hit decision according to the threat judgment result and transmits a target indication to the time required by the air defense unmanned aerial vehicle system;
T reaction : the time required from the receiving of the target indication to the leaving of the unmanned aerial vehicle by the anti-empty unmanned aerial vehicle system;
T flying : the unmanned aerial vehicle leaves the frame to with the time of coming unmanned aerial vehicle meet at the maximum range, and have:
V zone guide : regional air defense unmanned aerial vehicle flight speed.
(3) Remote warning and wielding zone
The remote warning wiry judgment area has less available target information and can judge the wiryThe accuracy requirement is not high, and the main task is to judge the property of the target and analyze the attack attempt of the target or maneuver the unmanned aerial vehicle array in advance if necessary, so as to lay a foundation for forming a favorable anti-air situation. The near zone is the far zone D of the impact-resistant judgment zone Anti-max The distance is limited by the maximum distance which can be detected by the detection means (including AEW, the detection equipment per se, the condition of supporting unmanned aerial vehicle, and the like), so the warning and judging area is in a range that the distance from the ship is larger than D Anti-max Is a region of (2);
s3, calculating the navigation shortcuts of the target unmanned aerial vehicle and the unmanned aerial vehicle array on the basis of the rules set in the steps S1 and S2;
as shown in FIG. 3, at a certain moment, the array of unmanned aerial vehicles on the my side is located at the point O, the representative target in the unmanned aerial vehicle i is located at the point T, and the heading is C i At a speed of V i The azimuth of the unmanned aerial vehicle array of the other unmanned aerial vehicle is B i The angle of the board is theta (theta epsilon-180, 180]) The dotted line circle with the O point as the center is the limit hook diameter CPA max The area formed by the radius is D, and the distance from the opposite unmanned aerial vehicle T to the unmanned aerial vehicle array.
From fig. 3, it can be derived that:
CPA=D·sin|θ|
s4, calculating the route limit hook of the other unmanned aerial vehicle.
As shown in fig. 4, the search is performed on both sides in front of the course of the unmanned aerial vehicle after the unmanned aerial vehicle detection radar is started. The detecting radar has a certain search sector angleThe radar itself has a certain working distance D Radar-max Thus, there is a maximum search width D on the course side Half width-max If the path hooking CPA of the enemy unmanned aerial vehicle relative to the array of the my unmanned aerial vehicle is larger than the half width D of the search zone Half width-max The unmanned aerial vehicle radar of the other party can not catch the unmanned aerial vehicle array whenever the unmanned aerial vehicle is started, and the half width is weCPA requiring to obtain limit hook diameter max The method comprises the following steps:
s5, evaluating the target threat level based on the intention.
Taking the unmanned aerial vehicle array as a circle center to judge the target intention, and taking the unmanned aerial vehicle array as a first target as shown in fig. 5; the intent of the batch of airborne targets may be determined as follows: for the targets in the warning wiry judgment area, uniformly treating the targets as three-level intention targets; for targets in the combat-power judging area, taking a target broadside angle theta and a target course hook path CPA as indexes of the targets in the batch for threat grading of the targets, and determining threat grading according to the following rules:
when D is less than or equal to D Beat-max When the first-level intention is the first-level intention;
when D is Anti-max >D>D Beat-max And |theta|>At 90 °, it is a three-level intent target;
when D is Anti-max >D>D Beat-max And if CPA is less than or equal to CPA when |theta| is less than or equal to 90 degrees max
For targets of different powers, and the limit hook diameter: CPA (CPA) max =15km,CPA max =45 km or CPA max =45 km; the greater the power, the smaller the target limit hook diameter.
Further, if the arrival time is less than the preset time or the arrival distance is less than the preset distance, the first-level intention target is obtained; otherwise, the target is a secondary intention target.
In one example, the preset distance may be 70 km and the preset time may be 300 seconds.
When D is Anti-max >D>D Beat-max And if |θ| is less than or equal to 90 °, if CPA>CPA max Is a secondary intention target;
when D is greater than or equal to D Anti-max And is a three-level intent target.
Specifically, the higher the level of intent, the higher the threat of the target; the threat level of the primary intention target to the tertiary intention target gradually decreases.
FIG. 6 is a diagram of a target threat assessment system architecture provided by an embodiment of the invention; as shown in fig. 6, includes:
