CN111612673B - Method and system for confirming threat degree of unmanned aerial vehicle to multiple places - Google Patents
Method and system for confirming threat degree of unmanned aerial vehicle to multiple places Download PDFInfo
- Publication number
- CN111612673B CN111612673B CN202010405041.4A CN202010405041A CN111612673B CN 111612673 B CN111612673 B CN 111612673B CN 202010405041 A CN202010405041 A CN 202010405041A CN 111612673 B CN111612673 B CN 111612673B
- Authority
- CN
- China
- Prior art keywords
- unmanned aerial
- aerial vehicle
- threat
- weight
- distance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y20/00—Information sensed or collected by the things
- G16Y20/20—Information sensed or collected by the things relating to the thing itself
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/10—Detection; Monitoring
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/20—Analytics; Diagnosis
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/50—Safety; Security of things, users, data or systems
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/60—Positioning; Navigation
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Primary Health Care (AREA)
- Remote Sensing (AREA)
- Economics (AREA)
- Radar, Positioning & Navigation (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Educational Administration (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Biomedical Technology (AREA)
- Radar Systems Or Details Thereof (AREA)
Abstract
The application provides a method and a system for confirming the threat degree of an unmanned aerial vehicle to multiple places, wherein the method comprises the following steps: acquiring target characteristics of different attributes of an attack target aiming at multiple places based on detection means such as radar or spectrum monitoring and infrared; according to the target distance and different target characteristics, extracting different credible characteristic weights from a target characteristic database according to the method, and continuously updating a target belief function in the detection process; and determining the credibility of target confirmation according to the target belief function value and the fuzzy algorithm strategy, forming a specific value and providing the specific value for a command control system to assist in decision-making. The application can carry out target auxiliary judgment on the unmanned aerial vehicle which possibly threatens the safety of the important target in the protection area, reduces the misjudgment probability, improves the automation and the intellectualization of the auxiliary decision of the command information system, shortens the decision time of the commander, and improves the striking efficiency of a plurality of land defense systems.
Description
Technical Field
The application relates to the field of threat determination methods of non-cooperative targets, in particular to a method and a system for confirming the degree of threat of unmanned aircrafts to multiple places.
Background
With the rapid development of unmanned aerial vehicle technology, some other people maliciously utilize the unmanned aerial vehicle as a new means to perform illegal activities, and the method is used for detecting military places, transmitting forbidden articles, shooting security facilities, carrying explosive articles to perform purposeful destruction activities and the like, thereby forming serious threats for the national, military and public security.
The current detection means generally adopts various detection means such as radar, spectrum monitoring and the like, and because the flying speed of the unmanned aerial vehicle is high, the unmanned aerial vehicle needs to be monitored very timely, accurately and quickly, and effective treatment means must be adopted immediately once the unmanned aerial vehicle is determined to have bad attempts, so that the supervision efficiency of the unmanned aerial vehicle is a primary aim.
At present, the supervision means of the unmanned aerial vehicle is incomplete, and a stable and reliable mature system is not applied. In order to ensure safety, some important points of military and government authorities mostly adopt a personnel duty mode, and threat intentions of different kinds of targets are manually judged through target detection means such as radar, spectrum monitoring and the like so as to provide a treatment decision. The manual judgment requires the accumulation of long-term experience of the person on duty, and is always in a state of mental stress during the period of duty, and particularly when a plurality of unmanned aerial vehicles or a large number of unmanned aerial vehicles approach to a plurality of protection areas in multiple directions at the same time, the workload of manually judging the intention of a target is huge, and the timely, accurate, quick and effective treatment is extremely difficult.
Disclosure of Invention
In order to solve the problems in the prior art, the application provides a method and a system for confirming the threat degree of an unmanned aerial vehicle to multiple places, which comprise the following steps:
acquiring multi-place coordinates and continuous coordinate data of a plurality of unmanned aircrafts in a certain time period;
and determining the threat degree of each unmanned aircraft to a plurality of places according to the change condition of the coordinates in the continuous time of the unmanned aircraft.
Preferably, the acquiring continuous coordinate data of the unmanned aerial vehicle in a certain period of time includes:
based on the set time step, detecting equipment is adopted in the set time period and GPS or Beidou positioning information is combined, so that coordinate data of the unmanned aerial vehicle are obtained;
wherein the detection device comprises a radar, spectrum monitoring or infrared device.
Preferably, the determining the threat degree of each unmanned aerial vehicle to a plurality of sites according to the change condition of the coordinates in the continuous time of the unmanned aerial vehicle includes:
determining a value of an influence factor from the coordinates of the unmanned aerial vehicle and the change condition of the coordinates in a continuous time based on a preset influence factor for each land;
bringing the values of the influence factors of each unmanned aircraft into a pre-constructed threat function to determine threat degrees to a plurality of sites;
the influencing factors include: distance, trajectory and speed of unmanned aerial vehicles.
Preferably, the threat level function is calculated as follows:
wherein f nm (w) threat functions for the nth target for the mth protected land; v represents that the nth target shares V threat factors; i is the ith threat factor of the nth target for the mth protected land; w (w) mi Threat weight corresponding to the ith threat factor of the mth protected area.
Preferably, the determining, for each location, the value of the influencing factor from the coordinates of the unmanned aerial vehicle and the change condition of the coordinates in the continuous time based on the preset influencing factor includes:
determining the distance, track and speed of the unmanned aerial vehicle to each land based on the change condition of the coordinates of the unmanned aerial vehicle in continuous time;
determining the distance weight of the unmanned aerial vehicle to each destination based on the distance of the unmanned aerial vehicle and a weight model constructed for the distance in advance, and constructing a distance weight matrix based on the distance weights of all unmanned aerial vehicles to all destinations;
determining the track weight of the unmanned aerial vehicle to each land based on the track of the unmanned aerial vehicle, and constructing a track weight matrix based on the track weights of all unmanned aerial vehicles to all lands;
and determining a speed weight of the unmanned aerial vehicle to each destination based on the speed of the unmanned aerial vehicle, and constructing a speed weight matrix based on the speed weights of all unmanned aerial vehicles to all destinations.
