[1]李博,张学锋. 战舰防空战术演练系统的仿真研究[J].计算机技术与发展,2015,25(01):173-176.
 LI Bo ZHANG,Xue-feng. Simulation Research on Warship Air Defense Tactical Training System[J].,2015,25(01):173-176.
点击复制

 战舰防空战术演练系统的仿真研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年01期
页码:
173-176
栏目:
应用开发研究
出版日期:
2015-01-10

文章信息/Info

Title:
 Simulation Research on Warship Air Defense Tactical Training System
文章编号:
1673-629X(2015)01-0173-04
作者:
 李博张学锋
 安徽工业大学 计算机学院
Author(s):
 LI Bo ZHANGXue-feng
关键词:
 可配置战舰防空战术演练仿真系统
Keywords:
 configurablewarship air defensetactical drillssimulation system
分类号:
TP391.9
文献标志码:
A
摘要:
针对传统军事防空战术演练中存在费用高、风险大等问题,为了能够在防空战争占得先机,需要对敌我双方实力进行评估,于是提出了可配置的战舰防空战术演练系统。系统通过设置每次战术演练的参数等信息,然后将配置好的参数文件传递到仿真模块,通过仿真界面模拟战术演练的整个过程。系统在演练结束后生成演练结果,还可以得到不同的参数对于战术演练的影响程度,最后导出整个演练报告。通过实验结果显示,战舰防空战术演练系统设计合理,仿真逻辑正确,可用于军事上战术效能评估。
Abstract:
In view of the problem of high cost and risk in traditional military air defense tactical drill,in order to take the lead of the air defense war,need to evaluate the strength of both sides,and propose a configurable warship air defense tactical drills system. The system set the parameters and other information for each training,then pass the configured file to the simulation module and show the simulation results. After the simulation training,the influence of different parameters for tactical training can be shown. Finally,the system can export the entire drill reports. The experimental results show that warship air defense tactical drills system is designed reasonably and the simula-tion logic is correct,which can be used for military tactical performance assessment.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(01):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(01):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(01):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(01):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(01):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(01):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(01):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(01):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(01):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(01):47.
[11]聂晓旭[],于凤芹[],钦道理[]. 可配置协议转换方法的设计与实现[J].计算机技术与发展,2015,25(04):80.
 NIE Xiao-xu[],YU Feng-qin[],QIN Dao-li[]. Design and Implementation of Protocol Conversion Method for Configuration[J].,2015,25(01):80.

更新日期/Last Update: 2015-04-17