a target determination module 610 for determining a first target and a second target; wherein the second target has a tendency to move toward the first target;
the area dividing module 620 is configured to divide a peripheral area of the first target into a first area, a second area and a third area according to a radiation radius of the first target; wherein the radiation radius of the first area is not larger than the first radius, the radiation radius of the second area is between the first radius and the second radius, and the radiation radius of the third area is not smaller than the second radius; the first radius is a preset value and is smaller than the second radius; the second radius is determined according to the range of the third target and the movement speed of the second target so as to ensure that the second target and the third target can meet in a second area, and the third target is emitted by the first target and used for blocking the second target from continuing to move towards the first target;
the target threat assessment module 630 is configured to determine a gangway angle of the second target according to a heading of the second target and a direction of the second target relative to the first target, and determine a course hook path of the second target relative to the first target based on a distance between the first target and the second target and the gangway angle; the threat degree of the second target is evaluated according to the distance between the first target and the second target, the regional division condition of the periphery of the first target, the gangway angle, the route hook and the limit hook; the limit hook is determined according to the maximum search width and the search sector angle of the second target.
It should be noted that, the detailed functional implementation of each module in the above system may be referred to the description of the foregoing method embodiment, which is not repeated herein.
It should be understood that, the system is used to execute the method in the foregoing embodiment, and corresponding program modules in the system implement principles and technical effects similar to those described in the foregoing method, and the working process of the system may refer to the corresponding process in the foregoing method, which is not repeated herein.
Based on the method in the above embodiment, the embodiment of the invention provides an electronic device. The apparatus may include: at least one memory for storing programs and at least one processor for executing the programs stored by the memory. Wherein the processor is adapted to perform the method described in the above embodiments when the program stored in the memory is executed.
Based on the method in the above embodiment, the embodiment of the present invention provides a computer-readable storage medium storing a computer program, which when executed on a processor, causes the processor to perform the method in the above embodiment.
Based on the method in the above embodiments, an embodiment of the present invention provides a computer program product, which when run on a processor causes the processor to perform the method in the above embodiments.
It is to be appreciated that the processor in embodiments of the invention may be a central processing unit (centralprocessing unit, CPU), other general purpose processor, digital signal processor (digital signalprocessor, DSP), application specific integrated circuit (application specific integrated circuit, ASIC), field programmable gate array (field programmable gate array, FPGA) or other programmable logic device, transistor logic device, hardware components, or any combination thereof. The general purpose processor may be a microprocessor, but in the alternative, it may be any conventional processor.
The method steps in the embodiments of the present invention may be implemented by hardware, or may be implemented by executing software instructions by a processor. The software instructions may be comprised of corresponding software modules that may be stored in random access memory (random access memory, RAM), flash memory, read-only memory (ROM), programmable ROM (PROM), erasable programmable PROM (EPROM), electrically erasable programmable EPROM (EEPROM), registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present invention, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted across a computer-readable storage medium. The computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), or the like.
It will be appreciated that the various numerical numbers referred to in the embodiments of the present invention are merely for ease of description and are not intended to limit the scope of the embodiments of the present invention.
It will be readily appreciated by those skilled in the art that the foregoing description is merely a preferred embodiment of the invention and is not intended to limit the invention, but any modifications, equivalents, improvements or alternatives falling within the spirit and principles of the invention are intended to be included within the scope of the invention.