Preferably, the weight model includes: a straight line model, a power function model, an ellipse model and a circle model.
Preferably, the calculation formula of the straight line model is as follows:
wherein: y is 1 Is a distance weight; x is x 1 Distance from unmanned aircraft to center of land; k (k) 1 And b 1 Is a constant term, where k 1 Determined by the furthest effective range of the detection device b 1 The value of (2) is 1.
Preferably, the power function model has the following formula:
y 1 =a 1 x 1 -1
wherein: y is 1 Is a distance weight; x is x 1 Distance from unmanned aircraft to center of land; a, a 1 Is a value associated with the minimum dead zone range of the detection device.
Preferably, the calculation formula of the ellipse model is as follows:
wherein: y is 1 Is a distance weight; x is x 1 Distance from unmanned aircraft to center of land; a, a 2 Is a value associated with a maximum detection range of the detection device; b 2 The value of (2) is 1.
Preferably, the calculation formula of the circular model is as follows:
x 1 2 +y 1 2 =R 1 2 ,y 1 ′=y 1 /R 1
wherein: y is 1 Is a distance weight; x is x 1 Is an unmanned aircraftDistance to the center of the field; r is R 1 Is a value associated with a maximum detection range of the detection device; y is 1 ' is y 1 Normalizing the processed value.
Preferably, the distance weight matrix of the unmanned aerial vehicle is as follows:
wherein: a is that d Threat weight matrix for distance factor at a certain moment; w (w) dnm Threat weights are corresponding to distance factors aiming at the mth protection places for the nth attack targets.
Preferably, the determining the trajectory weight of the unmanned aerial vehicle to each destination based on the trajectory of the unmanned aerial vehicle, and constructing the trajectory weight matrix based on the trajectory weights of all unmanned aerial vehicles to all destinations, includes:
acquiring an effective striking range for the unmanned aerial vehicle;
based on the coordinates P of the current and previous moments of each destination for each unmanned aircraft 1 (x t1 ,y t1 ) And P 0 (x t0 ,y t0 ) Determining the position point vector at the current moment and the previous moment;
determining threat weights based on the distance relationships between the effective strike range, the location point vector, and the center point;
accumulating the position weight of each moment on the unmanned aerial vehicle track, and normalizing to obtain the unmanned aerial vehicle track weight;
a trajectory weight matrix for all unmanned aerial vehicles to all venues is determined based on the trajectory weights for each unmanned aerial vehicle to each venue.
Preferably, the calculation formula of the track weight is as follows:
y 2 ′=y 2 /R 2
wherein: y is 2 Is a track weight; x is x 2 To be centered to P 1 P 0 The distance of the determined straight line; r is R 2 A value related to the maximum effective range of the treatment means; y is 2 ' is y 2 Normalizing the processed value.
Preferably, the track weight matrix has the following formula:
wherein: a is that t Threat weight matrix for track factor at a certain moment; w (w) tnm Threat weights for the nth attack target against the track factors of the mth protected land.
Preferably, the speed weight of the unmanned aerial vehicle is calculated as follows:
wherein: y is 3 Is a speed weight; x is x 3 The current speed of the unmanned aircraft is the current speed of the unmanned aircraft; mu is a speed value related to the target average flying speed of the unmanned plane and the like; σ is the speed difference associated with the target average flight speed.
Preferably, the speed weight matrix of the unmanned aerial vehicle is as follows:
wherein: a is that v Threat weight matrix for a speed factor at a certain moment; w (w) vnm Threat weights for the nth attack target against the mth protection place's speed factor.
Based on the same inventive concept, the application also provides a system for determining the threat degree of a non-cooperative target of low-altitude flight to a land, which comprises the following steps:
the data acquisition module is used for acquiring multi-place coordinates and continuous coordinate data of a plurality of unmanned aircrafts in a certain time period;
and the threat determination module is used for determining the threat degrees of each unmanned aerial vehicle to a plurality of places according to the change condition of the coordinates in the continuous time of the unmanned aerial vehicle.
Compared with the prior art, the application has the beneficial effects that:
the technical scheme provided by the application is a method and a system for confirming the threat degree of an unmanned aircraft to multiple places, wherein the method comprises the following steps: acquiring multi-place coordinates and continuous coordinate data of a plurality of unmanned aircrafts in a certain time period; according to the change condition of coordinates in the continuous time of the unmanned aerial vehicles, the threat degrees of each unmanned aerial vehicle to a plurality of places are determined, and the target auxiliary judgment is carried out on the unmanned aerial vehicles possibly threatening the important target safety in the protection area by using a plurality of means in the technical scheme provided by the application, so that the misjudgment probability is reduced, the automation and the intellectualization of the auxiliary decision of a command information system are improved, the decision time of a commander is shortened, and the hit efficiency of a plurality of land defense systems is improved;
the method and the device can be used for protecting a plurality of places, sequencing threat degrees of a plurality of suspicious targets approaching the places, accurately determining whether the suspicious targets are attack targets, and reducing the false positive probability.
Drawings
FIG. 1 is a flow chart of a validation of how much threat the unmanned aerial vehicle of the present application is presented to;
FIG. 2 is a schematic diagram of the target attack situation and defense area deployment of the present application;
FIG. 3 is a ladder model of the present application;
FIG. 4 is a straight line model of the present application;
FIG. 5 is a power function model in an embodiment provided by the present application;
FIG. 6 is an elliptical model in an embodiment provided by the present application;
FIG. 7 is a circular model in an embodiment provided by the present application;
FIG. 8 is a graph of target point and reference range under trajectory factors of the present application;
FIG. 9 is a segment curve of a threat weight calculation model in an embodiment provided by the application;
FIG. 10 is a normal distribution model of speed-threat weights in an embodiment provided by the application;
FIG. 11 is a block diagram of an unmanned aerial vehicle multi-threat level verification system of the present application.
