期刊文献+

多波次导弹发射车的安全转移路径 被引量:1

Safe transfer path of multi-wave missile launch vehicles
下载PDF
导出
摘要 本文以某部队参与作战行动的24台三类车载发射装置执行任务区域及机动路线作为研究实例,以两波次导弹发射整体暴露时间最短为优化目标,在Dijkstra算法的基础上做了合理简化,从而得出最优路径,考虑道路节点冲突,建立0-1规划模型,求解得出两波次发射整体最短暴露时间。其次考虑到双方攻防博弈时道路节点完整性对发射任务暴露时间的影响,建立多重目标规划模型,求解最易受敌方攻击的三个道路节点,从而提高预见性,减少暴露时间增长的可能性。 The task area and maneuvering route of 24 Class III vehicle launching devices involved in combat operations are taken as a research example.The shortest overall exposure time of the two-wave missile launch is optimized.The Dijkstra algorithm is used to derive the shortest transfer path.Considering the Node conflicts,establish a 0-1 planning model,and solve for the shortest exposure time of the two waves.Secondly,considering the influence of the integrity of the road node on the exposure time of the launching task during the attack and defense object,the multi-objective planning model is established to solve the three road nodes that are most vulnerable to enemy attacks,thereby improving the predictability and reducing the exposure time possiblily.
作者 方舒 库在强 FANG Shu;KU Zai-qiang(College of Mathematics and Statistics,Huanggang Normal University,Huanggang 438000,Hubei,China)
出处 《黄冈师范学院学报》 2020年第3期12-18,共7页 Journal of Huanggang Normal University
基金 2018年黄冈师范学院教育硕士教学案例项目(JYJXAL2018001) 2019年黄冈师范学院研究生工作站项目(YJGZZ2019026)。
关键词 导弹发射 DIJKSTRA算法 0-1规划 多目标规划 missile launch Dijkstra algorithm 0-1 planning multi-objective programming
  • 相关文献

参考文献5

二级参考文献27

  • 1贾志华,贾志东.多批截击一批目标空战效果预测[J].无线电工程,2004,34(9):41-42. 被引量:3
  • 2张尧庭,方开泰.多元统计分析引论[M].北京:科学出版社,1999.
  • 3Vespignani A. Complex networks : The fragility of inter- dependency[ J]. Nature,2010,464:984-985.
  • 4王林,戴冠中.复杂网络的Scale.free性、Scale-free现象及其控制[M].北京:科学出版社,2009.
  • 5Lai Y C, Motter A E, Nishikawa T. Attacks and cascades in complex networks [ J ]. Lecture Notes in Physics, 2004,650 : 299- 310.
  • 6Landherr A, Friedl B, Heidemann J. A critical review of centrality measures in social networks [ J ]. Business & Information Systems Engineering ,2010,2 ( 6 ) :371-385.
  • 7Kermarrec A, Merrer E L, Sericola B, et al. Second order centrality: distributed assessment of nodes criticity in complex networks [ J ]. Computer Communications,2011, 34(5) :619-628.
  • 8Hu J, Wang B, Lee D Y. Evaluating node importance with multi-criteria [ A ]. IEEE/ACM International Conferences on Cyber, Physical and Social Computing [ C ]. Hangzhou, China :IEEE,2010:792-797.
  • 9Holme P, Kim B J, Chang N Y, et al. Attack vulnerability of complex networks [ J ]. Physical Review E,2002,65 (5) : e056109.
  • 10Linyuan Lti, Tao Zhou. Role of weak ties in link prediction of complex networks [ A ]. Proceeding of the 1 st ACM International Workshop on Complex Networks Meet Information & Knowledge Management [ C ]. Hong Kong, China : ACM ,2009:55-58.

共引文献44

同被引文献8

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部