Claims (10)

1. A method of targeted threat assessment comprising the steps of:
determining a first target and a second target; wherein the second target has a tendency to move toward the first target;
dividing the peripheral area of the first target into a first area, a second area and a third area according to the radiation radius of the first target; wherein the radiation radius of the first area is not larger than the first radius, the radiation radius of the second area is between the first radius and the second radius, and the radiation radius of the third area is not smaller than the second radius; the first radius is a preset value and is smaller than the second radius; the second radius is determined according to the range of the third target and the movement speed of the second target so as to ensure that the second target and the third target can meet in a second area, and the third target is emitted by the first target and used for blocking the second target from continuing to move towards the first target;
determining the accommodation angle of the second target according to the heading of the second target and the azimuth of the second target relative to the first target, and determining the course hook path of the second target relative to the first target based on the distance between the first target and the second target and the accommodation angle;
evaluating the threat degree of the second target according to the distance between the first target and the second target, the regional division condition of the periphery of the first target, the gangway angle, the navigation path collude and the limit collude; the limit hook is determined according to the maximum search width and the search sector angle of the second target.
2. The method of claim 1, wherein the second target is set as a primary intent target when the second target is in the first region;
when the second target is in the second area and the broadside angle is larger than 90 degrees, setting the second target as a three-level intention target;
when the second target is in the second area, the accommodation angle is not more than 90 degrees and the course approach is more than the limit approach, setting the second target as a second-level intention target;
when the second target is in the second area, the accommodation angle is not more than 90 degrees, and the route hook is not more than the limit hook, determining which target of the first-stage intention target or the second-stage intention target is the second target according to the time of the second target reaching the first target or the distance between the second target and the first target;
when the second target is in the third area, setting the second target as a three-level intention target; wherein, the threat level from the first level intention target to the third level intention target is gradually reduced.
3. The method of claim 2, wherein when the second target is in the second region, the broadside angle is not greater than 90 ° and the course approach is not greater than the limit approach, the second target is a primary intent target if the distance of the second target relative to the first target or the time the second target reaches the first target is less than a preset value, and is a secondary intent target otherwise.
4. A method according to any one of claims 1-3, characterized in that the second radius is determined by:
determining a maximum range of the third target;
determining the time taken for the second object to move to the maximum range where it meets the third object;
multiplying the movement speed of the second target by the time, and then adding the multiplication result to the maximum range to obtain a second radius.
5. A target threat assessment system, comprising:
the target determining module is used for determining a first target and a second target; wherein the second target has a tendency to move toward the first target;
the area dividing module is used for dividing the peripheral area of the first target into a first area, a second area and a third area according to the radiation radius of the first target; wherein the radiation radius of the first area is not larger than the first radius, the radiation radius of the second area is between the first radius and the second radius, and the radiation radius of the third area is not smaller than the second radius; the first radius is a preset value and is smaller than the second radius; the second radius is determined according to the range of the third target and the movement speed of the second target so as to ensure that the second target and the third target can meet in a second area, and the third target is emitted by the first target and used for blocking the second target from continuing to move towards the first target;
the target threat assessment module is used for determining the accommodation angle of the second target according to the heading of the second target and the azimuth of the second target relative to the first target, and determining the course hook path of the second target relative to the first target based on the distance between the first target and the second target and the accommodation angle; the threat degree of the second target is evaluated according to the distance between the first target and the second target, the regional division condition of the periphery of the first target, the gangway angle, the route hook and the limit hook; the limit hook is determined according to the maximum search width and the search sector angle of the second target.
6. The system of claim 5, wherein the target threat assessment module assesses the threat of the second target by: when the second target is in the first area, setting the second target as a first-level intention target; when the second target is in the second area and the broadside angle is larger than 90 degrees, setting the second target as a three-level intention target; when the second target is in the second area, the accommodation angle is not more than 90 degrees and the course approach is more than the limit approach, setting the second target as a second-level intention target; when the second target is in the second area, the accommodation angle is not more than 90 degrees, and the route hook is not more than the limit hook, determining which target of the first-stage intention target or the second-stage intention target is the second target according to the time of the second target reaching the first target or the distance between the second target and the first target; when the second target is in the third area, setting the second target as a three-level intention target; wherein, the threat level from the first level intention target to the third level intention target is gradually reduced.
7. The system of claim 6, wherein the target threat assessment module assesses the threat of the second target by: when the second target is in the second area, the accommodation angle is not more than 90 degrees, and the route hook is not more than the limit hook, if the distance between the second target and the first target or the time for the second target to reach the first target is less than a preset value, the second target is a primary intention target, otherwise, the second target is a secondary intention target.
8. The system of any of claims 5-7, wherein the zone division module determines the second radius by: determining a maximum range of the third target; determining the time taken for the second object to move to the maximum range where it meets the third object; and multiplying the movement speed of the second target by the time, and then adding the multiplication result to the maximum range to obtain a second radius.
9. An electronic device, comprising:
at least one memory for storing a program;
at least one processor for executing the memory-stored program, which processor is adapted to perform the method according to any of claims 1-4 when the memory-stored program is executed.
10. A computer readable storage medium storing a computer program, characterized in that the computer program, when run on a processor, causes the processor to perform the method according to any one of claims 1-4.
CN202310995661.1A 2023-08-08 2023-08-08 Target threat assessment method and system and electronic equipment Active CN117077889B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310995661.1A CN117077889B (en) 2023-08-08 2023-08-08 Target threat assessment method and system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310995661.1A CN117077889B (en) 2023-08-08 2023-08-08 Target threat assessment method and system and electronic equipment