Detailed Description
For a better understanding of the present application, reference is made to the following description, drawings and examples.
In order to solve the problem of threat judgment of the existing unmanned aerial vehicle to the land, particularly the problem of threat sequencing of a plurality of or a large number of 'low-low' targets when the targets are simultaneously approaching, the application identifies and judges potential targets with potential maliciousness from a target group, obtains threat intention expression values of the potential targets, and provides quantitative basis for commander decision and treatment.
The present application sets the following preconditions:
1. position coordinates of at least two points of the incoming target can be obtained and can be trusted;
2. the position coordinates of all the incoming targets can be obtained without considering targets in the blind area of the detection means or missed or false alarms by the detection system;
3. the position coordinates of the target include or can be resolved at least horizontal coordinates X, Y;
4. the region is a circular region with the position of the treatment means as the center and the effective range of the treatment means as the radius;
the above attack targets are understood to be non-cooperative targets flying at low altitudes.
Example 1:
the application provides a method for confirming the threat degree of an unmanned aircraft to multiple places, which is shown in fig. 1 and comprises the following steps:
s1: acquiring multi-place coordinates and continuous coordinate data of a plurality of unmanned aircrafts in a certain time period;
s2, determining threat degrees of each unmanned aerial vehicle to a plurality of places according to the change condition of coordinates in the continuous time of the unmanned aerial vehicle.
The method comprises the following steps:
there are multiple incoming targets and multiple protections are required, as schematically shown in fig. 2. In the figure, the area (O) is protected by 1 part of detection equipment and 3 parts of protection area (C) 1 、O 2 ,O 3 ) 4 attack targets (M) 1 、M 2 、M 3 、M 4 ) For illustration, wherein R is l Corresponding to the detection distance of the detection equipment.
Setting a threat function for each target for each guard
Wherein f nm (w) threat functions for the nth target for the mth protected land; v represents that the nth target shares V threat factors; i is the ith threat factor of the nth target for the mth protected land; w (w) mi Threat weight corresponding to the ith threat factor of the mth protected area;
among the N incoming targets and the M protection sites, each incoming target corresponds to each protection site, and the threat function comprises the influences of distance factors, track factors and speed factors. Thus, a plurality of incoming targets may mathematically represent an N x M dimensional matrix, denoted as a, against a plurality of threats to protect against the locality.
The determination of each element in matrix a is described below by taking the determination of 1 attack target for 1 protection place threat weight as an example. The threat weights of N attack targets aiming at M protection places can be expanded, and the method and the process are the same.
The composition of threat functions of the attack targets to protect the ground is emphasized by considering distance factors, track factors and speed factors. The threat weight determination method and calculation model of each factor are as follows:
distance factor (one)
The distance here refers to the linear distance of the "slow and small" target such as the unmanned plane from the center point of the destination, and changes as the target moves. According to the effective range of various means of system configuration, the effective range is divided into Q (Q is more than or equal to 1) distance ranges from the central point outwards. In general, the range of distances generally includes the range of radar detection R r Electronic interference range R d Or laser striking range R l Other e.g. spectral monitoring range R f Gun strike range R g Etc. These threat influencing factors may include one or more at the same time, combined and set different distance threat weights according to the requirements. In processing, the weight table is adopted for inquiring and determining. After a system configuration is determined, a table of distance threat weights is also determined.
In actual use, according to the specific situation and the requirement, according to the distance x from the non-cooperative target to the destination, the following models can be adopted to determine or calculate threat weights related to the distance:
1) Ladder model
As shown in fig. 3, the ladder model is provided with a fixed weight with reference to the effective ranges of the respective detection means and treatment means, for example, in table 1.
TABLE 1 distance factor threat weight table (example)
The ladder model is suitable for low-altitude defense scenes with simpler defense requirements and without the important emphasis of a certain protection element by a defense system. The following assignment principles are followed when applied:
the equipment category is determined, and according to the configuration condition of detection and treatment equipment of a certain system and the effective range of the configured equipment, the equipment category is assigned one by one according to the distance sequence: the farther the effective range is, the more abundant the response time of the defense system is, the less the possibility of the target to the ground threat is, and the smaller the corresponding threat weight is; the closer the effective range, the greater the likelihood that the non-cooperative target threatens the ground, the greater the corresponding weight, and the higher the defense system combat readiness level.
And determining threat weights under the ladder model, and adopting different assignment strategies according to actual conditions. In general, the system configuration scheme, the protection requirement, the important points of tasks, the system response and the threat judgment standard are considered to carry out assignment, so that the comprehensive consideration of the system at the time, the local situation and the current situation is reflected. Under the conditions of N attack targets and M protection places, N multiplied by M distance factor threat weight tables are required to be set for selection. The following model is the same as this.
2) Linear model
As shown in fig. 4, the linear model calculates a value according to the relation y= -kx+b according to the distance between the devices. In the linear model, threat weights of non-cooperative targets are related to distance linearity, threat urgency degree changes are linear, equipment spare combat degrees are not distinguished, and the method is suitable for a defense system which is stable in performance of detection equipment, high in system reliability and smooth in linkage. Specifically, let b=1, and the linear model expression chooses:
y=-kx+1
when b=1, the threat weight interval can be ensured to be limited to [0,1], and the threat weight interval is consistent with other factors, so that the influence of one factor covers the influence of the other factor due to different value standards is avoided.
The value of k is determined according to the furthest effective range k of the detection equipment 0 And (5) determining. For example: the effective range of radar detection in a certain system is 5km, then the method takesThe linear model type is changed into:
y=-0.2x+1
thus, as the target approaches the center distance, the threat weight also increases gradually, but remains between [0,1 ].
It should be noted that the calculation model for determining the weight is continuous in the defined domain, but in actual use, the target coordinate data is usually obtained at a certain time interval T, and the threat weight thus calculated is also discrete at a certain time interval T. These discrete threat weights, i.e. the threat weights that we need to correspond to a certain element at a certain time t. The following calculation models are the same as this.
