In this paper, a vulnerability model design method of shelter vehicle is proposed, including numerical simulation of fragment penetration into shelter structure, research on equivalent target design method of shelter vehicle, vulnerability analysis of key components of shelter vehicle and establishment of equivalent target. Through this method, the equivalent target and vulnerability model of shelter vehicle are established, which can guide relevant vulnerability analysis equivalent target establishment.
This paper presents a global static planning algorithm for field road network. The algorithm is composed of obtaining or setting the starting point and key point model, setting the force type model, setting the planning mode model, global static planning model, etc. The global static planning model includes Astar path planning algorithm and the improvement of Astar path planning algorithm. Combined with the actual project, it has achieved good results.
This paper presents a design method of radar jamming simulation software. The software is composed of radar jamming decision simulation model, radar jamming simulation master control model, radar automatic selection jamming simulation model, radar jamming simulation model, data transmission and integration model. Combined with the actual project, good results have been achieved.
KEYWORDS: Missiles, Data modeling, Monte Carlo methods, Aerodynamics, 3D displays, Statistical analysis, Computer simulations, Kinematics, Atmospheric modeling, Scattering
On the basis of professional theories such as launch dynamics, ballistics, flight stability, vibration theory, multi-body system kinematics, aerodynamics, etc., this paper proposes a design method and system of a JDAM ballistic fast solver. The system includes JDAM ballistic calculation module, dispersion accuracy analysis module, data interaction interface and ballistic display module, etc., complete JDAM ballistic calculation and simulation, and realize the standardization, process and automation of ballistic calculation and simulation work.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.