全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
兵工学报  2014 

基于离散事件仿真的防空C4ISR系统结构评估

DOI: 10.3969/j.issn.1000-1093.2014.10.029, PP. 1721-1728

Keywords: 系统评估与可行性分析,离散事件仿真,防空系统,C4ISR结构,系统评估

Full-Text   Cite this paper   Add to My Lib

Abstract:

?针对防空C4ISR系统,综合考虑通信网络和信息关系结构,提出基于离散事件仿真的系统结构评估方法。通过分析防空C4ISR系统的结构,对防空系统的离散仿真事件进行了定义,给出了事件处理流程、相互逻辑关系和公共基础数据,建立了防空系统仿真实验评估指标及其计算模型。通过仿真实验,在相同想定下比较了树型与网络化结构C4ISR系统的目标探测概率和目标分配率等,验证了文中方法的有效性。

References

[1]  [3] David A G, Swati D A, Michael J S.Widely distributed C4ISR[C]∥Defense Transformation and Net-Centric System. Orland, Florida, US: SPIE, 2007.
[2]  [6] Lindy E, Dimarogonas J, McConnell J, et al. Representing operational architectures into a modeling and environment for analyzing communications architectures[C]∥Military Communication Conference. Monterey CA: IEEE, 2004: 1456-1462.
[3]  [7] 王智源, 丁泽中, 胡广水. 军事通信网络拓扑结构抗毁性仿真[J]. 计算机系统应用, 2010, 19(20): 109-113.
[4]  [8] Li B Q, Si S K, Li B, et al. A method to generate C4ISR architecture framework and cascading failure of constructed network[C]∥2nd International Conference on Artificial Intelligence, Management Science and Electronic. Zhenzhou, China: IEEE, 2011: 34-37.
[5]  [9] 张斌, 胡晓峰, 姜忠钦. 战场通信网络环境仿真研究[J]. 系统仿真学报, 2011, 23(1): 217-221.
[6]  [10] Dekker A H. C4ISR architectures, applying social network analysis concepts to military C4ISR architectures[J]. Connections, 2001, 24(3): 93-103.
[7]  [11] Dekker A H. Applying social network analysis concepts to military C4ISR architectures[J]. Connections, 2002, 24(3): 93-103.
[8]  [12] 路建伟, 姚增建, 王濛. 基于无标度网络的防空反导系统构建[J]. 指挥控制与仿真, 2013, 35(3): 10-13.
[9]  [13] 孙家平. 网络化防空系统研究[J]. 现代雷达, 2013, 35(5): 14-17.
[10]  [14] 班克斯 J.离散事件系统仿真[M].肖田元,范文慧,译.北京:机械工业出版社,2007.
[11]  [15] 丁鹭飞,陈建春. 雷达原理[M].北京:电子工业出版社,2009.
[12]  [1] Alberts D S, Garstka J J, Stein F P. Network centric warfare: developing and leveraging information superiority[M]. Washingtong DC: Command and Control Research Program Publication Series, 1999.
[13]  [2] Alberts D S. The agility advantage: a survival guide for complex enterprises and endeavors[M].Washingtong DC:Command and Control Research Program Publication Series, 2011.
[14]  [4] Jefferey R C.Distributed networked operations-the foundation of network centric warfare[M]. Newport:Alidade Press, 2005.
[15]  [5] 孙屹. OPNET通信仿真开发手册[M]. 北京: 国防工业出版社, 2005.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133