3) Power function model
The power function model, as shown in FIG. 5, is based on the effective range of each device, according to the relation y=ax -1 (x > 0) calculating the value. According to the weight determined by the power function model, the activation of each device in the system can represent an assignment strategy with greater urgency from far to near. Particularly, when an attack target enters the effective range of the treatment means (the range is generally smaller than 1 km), the threat weight changes more severely when the attack target is closer to the center, and the threat degree of the attack target to the center point and the treatment urgency are more truly represented. The power function model is suitable for a system with a rapid response speed of a treatment means and rapid treatment of an attack target, and once the system enters the effective range of the treatment means, threat weights are rapidly increased, and the system is prompted to immediately implement treatment after determining the target.
Considering that it is generally about 200-300m from the center, it is already a blind spot of a radar or other detection means. For stability, the smallest value of the distance x when the power function is adopted may be 200m (e.g. a radar blind area of a certain type) from the center, i.e. 0.2km, and the farthest distance still takes the farthest range of the detection device, e.g. 5km. Thus, to ensure that the threat weight does not exceed 1 at maximum, the power function is taken as a=0.2:
y=0.2x -1
if the target distance is less than 200m, the threat weight value is unchanged y=1.
4) Elliptical model
In the elliptical model, as shown in FIG. 6, the effective ranges of the devices are related by the relationAnd (5) calculating. With the model, the distance is longer, and the distance is longerThe threat weight changes faster and more violently near the center of the plot, while the weight changes gradually and gently near the center of the plot. The model can emphasize importance of a target found by a far end in actual application, is suitable for a system which emphasizes early warning importance or requires longer preparation time for treatment means, such as a scene of manual patrol before going out and manual treatment at the back end.
In practical application, the maximum value of a is a value according to the furthest detection distance of a detection system in the system, and the maximum value of b is a value of 1 according to the normalization requirement. If the detection distance of the radar in the system is 5km at the most, a=5 is taken, and the relation becomes:
0.04x 2 +y 2 =1(5≥x>0,1≥y>0)
thus, the threat weight y is limited between [0,1] and satisfies the normalization principle.
5) Round model
The circular model is a special elliptical model as shown in fig. 7. According to the effective range of each device and the relation x 2 +y 2 =R 2 (x > 0, y > 0). Similar to the elliptical model, the weight changes faster and more strongly with longer distance in the circular model, while the weight changes gently near the center of the plot. The round model can also play a role in emphasizing the importance of finding a target at a far end in the system, and is suitable for the conditions of taking early warning as a main part and needing longer preparation time for treatment means.
In practical application, the data processing of the circular model is slightly different from that of the elliptical model. In the circular model, the maximum value of R is the value according to the furthest detection distance of a detection system in the system. If the detection distance of the radar in the system is 5km at the most, r=5 is taken, and the relation becomes:
x 2 +y 2 =25(5≥x>0,5≥y>0)
normalization is also required, and y, calculated from the different distances x, is normalized to:
the y' calculation here represents the threat weight of the target, so that the threat weight y is also limited between 0,1 under the round model.
In the M protection places, the geographic environment, the social environment, the protection requirements, the key points and the like of each protection place are possibly different, the types, the characteristics and the capacities of the deployed treatment means are possibly different, and the threat effects on different protection places are possibly different for the same attack target, so that in order to more approximate to the real threat situation, different calculation models are selected according to the actual requirements when evaluating the threat degree of one attack target on the local. The above 5 calculation models are designed for this requirement.
From this, N attack targets can be obtained through expansion to the distance factor threat weight matrix of M protection places at a certain moment:
wherein: a is that d Threat weight matrix for distance factor at a certain moment; w (w) dnm The threat weight of the distance factor corresponding to the mth attack target aiming at the mth protection place is given by y 1 Or y 1 ' is specifically determined by the weight model selected.
(II) trajectory factor
The trajectory factor mainly evaluates the accumulated intention of a certain target for a period of time and can also be understood as the comprehensive intention of the target for a period of time. In actual use, according to the track points of the front and rear points of a certain target provided by a radar or other detection means, if the connecting line direction of the two points to the center of the defense area, the target is considered to have possible attack intention at the moment, and the threat function is enhanced; conversely, if the two points continue in a direction away from the center of the area, then the target is considered to have a possible intent to depart from at that point, contributing to the abatement of the threat function. The representation of the likelihood of such attack or distancing, the overall intent will be represented by a concrete value over time, and the system may also evaluate the intent of the target attack at each moment in real time by continuously updating threat weights, as shown in fig. 8.
Let a certain time t 1 Obtaining t through a detection system 1 At the previous time t 0 Two-point coordinate P of (2) 1 (x 1 ,y 1 ) And P 0 (x 0 ,y 0 ) The vector between two points is
1) Determining a range R, and discussing the range R based on the range, such as selecting the effective laser striking range (such as 1 km) as a reference;
2) From P 0 To P 1 Making a straight line according toDistance relationship to the center point to determine threat weights:
a) Let O be 1 To the point ofIs x, then according to the constraint
Threat weights y are obtained as in fig. 9.
Thus, when x is more than or equal to 0 and less than or equal to R, the threat weight y is positive, which indicates that the target plays a positive role in threat to the land at the moment; when 2R is more than or equal to x and is more than R, the threat weight y is negative, which means that the target plays a negative role in threat to the land at the moment; when x is more than 2R, the threat weight value takes a constant-R.
b) Normalizing, and making y '=y/R, so as to ensure that threat weight |y' | is less than or equal to 1. But note that the weights themselves are signed.
For each t on a certain target track 1 At the previous time t 0 All of the above processes are completed to obtain threat weight y 'of either positive or negative or 0' i The data is processed as follows:
1) Will y' i Continuously accumulating to obtain the weight sum of the target until the current moment:
2) W (t) is normalized. y' i Recording accumulation times T in the continuous accumulation process, and carrying out normalization processing to obtain threat weight at the moment every time one W (T) is obtained
After the treatment, threat weight |w| caused by the track factors is less than or equal to 1.
As can be seen from FIG. 8, the direction of a target may be constantly changing in its flight path over time, e.g. M 3 . Thus, in the whole process, at a certain moment, the direction of the target track changes along with time, the threat weight of the target is increased, decreased or unchanged, but the final weight is related to the duration of the flight track, and the change degree of the threat degree along with time is represented. If a target is always facing the center O 1 Flying, the weight sum of which is expected to be increased, also shows the larger and larger attack intention. If the trajectory of a target is mostly far from the central zone, its weight is also continuously decreasing, indicating its smaller and smaller attack intent. The processing method can comprehensively evaluate the attack intention of a target and avoid the large influence of single-step jump on the weight. The longer the observation time, the more reliable the intention judgment.
Therefore, the track factor threat weight matrix of N attack targets at a certain moment aiming at M protection sites can be obtained through expansion:
wherein: a is that t For a rail at a certain momentTrace factor threat weight matrix; w (w) tnm Threat weights for the nth attack target against the track factors of the mth protected land.
(III) speed factor
For a 'low-low' target such as an unmanned plane, if the target has an attack intention, the faster the target is, the more beneficial the target is to be achieved, and conversely, for a defense system, the higher the threat level of the target to a defense area is, the more the warning level needs to be improved, and the quick response capability of the system is improved.
The threat weight considering the speed factor is corrected based on a normal distribution model as a threat weight calculation function, as shown in fig. 10. Specifically, in addition to military unmanned aerial vehicles, the maximum speed of a common unmanned aerial vehicle in the market is about 10-20m/s, so if a certain target speed falls near the area, the threat weight setting is increased to highlight the threat possibility. The goal of a lesser or higher speed is that the likelihood of the drone becomes smaller, with a corresponding decrease in threat weight. Value example:
the normal distribution function has the original function:
where x is the velocity v, and the weight function is set to have a maximum value of 1
Taking μ=16, σ=8, then
In this way, from the flight speed of the uncooperative target, its threat weight W (v) to the ground can be determined, with the maximum value of the weight not exceeding 1. Note that here the weight calculation simply borrows the expression of the normal distribution function, but does not borrow the original mathematical meaning of the normal distribution.
Through expansion, a speed factor threat weight matrix of N attack targets at a certain moment aiming at M protection sites can be obtained:
wherein: a is that v Threat weight matrix for a speed factor at a certain moment; w (w) vnm The threat weight of the speed factor aiming at the mth protected place for the nth attack target is given by W (v).
Thus, in summary, the threat level matrix a of N attack targets for M protection places is expressed as:
matrix a is the final result of threat weights. The result can provide decision support for the command control center commander to comprehensively grasp the battlefield situation. For each guard site, only the threat weights of all targets locally related, i.e. the corresponding column value elements in matrix a, need be of interest.
Example 2:
in order to implement the method of the application, the application also provides a system for determining the threat level of the non-cooperative targets of the low-altitude flight to the ground, which comprises the following steps:
the data module is used for acquiring multi-place coordinates and continuous coordinate data of a plurality of unmanned aircrafts in a certain time period;
and the threat determination module is used for determining the threat degrees of each unmanned aerial vehicle to a plurality of places according to the change condition of the coordinates in the continuous time of the unmanned aerial vehicle.
The data module is specifically used for:
based on the set time step, detecting equipment is adopted in the set time period and GPS or Beidou positioning information is combined, so that coordinate data of the unmanned aerial vehicle are obtained;
wherein the detection device comprises a radar, spectrum monitoring or infrared device.
The threat determination module is specifically configured to:
determining a value of an influence factor from the coordinates of the unmanned aerial vehicle and the change condition of the coordinates in a continuous time based on a preset influence factor for each land;
bringing the values of the influence factors of each unmanned aircraft into a pre-constructed threat function to determine threat degrees to a plurality of sites;
the influencing factors include: distance, trajectory and speed of unmanned aerial vehicles.
The threat level function is calculated as follows:
wherein f nm (w) threat functions for the nth target for the mth protected land; v represents that the nth target shares V threat factors; i is the ith threat factor of the nth target for the mth protected land; w (w) mi Threat weight corresponding to the ith threat factor of the mth protected area.
The determining, for each plot, a value of an influence factor from the coordinates of the unmanned aerial vehicle and the change condition of the coordinates over a continuous time based on the influence factor set in advance includes:
determining the distance, track and speed of the unmanned aerial vehicle to each land based on the change condition of the coordinates of the unmanned aerial vehicle in continuous time;
determining the distance weight of the unmanned aerial vehicle to each destination based on the distance of the unmanned aerial vehicle and a weight model constructed for the distance in advance, and constructing a distance weight matrix based on the distance weights of all unmanned aerial vehicles to all destinations;
determining the track weight of the unmanned aerial vehicle to each land based on the track of the unmanned aerial vehicle, and constructing a track weight matrix based on the track weights of all unmanned aerial vehicles to all lands;
and determining a speed weight of the unmanned aerial vehicle to each destination based on the speed of the unmanned aerial vehicle, and constructing a speed weight matrix based on the speed weights of all unmanned aerial vehicles to all destinations.
The weight model comprises: a straight line model, a power function model, an ellipse model and a circle model.
The calculation formula of the straight line model is as follows:
y 1 =-k 1 x 1 +b 1
wherein: y is 1 Is a distance weight; x is x 1 Distance from unmanned aircraft to center of land; k (k) 1 And b 1 Is a constant term, where k 1 Determined by the furthest effective range of the detection device b 1 The value of (2) is 1.
The power function model has the following calculation formula:
y 1 =a 1 x 1 -1
wherein: y is 1 Is a distance weight; x is x 1 Distance from unmanned aircraft to center of land; a, a 1 Is a value associated with the minimum dead zone range of the detection device.
