Target vulnerability analysis method

An analysis method and vulnerability technology, applied in the field of damage theory analysis, can solve the problems of insufficient accuracy, high cost, and large resource consumption, and achieve the effect of less resource occupation, short time consumption and high efficiency

Pending Publication Date: 2019-02-15
北京中恒天威防务科技有限公司
View PDF1 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the combined geometry method uses the combination of basic geometric bodies, such as spheres, cubes, cylinders, and cones, to describe parts. The modeling method is simple and the model accuracy can be controlled. However, when creating some complex surfaces or parts, Its accuracy is insufficient; the triangular surface element method and the quadrangular surface element method first use engineering modeling software to establish a 3D model of the target, and then use the finite element software to discretize the target shape and parts into three / four corner surface elements, and then use the surface element Approximating shapes and parts with different complexity by different degrees of thickness. Since the division of finite element software is a relatively complex and cumbersome task, this model also greatly simplifies the target parts, and requires researchers with relatively high professional quality. High; the 3D digital prototype method is usually established using professional 3D modeling software, and with the help of advanced graphics workstations and large-capacity computers, it consumes a lot of resources
[0004] The deficiencies and defects of the existing technology are: from the perspective of modeling of vulnerability analysis, most of them use finite element method or use 3D modeling software to build 3D vulnerability models, and have not really established a method that can guarantee calculation accuracy. It also has a vulnerability model with high computational efficiency, which affects the accuracy and computational efficiency of the vulnerability analysis results; establishing a more accurate 3D vulnerability model requires a lot of resources, and the vulnerability analysis calculation cost is high, Expensive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Target vulnerability analysis method
  • Target vulnerability analysis method
  • Target vulnerability analysis method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Target vulnerability refers to the possibility of the target being damaged under the action of ammunition damage elements under the condition that the target is detected. Use is very important. Vulnerability modeling avoids various characteristics of previous vulnerability models, such as too simple or complex modeling and long calculation time, which can effectively improve the efficiency and accuracy of vulnerability analysis.

[0023] Such as Figure 1 As shown, the specific process of the present invention is: analyze the function and structure of the determined research target, establish a three-dimensional digital model of the target, and give the target structure tree; based on the target analysis and structure tree, propose damage levels and identify vulnerable / non-destructive Establish the damage tree corresponding to the vulnerable parts; judge the typical attack direction of the damage element on the target according to the shape and structure characteristic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a target vulnerability analysis method, which comprises the following steps: analyzing the function and structure of the determined research target, establishing a three-dimensional digital model of the target, and providing a target structure tree; Based on the target analysis and structure tree, the damage grade is proposed, the vulnerable/non-vulnerable parts are identified, and the corresponding damage tree is established. According to the shape and structure characteristics of the target, the typical strike direction of the damage element to the target is judged, the appearance surface is determined, and the equivalent model of the target is established by the projection method. Through theoretical analysis and numerical simulation to obtain the damage data ofcomponents, combined with the damage element information, the vulnerability of the target under the condition of the damage element is obtained. The target vulnerability analysis method provided by the invention can obtain higher calculation efficiency under the condition of guaranteeing the target vulnerability calculation accuracy, and is suitable for the vulnerability analysis of the kinetic energy type damage element to vehicles, missiles, airplanes and other targets.

Description

technical field [0001] The invention relates to a target vulnerability analysis method, which belongs to the technical field of damage theory analysis. Background technique [0002] Target vulnerability belongs to the damage theory and technical category of weapon science and technology. For target vulnerability in a broad sense, it refers to the difficulty of being damaged when the target is attacked. Damage should be considered in combination; target vulnerability in a narrow sense refers to the sensitivity of target damage to damage factors under the direct action of damage factors. The characteristic parameters and vulnerability model structure can provide basic damage criteria and criterion information for warhead power design, and provide target characteristic data for weapon system tactical application and combat decision research. Vulnerability modeling is one of the important means of target vulnerability analysis. It can be used to design and construct weapons (am...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/50G06T17/00
CPCG06T17/00G06F30/20
Inventor 舒彬王玉王树山梁振刚范艺凯
Owner 北京中恒天威防务科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products