Computer Science ›› 2019, Vol. 46 ›› Issue (6A): 585-588.

• Interdiscipline & Application • Previous Articles     Next Articles

Research and Design of General Class Library for Cruise Missile Dynamic Simulation

ZHAO Xin-ye1, YANG Guang1, WANG Yi-tao1, WANG Dong2   

  1. DALIAN Naval Academy,Dalian,Liaoning 116018,China1;
    Naval Aeronautical University,Yantai,Shandong 264001,China2
  • Online:2019-06-14 Published:2019-07-02

Abstract: Aiming at the mission requirements of cruise missile dynamic simulation,this paper studied the missile combat process and flight trajectory,and designed and developed a new generation of cruise misscile dynamic simulation with characteristics of cross-platform,versatility,flexible configuration and high scalability.Based on missile-based surface-launched attack surface ships of the YJ series,the class library is used to optimize the calculation,and its trajectory and trajectory parameters are analyzed.The results show that the trajectory simulation of this cruise missile can achieve good results.The general class library can be applied to all kinds of cruise missile dynamics simulation,also can be used as an important subsystem of the missile guidance system to complete the guidance algorithm verification and so on.

Key words: General class library, Cruise missile, Flight simulation, Trajectory simulation

CLC Number: 

  • TP391.9
[1] Wikipedia.Cruise missile [EB/OL].http:// https://en.wikipedia.org/wiki/Cruise_missile,2016-10-23.
[2] 关世义.飞航导弹仿真技术若干问题的探讨[J].战术导弹技术,1991(1):42-46.
[3] CLARK T,JONES R.Organizational Interoperability Maturity Model for C2[C]∥Proceedings of the 4th Command and Control Research and Technology Symposium.Rhode Island,USA:US Naval WarCollege,1999.
[4] 姚雯,陈小前,郭忠全.面向 MDO 的战略导弹动力学仿真通用类库的设计与实现[J].导弹与航天运载技术,2007(5):29-32.
[5] 姜光焱,张伟,段昶.基于Vega Prime的导弹仿真系统的研究[J].系统仿真学报,2013,25(4):645-649.
[6] ELTOHAMY K G,KUO C Y.Analysis of Nonlinear Missile Guidance Systems Through Linear Adjoint Method[J].Smart Science,2015,3(4):170-175.
[7] CHOMACHAR S A A,FARD A M.Flight control system for guided rolling-airframe missile[C]∥2016 IEEE Aerospace Conference.IEEE,2016:1-9.
[8] 顾浩,康凤举,韩亮,等.典型反舰导弹运动建模与仿真技术[J].系统仿真学报,2016,18(8):2067-2069.
[9] CAVAGLIERI D,BEWLEY T.Low-storage implicit/explicit Runge-Kutta schemes for the simulation of stiff high-dimensional ODE systems[J].Journal of Computational Physics,2015,286:172-193.
[10] STEVENS B L,LEWIS F L,JOHNSON E N.Aircraft Control and Simulation:Dynamics,Controls Design,and Autonomous Systems[M].Hoboken:John Wiley & Sons,2015.
[11] MCDONOUGH K,KOLMANOVSKY I.Integrator resetting for enforcing constraints in aircraft flight control systems[C]∥AIAA Guidance,Navigation,and Control Conference.2015:2015-1995.
[12] FALANGAS E T.Performance Evaluation and Design of Flight Vehicle Control Systems[M].Hoboken:John Wiley & Sons,2015.
[13] 刘剑威,吴传利,徐国亮.反舰导弹典型攻击模式及运动仿真研究[J].指挥控制与仿真,2006,28(5):47-50.
[14] MHLANGA F S,PERRY E L,KIRCHNER R.On Adapting a Military Combat Discrete Event Simulation with Big Data and Geospatial Modeling Toward a Predictive Model Ecosystem for Interpersonal Violence[J].Journal of Information Systems Applied Research,2015,8(1):42-55.
[15] ZHAO X,YANG M,XING Z,et al.Structure and content enhancement to Military Scenario Definition Language[C]∥2012 IEEE Symposium on Robotics and Applications(ISRA).2012:379-382.
[16] HUBER D,KALLFASS D.Applying data farming for military operation planning in nato MSG-124 using the interoperation of two simulations of different resolution[C]∥2015 Winter Simulation Conference(WSC).IEEE,2015:2535-2546.
[1] CHEN Sheng-lai,ZHENG Ai-min,LI Tao. Study on Compression Algorithm of Cruise Missile Image Based on Wavelet Code [J]. Computer Science, 2009, 36(12): 263-266.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[3] LI Shan and RAO Wen-bi. Video-based Detection of Human Motion Area in Mine[J]. Computer Science, 2018, 45(4): 291 -295 .
[4] HOU Yan-e, KONG Yun-feng and DANG Lan-xue. Greedy Randomized Adaptive Search Procedure Algorithm Combining Set Partitioning for Heterogeneous School Bus Routing Problems[J]. Computer Science, 2018, 45(4): 240 -246 .
[5] WEI Qin-shuang, WU You-xi, LIU Jing-yu and ZHU Huai-zhong. Distinguishing Sequence Patterns Mining Based on Density and Gap Constraints[J]. Computer Science, 2018, 45(4): 252 -256 .
[6] TONG Ze-ping, LI Tao, LI Li-jie and REN Liang. Study on Collaborative Optimization of Supply Chain with Uncertain Demand and Capacity Constraint[J]. Computer Science, 2018, 45(4): 260 -265 .
[7] JIN Rui, LIU Zuo-xue. Synchronization Protocol of TDMA Ad hoc Network Based on Time Slot Alignment[J]. Computer Science, 2018, 45(6): 84 -88,110 .
[8] SUO Yan-feng, WANG Shao-jie, QIN Yu, LI Qiu-xiang, FENG Da-jun and LI Jing-chun. Summary of Security Technology and Application in Industrial Control System[J]. Computer Science, 2018, 45(4): 25 -33 .
[9] LUO Shu-yan, ZHU Yi-an, ZENG Cheng. Performance Evaluation and Optimization of Inter-cores Communication for Heterogeneous
Multi-core Processor Unit
[J]. Computer Science, 2018, 45(6A): 262 -265, 274 .
[10] ZHAO Li-bo, LIU Qi, FU Fang-ling and HE Ling. Automatic Detection of Hypernasality Grades Based on Discrete Wavelet Transformation and Cepstrum Analysis[J]. Computer Science, 2018, 45(4): 278 -284 .