The calculation formula of the ellipse model is as follows:
wherein: y is 1 Is a distance weight; x is x 1 Distance from unmanned aircraft to center of land; a, a 2 Is a value associated with a maximum detection range of the detection device; b 2 The value of (2) is 1.
The calculation formula of the circular model is as follows:
x 1 2 +y 1 2=R 1 2 ,y 1 ′=y 1 /R 1
wherein: y is 1 Is a distance weight; x is x 1 Distance from unmanned aircraft to center of land; r is R 1 Is a value associated with a maximum detection range of the detection device; y is 1 ' is y 1 Normalizing the processed value.
The distance weight matrix of the unmanned aerial vehicle is as follows:
wherein: a is that d Threat weight matrix for distance factor at a certain moment; w (w) dnm Threat weights are corresponding to distance factors aiming at the mth protection places for the nth attack targets.
The determining the track weight of the unmanned aerial vehicle to each destination based on the track of the unmanned aerial vehicle, and constructing a track weight matrix based on the track weights of all unmanned aerial vehicles to all destinations comprises:
acquiring an effective striking range for the unmanned aerial vehicle;
based on the coordinates P of the current and previous moments of each destination for each unmanned aircraft 1 (x t1 ,y t1 ) And P 0 (x t0 ,y to ) Determining the position point vector at the current moment and the previous moment;
determining threat weights based on the distance relationships between the effective strike range, the location point vector, and the center point;
accumulating the position weight of each moment on the unmanned aerial vehicle track, and normalizing to obtain the unmanned aerial vehicle track weight;
a trajectory weight matrix for all unmanned aerial vehicles to all venues is determined based on the trajectory weights for each unmanned aerial vehicle to each venue.
The calculation formula of the track weight is as follows:
y 2 ′=y 2 /R 2
wherein: y is 2 Is a track weight; x is x 2 To be centered to P 1 P 0 The distance of the determined straight line; r is R 2 A value related to the maximum effective range of the treatment means; y is 2 ' is y 2 Normalizing the processed value.
The track weight matrix has the following formula:
wherein: a is that t Threat weight matrix for track factor at a certain moment; w (w) tnm Threat weights for the nth attack target against the track factors of the mth protected land.
The speed weight calculation formula of the unmanned aerial vehicle is as follows:
wherein: y is 3 Is a speed weight; x is x 3 The current speed of the unmanned aircraft is the current speed of the unmanned aircraft; mu is a speed value related to the target average flying speed of the unmanned plane and the like; σ is the speed difference associated with the target average flight speed.
The speed weight matrix of the unmanned aerial vehicle is as follows:
wherein: a is that v Threat weight matrix for a speed factor at a certain moment; w (w) vnm Threat weight of speed factor aiming at mth protected place for nth attack target is given as y 3 。
It will be apparent that the described embodiments are some, but not all, embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing is illustrative of the present application and is not to be construed as limiting thereof, but rather as providing for the use of additional embodiments and advantages of all such modifications, equivalents, improvements and similar to the present application are intended to be included within the scope of the present application as defined by the appended claims.
Claims (6)
1. A method for confirming the threat level of an unmanned aerial vehicle to multiple sites, comprising:
acquiring multi-place coordinates and continuous coordinate data of a plurality of unmanned aircrafts in a certain time period;
determining threat degrees of each unmanned aircraft to a plurality of places according to the change condition of coordinates in the continuous time of the unmanned aircraft;
the obtaining continuous coordinate data of the unmanned aerial vehicle within a certain time period comprises the following steps:
based on the set time step, detecting equipment is adopted in the set time period and GPS or Beidou positioning information is combined, so that coordinate data of the unmanned aerial vehicle are obtained;
wherein the detection device comprises a radar, spectrum monitoring or infrared device;
the method for determining the threat degree of each unmanned aerial vehicle to a plurality of places according to the change condition of coordinates in the continuous time of the unmanned aerial vehicle comprises the following steps:
determining a value of an influence factor from the coordinates of the unmanned aerial vehicle and the change condition of the coordinates in a continuous time based on a preset influence factor for each land;
bringing the values of the influence factors of each unmanned aircraft into a pre-constructed threat function to determine threat degrees to a plurality of sites;
the influencing factors include: distance, trajectory and speed of unmanned aerial vehicle;
the threat level function is calculated as follows:
wherein f nm (w) threat functions for the nth target for the mth protected land; v represents that the nth target shares V threat factors; i is the ith threat factor of the nth target for the mth protected land; w (w) mi Threat weight corresponding to the ith threat factor of the mth protected area;
the determining, for each plot, a value of an influence factor from the coordinates of the unmanned aerial vehicle and the change condition of the coordinates over a continuous time based on the influence factor set in advance includes:
determining the distance, track and speed of the unmanned aerial vehicle to each land based on the change condition of the coordinates of the unmanned aerial vehicle in continuous time;
determining the distance weight of the unmanned aerial vehicle to each destination based on the distance of the unmanned aerial vehicle and a weight model constructed for the distance in advance, and constructing a distance weight matrix based on the distance weights of all unmanned aerial vehicles to all destinations;
determining the track weight of the unmanned aerial vehicle to each land based on the track of the unmanned aerial vehicle, and constructing a track weight matrix based on the track weights of all unmanned aerial vehicles to all lands;
and determining a speed weight of the unmanned aerial vehicle to each destination based on the speed of the unmanned aerial vehicle, and constructing a speed weight matrix based on the speed weights of all unmanned aerial vehicles to all destinations.
2. The method of claim 1, wherein the weight model comprises: a straight line model, a power function model, an ellipse model and a circle model.
3. The method of claim 2, wherein the linear model is calculated as:
y 1 =-k 1 x 1 +b 1
wherein: y is 1 Is a distance weight; x is x 1 Distance from unmanned aircraft to center of land; k (k) 1 And b 1 Is a constant term, where k 1 Determined by the furthest effective range of the detection device b 1 The value of (2) is 1.
4. The method of claim 2, wherein the power function model is calculated as:
y 1 =a 1 x 1 -1
wherein: y is 1 Is a distance weight; x is x 1 Distance from unmanned aircraft to center of land; a, a 1 Is a value associated with the minimum dead zone range of the detection device.
5. The method of claim 2, wherein the elliptical model is calculated as:
wherein: y is 1 Is a distance weight; x is x 1 Distance from unmanned aircraft to center of land; a, a 2 Is a value associated with a maximum detection range of the detection device; b 2 The value of (2) is 1;
the calculation formula of the circular model is as follows:
x 1 2 +y 1 2 =R 1 2 ,y 1 ′ =y 1 /R 1
wherein: y is 1 Is a distance weight; x is x 1 Distance from unmanned aircraft to center of land; r is R 1 Is a value associated with a maximum detection range of the detection device; y is 1 ′ Is y 1 Normalizing the processed value;
the distance weight matrix of the unmanned aerial vehicle is as follows:
wherein: a is that d Threat weight matrix for distance factor at a certain moment; w (w) dnm Threat weights of distance factors corresponding to the mth protected area for the nth attack target;
the determining the track weight of the unmanned aerial vehicle to each destination based on the track of the unmanned aerial vehicle, and constructing a track weight matrix based on the track weights of all unmanned aerial vehicles to all destinations comprises:
acquiring an effective striking range for the unmanned aerial vehicle;
based on the coordinates P of the current and previous moments of each destination for each unmanned aircraft 1 (x t1 ,y t1 ) And P 0 (x t0 ,y t0 ) Determining the position point vector at the current moment and the previous moment;
determining threat weights based on the distance relationships between the effective strike range, the location point vector, and the center point;
accumulating the position weight of each moment on the unmanned aerial vehicle track, and normalizing to obtain the unmanned aerial vehicle track weight;
determining a track weight matrix of all unmanned aerial vehicles to all sites based on the track weight of each unmanned aerial vehicle to each site;
the calculation formula of the track weight is as follows:
y 2 ′ =y 2 /R 2
wherein: y is 2 Is a track weight; x is x 2 To center to the groundTo P 1 P 0 The distance of the determined straight line; r is R 2 A value related to the maximum effective range of the treatment means; y is 2 ′ Is y 2 Normalizing the processed value;
the track weight matrix has the following formula:
wherein: a is that t Threat weight matrix for track factor at a certain moment; w (w) tnm Threat weights for the nth attack target aiming at the track factors of the mth protected land;
the speed weight calculation formula of the unmanned aerial vehicle is as follows:
wherein: y is 3 Is a speed weight; x is x 3 The current speed of the unmanned aircraft is the current speed of the unmanned aircraft; mu is a speed value related to the target average flying speed of the unmanned plane and the like; sigma is the speed difference associated with the target average flight speed;
the speed weight matrix of the unmanned aerial vehicle is as follows:
wherein: a is that v Threat weight matrix for a speed factor at a certain moment; w (w) vnm Threat weights for the nth attack target against the mth protection place's speed factor.
6. A system for determining the threat level of a non-cooperative target of low-altitude flight to a ground for implementing the unmanned aerial vehicle to multi-ground threat level confirmation method according to any of claims 1 to 5, comprising:
the data acquisition module is used for acquiring multi-place coordinates and continuous coordinate data of a plurality of unmanned aircrafts in a certain time period;
the threat determination module is used for determining threat degrees of each unmanned aircraft to a plurality of places according to the change condition of coordinates in the continuous time of the unmanned aircraft;
the obtaining continuous coordinate data of the unmanned aerial vehicle within a certain time period comprises the following steps:
based on the set time step, detecting equipment is adopted in the set time period and GPS or Beidou positioning information is combined, so that coordinate data of the unmanned aerial vehicle are obtained;
wherein the detection device comprises a radar, spectrum monitoring or infrared device;
the method for determining the threat degree of each unmanned aerial vehicle to a plurality of places according to the change condition of coordinates in the continuous time of the unmanned aerial vehicle comprises the following steps:
determining a value of an influence factor from the coordinates of the unmanned aerial vehicle and the change condition of the coordinates in a continuous time based on a preset influence factor for each land;
bringing the values of the influence factors of each unmanned aircraft into a pre-constructed threat function to determine threat degrees to a plurality of sites;
the influencing factors include: distance, trajectory and speed of unmanned aerial vehicle;
the threat level function is calculated as follows:
wherein f nm (w) threat functions for the nth target for the mth protected land; v represents that the nth target shares V threat factors; i is the ith threat factor of the nth target for the mth protected land; w (w) mi Threat weight corresponding to the ith threat factor of the mth protected area;
the determining, for each plot, a value of an influence factor from the coordinates of the unmanned aerial vehicle and the change condition of the coordinates over a continuous time based on the influence factor set in advance includes:
determining the distance, track and speed of the unmanned aerial vehicle to each land based on the change condition of the coordinates of the unmanned aerial vehicle in continuous time;
determining the distance weight of the unmanned aerial vehicle to each destination based on the distance of the unmanned aerial vehicle and a weight model constructed for the distance in advance, and constructing a distance weight matrix based on the distance weights of all unmanned aerial vehicles to all destinations;
determining the track weight of the unmanned aerial vehicle to each land based on the track of the unmanned aerial vehicle, and constructing a track weight matrix based on the track weights of all unmanned aerial vehicles to all lands;
and determining a speed weight of the unmanned aerial vehicle to each destination based on the speed of the unmanned aerial vehicle, and constructing a speed weight matrix based on the speed weights of all unmanned aerial vehicles to all destinations.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010405041.4A CN111612673B (en) | 2020-05-13 | 2020-05-13 | Method and system for confirming threat degree of unmanned aerial vehicle to multiple places |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010405041.4A CN111612673B (en) | 2020-05-13 | 2020-05-13 | Method and system for confirming threat degree of unmanned aerial vehicle to multiple places |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN111612673A CN111612673A (en) | 2020-09-01 |
| CN111612673B true CN111612673B (en) | 2023-12-15 |
Family
ID=72200304
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010405041.4A Active CN111612673B (en) | 2020-05-13 | 2020-05-13 | Method and system for confirming threat degree of unmanned aerial vehicle to multiple places |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN111612673B (en) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109976383B (en) * | 2019-04-26 | 2022-03-08 | 北京中科星通技术有限公司 | Task allocation method and device for anti-isomorphic unmanned aerial vehicle |
| CN112435249B (en) * | 2020-11-30 | 2024-04-16 | 天津津航技术物理研究所 | Dynamic small target detection method based on circumferential scanning infrared search system |
| CN113866762B (en) * | 2021-11-04 | 2022-10-18 | 济钢防务技术有限公司 | Unmanned aerial vehicle threat determination method based on radar detection information |
| CN116774214A (en) * | 2023-06-05 | 2023-09-19 | 深圳市塞防科技有限公司 | Threat degree prediction method of unmanned aerial vehicle and radar detection equipment |
| CN119313016A (en) * | 2024-09-29 | 2025-01-14 | 北京航空航天大学 | A multi-dimensional safety situation assessment method for formation spacecraft |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20120126511A (en) * | 2011-05-12 | 2012-11-21 | 국방과학연구소 | Threat evaluation system and method against antiair target and computer-readerable storage medium having a program recorded thereon where the program is to carry out its method |
| CN104834317A (en) * | 2015-04-24 | 2015-08-12 | 华北计算技术研究所 | Flying path planning method of unmanned plane capable of intelligently identifying threat types |
| CN109740876A (en) * | 2018-12-20 | 2019-05-10 | 北京冠群桦成信息技术有限公司 | Target Threat Judgment Method |
| CN110348708A (en) * | 2019-06-26 | 2019-10-18 | 北京理工大学 | A kind of ground target dynamic threats appraisal procedure based on extreme learning machine |
| CN110531784A (en) * | 2019-09-03 | 2019-12-03 | 中航天元防务技术(北京)有限公司 | A kind of intimidation estimating method for unmanned vehicle |
| CN111079090A (en) * | 2019-12-27 | 2020-04-28 | 航天南湖电子信息技术股份有限公司 | Threat assessment method for' low-slow small target |
-
2020
- 2020-05-13 CN CN202010405041.4A patent/CN111612673B/en active Active
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20120126511A (en) * | 2011-05-12 | 2012-11-21 | 국방과학연구소 | Threat evaluation system and method against antiair target and computer-readerable storage medium having a program recorded thereon where the program is to carry out its method |
| CN104834317A (en) * | 2015-04-24 | 2015-08-12 | 华北计算技术研究所 | Flying path planning method of unmanned plane capable of intelligently identifying threat types |
| CN109740876A (en) * | 2018-12-20 | 2019-05-10 | 北京冠群桦成信息技术有限公司 | Target Threat Judgment Method |
| CN110348708A (en) * | 2019-06-26 | 2019-10-18 | 北京理工大学 | A kind of ground target dynamic threats appraisal procedure based on extreme learning machine |
| CN110531784A (en) * | 2019-09-03 | 2019-12-03 | 中航天元防务技术(北京)有限公司 | A kind of intimidation estimating method for unmanned vehicle |
| CN111079090A (en) * | 2019-12-27 | 2020-04-28 | 航天南湖电子信息技术股份有限公司 | Threat assessment method for' low-slow small target |
Also Published As
| Publication number | Publication date |
|---|---|
| CN111612673A (en) | 2020-09-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN111612673B (en) | Method and system for confirming threat degree of unmanned aerial vehicle to multiple places | |
| CN111583083B (en) | Method and system for determining threat degree of non-cooperative targets in low-altitude flight to ground | |
| US8025230B2 (en) | System and method for prioritizing visually aimed threats for laser-based countermeasure engagement | |
| CN110531784B (en) | A Threat Assessment Method for Unmanned Aerial Vehicles | |
| US9030347B2 (en) | Preemptive signature control for vehicle survivability planning | |
| US9240001B2 (en) | Systems and methods for vehicle survivability planning | |
| CN105654232A (en) | Coastal monitoring and defense decision-making system and method based on multi-dimensional space fusion | |
| WO2014021961A2 (en) | Systems and methods for vehicle survivability planning | |
| CN113866762B (en) | Unmanned aerial vehicle threat determination method based on radar detection information | |
| CN110375585B (en) | Double-turret-based flyer intrusion response system and method | |
| US8831793B2 (en) | Evaluation tool for vehicle survivability planning | |
| CN112817329B (en) | Unmanned aerial vehicle tracking striking method, server and device | |
| CN109658770A (en) | People's air defense training's air situation simulation system | |
| KR20170129116A (en) | Method and apparatus for providing dummy targets to protect vehicles and / or objects from radar guided tracking heads | |
| CN114117768A (en) | Multi-agent distributed enclosure method with uncertain escaper positions | |
| CN109297497B (en) | Method and system for tracing unmanned aerial vehicle controller | |
| CN116400738A (en) | Low-cost striking method and system for low-speed unmanned aerial vehicle | |
| Tian et al. | Missile threat detection and evasion maneuvers with countermeasures for a low-altitude aircraft | |
| CN115456090B (en) | A multi-level composite intention prediction method for fighter jets based on knowledge inference engine | |
| EP2812644B1 (en) | A method for variable control of a zone sensor in a combat aircraft | |
| Ummah et al. | A simple fight decision support system for BVR air combat using fuzzy logic algorithm | |
| KR20230095274A (en) | Autonomous flight controller generating shortest target intercept trajectory for unmanned aerial vehicle and autonomous flight controlling method generating shortest target intercept trajectory | |
| CN118244780A (en) | An intelligent method and system for drone identification and interception | |
| KR102488429B1 (en) | System and method for providing naval gun firing specifications based on deep learning | |
| CN117217069A (en) | A radar equipment system deployment point optimization method based on the Seagull optimization algorithm |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |