排序方式: 共有11条查询结果,搜索用时 15 毫秒
1.
2.
3.
遗传算法在逃逸机动策略中的应用研究 总被引:1,自引:0,他引:1
分析了基于强化学习原理和遗传算法的序贯决策规则的自动学习方法,从规划报偿和规则激活度的角度讨论和研究了规则的信度分配问题,解决了在大的状态空间中搜索和延迟评价问题,为处理复杂的决策过程提供了一种行之有效的方法。基于该方法实现了飞机的逃逸机动策略,仿真结果表明了该方法的有效性。 相似文献
4.
5.
6.
对抗尾流自导鱼雷的防御技术 总被引:1,自引:0,他引:1
舰船航行时在尾部形成一条含有大量气泡的尾流,成为舰船的目标特征之一。尾流自导鱼雷利用舰船尾流进行目标检测,对舰船构成很大威胁。目前对尾流自导鱼雷缺乏有效的防御措施,发展水面舰艇反尾流自导鱼雷防御技术迫在眉睫。该文基于尾流特征及尾流自导鱼雷工作原理,介绍了用于对抗尾流自导鱼雷的气幕弹、磁尾流、拖网、深水炸弹和反鱼雷鱼雷等几种软杀伤和硬杀伤方法以及隐身技术和机动规避等非杀伤方法,总结了舰船对抗鱼雷攻击的3个关键环节包括高性能鱼雷报警系统、快速反应的水声对抗系统和多功能的水声对抗设施,旨在为有效防御尾流自导鱼雷提供思路。 相似文献
7.
悬浮式声诱饵和悬浮式深弹阵协同对抗声自导鱼雷建模与仿真 总被引:2,自引:0,他引:2
舰艇如何优化布放悬浮式声诱饵和悬浮式深弹阵防御声自导鱼雷是舰艇防御鱼雷攻击的重要问题之一。本文建立了舰艇使用悬浮式声诱饵与悬浮式深弹阵对抗鱼雷的作战模型,采用极值法和非线性规划方法,确定了悬浮式声诱饵与悬浮式深弹阵的发射策略及舰艇的规避航向,使舰艇布放悬浮式声诱饵与悬浮式深弹阵和正确的规避机动有效结合,以期达到对抗来袭鱼雷的最佳效果。仿真结果表明,采用本文方法可以达到软硬防御手段有效结合对抗来袭鱼雷的双重效果,鱼雷拦截概率提高了10%~30%。 相似文献
8.
It is a vital technology for combat aircrafts to apply evasive maneuver and chaff centroid jamming collaboratively to reduce the threat from incoming air-to-air missiles. In order to escape from the radar track beam of missiles as soon as possible, we define the “Maximum normal acceleration of the track beam border” as the principle for evasive maneuver, and the stress analysis is carried out on the aircrafts before the corresponding maneuver strategy is acquired. We establish the aircraft-missile-chaff relative motion model, chaff motion and RCS dynamic change model, construct the chaff flare strategy which conforms with the principle of centroid jamming, and sum up the success of the collaborative application conditions. Simulation result shows that the maneuver is better than the traditional maneuvers and facilitates the pilot operation. When the centroid jamming is applied, the avoid effect is significantly increased with fewer chaff bombs. 相似文献
9.
10.
With the rapid developments of information technology,various industries become much more dependent on networks.Driven by economic interests and the game between countries reflected by growing cyberspace confrontations,evasive network attacks on information infrastructures with high-tech,high concealment and longterm sustainability become severe threats to national security.In this paper,we propose a novel two-phased method for the detection of evasive network attacks which exploit or pretend to be common legal encryption services in order to escape security inspection.Malicious communications which camouflage themselves as legal encryption application are identified in the SSL'session structure verification phase firstly,and then by serverside X.509 certificate based anomaly detection,suspicious attack behaviors are further distinguished effectively.Experiment results show that our method is very useful for detecting the network activities of certain unknown threats or new malwares.Besides,the proposed method can be applied to other similar services easily. 相似文献