Font Size: a A A

Key Technology Research Of Unmanned Aircraft Cooperative Attack And Defense

Posted on:2013-06-22Degree:MasterType:Thesis
Country:ChinaCandidate:K ZhuFull Text:PDF
GTID:2232330371458450Subject:Pattern Recognition and Intelligent Systems
Abstract/Summary:PDF Full Text Request
For the advantage of UAV with zero casualty, super-maneuverbility and low-cost and so on, many countries focus on the research of UAV, especially research in UAV’s multi-aircraft collaboration. The several key technologies have been studied in Multi-aircraft cooperative attack and defense by UAV air combat as the background, including UAV path planning, the guidance of the UAV and threat assessment of multi-aircraft cooperative attack and defense.UAV path planning is the optimal track from the starting point to the target point which meet UAV’s mobility performance and the battlefield environment constraint. In conditions of meeting the safety penetration of UAV, we combine self-learning A*real-time algorithm with multi-step optimizing-search algorithm in order to plan and re-plan path. Owing to the disadvantage of the big angle of traditional five-fork tree, we propose a new node expanded algorithm-bidirectional five-fork tree, the simulation results show the correctness and validity of this algorithm.The guidance of UAV, which is using the tracing guidance method based on intelligent control, then fuzzy control is proposed to solve the guidance of UAV, and we make simulation for the different motion of the target.Threat assessment is the key to UAV’s cooperative attack and defense. Fristly, our and enemy’s clusters are divided into several groups respectively using K-means Clustering and GA. Secondly, considering the enemy’s threat factors, we use RBF neural network to get the overall threat situation of enemy, which combine with the order of tactical importance to get the cooperative attack and defense matrix. Finally, the matrix method is used to get the result of target assignment and sorting.
Keywords/Search Tags:path planning, bidirectional five-fork tree, LRTA~* algorithm, guidance of the UAV, threat assessment
PDF Full Text Request
Related items