Publications (2)

Publication Number Publication Date
CN117077889A true CN117077889A (en) 2023-11-17
CN117077889B CN117077889B (en) 2024-05-14

Family

ID=88710764

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310995661.1A Active CN117077889B (en) 2023-08-08 2023-08-08 Target threat assessment method and system and electronic equipment

Country Status (1)

Country Link
CN (1) CN117077889B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109029122A (en) * 2018-07-16 2018-12-18 长沙金信诺防务技术有限公司 A kind of coast defence command and control system and control method
CN111783020A (en) * 2020-07-22 2020-10-16 中国人民解放军海军航空大学 Multidimensional characteristic battlefield entity target grouping method and system
CN113866762A (en) * 2021-11-04 2021-12-31 济钢防务技术有限公司 Unmanned aerial vehicle threat determination method based on radar detection information
CN114239728A (en) * 2021-12-17 2022-03-25 中国航空研究院 Multi-domain battlefield situation assessment and threat ranking method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109029122A (en) * 2018-07-16 2018-12-18 长沙金信诺防务技术有限公司 A kind of coast defence command and control system and control method
CN111783020A (en) * 2020-07-22 2020-10-16 中国人民解放军海军航空大学 Multidimensional characteristic battlefield entity target grouping method and system
CN113866762A (en) * 2021-11-04 2021-12-31 济钢防务技术有限公司 Unmanned aerial vehicle threat determination method based on radar detection information
CN114239728A (en) * 2021-12-17 2022-03-25 中国航空研究院 Multi-domain battlefield situation assessment and threat ranking method

Also Published As

Publication number Publication date
CN117077889B (en) 2024-05-14

Similar Documents

Publication Publication Date Title
CN108181620B (en) Three-coordinate radar trace point quality evaluation method
CN110414061A (en) The method for establishing aircraft platform system air-to-ground attack survival ability probabilistic model
US4417248A (en) Adaptive collision threat assessor
US8294609B2 (en) System and method for reduction of point of origin errors
CN115238226B (en) Calculation method for air defense effective killing area
CN115471061A (en) Threat assessment method for low-slow small unmanned aerial vehicle cluster
CN103728615A (en) Method and system for detecting a plurality of targets of phased array secondary radars
CN110488273B (en) Vehicle tracking detection method and device based on radar
RU2665032C2 (en) Device for recognition of aerospace objects in two-radio radar complexes with active phased antenna arrays (apaa)
CN117077889B (en) Target threat assessment method and system and electronic equipment
CN111007471B (en) Method for judging interference effect of active suppression interference in simulation environment
KR102551654B1 (en) Method and Apparatus for Recognizing for High Threat Targets
CN112162247A (en) Method for calculating target discovery probability of multi-radar networking detection system
RU126168U1 (en) SCIENTIFIC RESEARCH MODEL FOR THE EVALUATION OF RADIO ELECTRONIC SYSTEMS EFFICIENCY INDICATORS
KR102492125B1 (en) Method and Apparatus for Assessing Threat for Proximity High-speed Targets
CN112182501B (en) Method and device for calculating burst prevention probability of cruise missile
KR102207003B1 (en) Method for detecting maritime target
KR20220121473A (en) Apparatus and Method for evaluating realtime Hit Probabilities to Antiair Target based on Shot Groups Proability Model
Liu et al. Damage evaluation of microwave anti swarm attack based on scoring method
RU2492497C1 (en) Method of determining torpedo parameters
KR20210112496A (en) Radar false detection information removal device and method
Haoyu et al. Simulation and effectiveness analysis on one versus one beyond visual range air combat
Torstensson et al. Particle filtering for track before detect applications
Liu et al. Anti-jamming Effectiveness Evaluation of Radio Fuze based on the grey analytic hierarchy process
Li et al. Effectiveness evaluation of kill chain based on PCA, AHP and entropy weight method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant