书目名称 | Proceedings of 2023 11th China Conference on Command and Control | 编辑 | Chinese Institute of Command and Control | 视频video | | 概述 | Gathers the outcomes of C2 2023, held in Beijing, China.Enriches understanding by including contributions from leading experts.Serves as a reference for researchers and practitioners in academia and i | 丛书名称 | Lecture Notes in Electrical Engineering | 图书封面 |  | 描述 | .This book presents a selection of peer-reviewed research papers that were originally presented at the 11th China Conference on Command and Control (C2 2023), held in Beijing, China, on October 24–25, 2023. The book covers a wide range of topics related to intelligent command and control, including Theories, Modeling and Simulation, System Engineering Technology, 5G and Intelligent Command, Control and Management Integration Technology, Joint Cooperative Command and Control Organization Management, Agility in the Network Age, Cyberspace Situational Awareness Technology, CPS Parallel Management and Control, Unmanned Systems, Intelligent Military Camp Technology, Architecture Design for Intelligent Air Traffic Control Systems, Human–Machine Interaction and Virtual Reality, Swarm Intelligence and Cooperative Control, and Intelligent Gaming Theory and Technology... .The research presented in this book offers the latest insights into theories, algorithms, and applicationsin command and control. As such, it is an essential resource for researchers, engineers, and university students interested in this field. By bringing together cutting-edge research from leading scholars in the field, t | 出版日期 | Conference proceedings 2024 | 关键词 | Command and Control; Intelligent Command and Control; C4ISR Theory and Technology; Cyberspace Security; | 版次 | 1 | doi | https://doi.org/10.1007/978-981-99-9021-4 | isbn_softcover | 978-981-99-9023-8 | isbn_ebook | 978-981-99-9021-4Series ISSN 1876-1100 Series E-ISSN 1876-1119 | issn_series | 1876-1100 | copyright | Chinese Institute of Command and Control 2024 |
1 |
,Polynomial-Based Guidance Law Design for Various Target Motions, |
Dawei Liu,Yaning Wang,Shiyao Lin,Yuhui Pu,Mutian Guo |
|
Abstract
This paper aims to devise impact time guidance law for intercepting various types of targets with terminal angle constraint. The design of the guidance law is formulated in the range domain by using a virtual relative frame. Based on the thought of polynomial guidance, three unknown coefficients are introduced to design the guidance command. For simultaneously satisfying the terminal desired constraints, the analytical solution to the proposed law can be eventually obtained. The effectiveness and robustness of the proposed guidance law are successfully validated via numerous simulations under various target motions.
|
2 |
,Air Combat Agent Construction Based on Hybrid Self-play Deep Reinforcement Learning, |
Zhijie Xia,Yiming Mao,Jiafan He,Jiaxin Chen,Qingwei Li |
|
Abstract
In increasingly complex air combat, machine learning method such as deep reinforcement learning (DRL) for air combat decision-making control has become a research hotspot. In order to prevent air combat agents from falling into local optimum and enable the agents to gain advantages over diversified opponents, this paper proposes an air combat agent construction method based on hybrid self-play deep reinforcement learning. Before each game in training, DRL agent selects the opponent randomly from a strategy pool that includes multiple expert system agents and DRL self-play agent with delayed updates. Agents gain experience in confronting multiple opponents, and keeping exploring new air combat skills when confronting self-play agent with delayed updates. The experimental results showed that the trained agent achieved a very high winning rate against expert system agents. This demonstrates that this method is effective in improving the winning rate and preventing the agent from falling into the local optimum.
|
3 |
,Analysis of Distributed Cross-Domain Anti-sea Combat Command and Decision-Making Capability Enhancement, |
Xinye Zhao,Zhu Kou,Shuai Zhang,Peng Liu |
|
Abstract
With the emergence of strategic-level operational concepts such as maritime distributed operations and joint full domain operations in the cutting-edge military domain, the issue of distributed maritime cross-domain collaborative command and adaptive control capabilities has gained mounting attention in research literature and military practices. In order to improve military’s ability to deal with rival enemies at sea, this paper identifies and discusses different measures for improving the distributed cross-domain maritime combat command and decision capabilities. This paper details the new combat concepts and projects recently released by the advanced military troops and explores the relevant military requirements and application prospects, then summarize the composition and key technologies of the combat command and decision system are summarized. Finally, the typical maritime distributed combat scenario is simulated by the military wargame system.
|
4 |
,Distributed Bee Actor-Critic Algorithm: An Approach for Intelligent Wargaming, |
Junjie Zhao,Yuxiang Sun,Sheng Zhou,Yuanbai Li,Xianzhong Zhou |
|
Abstract
This paper presents the Distributed Bee Actor-Critic Algorithm, an innovative approach for intelligent wargaming. The algorithm combines the strengths of the artificial bee colony algorithm and the asynchronous dominant actor critique architecture for efficient learning in complex environments. A simulated wargaming scenario was used to test the proposed approach, demonstrating its superior performance compared to other leading edge algorithms.
|
5 |
,Research on a Low Interception Directional Modulation Technology, |
Hongxing Gao,Junjun Gao,Qingping Song |
|
Abstract
In response to the launch satellite‘s low interception demand, the directional modulation technology based on the phased array is proposed, and the phase shift value of each antenna of each different symbol is obtained by integrating constellation points via the genetic algorithm. In various symbols, each antenna has a different phase shift angle, and it will not reach the amplitude value of the same direction superposition, resulting in a loss of amplitude gain. The loss brings some freedom. The final simulation results show that the directional modulation based on the phased array can enable the receiver to receive the traditional constellation map in the desired direction, and the constellation map is not distorted; in other directions, the receivers receive a distorted constellation map, and it is difficult for ordinary receivers to extract useful information from the distorted constellation map, so it can effectively and well achieve secure communication.
|
6 |
,Spaceborne Sea Ice Edge Detection Using TechDemoSat-1 GNSS-R Signals, |
Hongxing Gao,Qingping Song,Junjun Gao,Kailan Zhao |
|
Abstract
In order to detect the sea ice edge (SIE) from Global Navigation Satellite System Reflectometry (GNSS-R), a model that may be employed in space is being developed in this research. The method is used delay-Doppler maps (DDM) of GNSS-R with K-means cluster algorithm. Here, the sea ice or sea water reflected power of delay maps (DM) is derived from the DDM, then a K-means cluster method is adopted to obtain the clustering center of sea ice and sea water. Combined with the specular reflection point position, it enables us to distinguish sea ice edge through studying the values of K-means cluster observable. Comparing with the global sea ice distribution map, the specular reflection point corresponding to the threshold value of K-means cluster basically coincides with the sea ice boundary position of the sea ice distribution map. The DDM data was obtained from the UK TechDemoSat-1 (UK TDS-1) experiment. According to the training observable of K-means cluster, it can be judged as sea ice or sea water by comparing the thresholds, respectively. By comparing K-means observable based on detection results with a map of the distribution of sea ice around the world, this method‘s viability is demonstrated with an accuracy of up to 99%.
|
7 |
,A Development Route of the Information System Facing the Threat of Hypersonic Technology, |
Bin Zhang,Lan-lan Gao |
|
Abstract
With the development of hypersonic technology, we investigated the current key projects in the United States and Russia, and reviewed the current status of hypersonic technology according to the most interesting configuration of boost-glide wave-rider, from aspects such as shape design, aerodynamic calculation, and flight control. Then we analyzed the realistic challenges of hypersonic time-sensitive targets to current information systems. In the face of the hypersonic challenge, some military powers have put forward some countermeasures. For example, the United States proposed to upgrade the ballistic missile defense system, and Russia proposed to build an air-space early warning network. However, the current measures do not have a comprehensive and systematic top-level plan, and local enhancement cannot improve overall effectiveness. Facing the future long-term development, this paper proposes a development route of an information system for hypersonic time-sensitive targets from four aspects: joint system architecture, early warning detection, overall mission planning, and synergistic interception means. Facing the hypersonic time-sensitive targets, this development route will quickly adapt to the near-space environment, reorganize the battlefield resources, and improve the capabilities of the entire defense system centered on information systems as soon as possible.
|
8 |
,An Analysis Method of Target Value Considering Combat Phases, |
Xuezhi Lyu,Changjiang Liu,Zhige Xie,Changpeng Xu |
|
Abstract
Target value analysis is not only an important content of operation planning, but also the core work of intelligence analysis, which is of great significance to combat operations. In this paper, a target value analysis method considering combat phases is proposed. Firstly, the framework of target selection method considering combat phases is introduced. Secondly, the weight determination method of target system based on combat phases is given. After that, we construct various kinds of target complex networks, and analyze the value of target network by using complex network centrality index according to the characteristics of target and combat goal. Then, the BP neural network is used to evaluate the self-value of all kinds of targets. Finally, the weight of the target system, the value of the target network and the value of the target itself are combined to get the target value, which is the basis of target selection and strike. Finally, the method is applied in an example to verify its feasibility and effectiveness. This method not only considers the influence of combat phases on target selection, but also considers target network value and target self-value, so it can better adapt to the change of combat situation.
|
9 |
,Military Deception Identification Method Based on Multi-criteria Decision Analysis, |
Xuezhi Lyu,Changjiang Liu,Xiaorong Feng,Kai Wang |
|
Abstract
Military deception is widely used in war. How to identify military deception is a complicated task. In this paper, the problem of identifying military deception is transformed into a multicriteria decision analysis problem. Firstly, the definition of military deception and counter-deception is analyzed. Then, it introduces the idea of quantitative analysis of military deception identification. Then, the index system of military deception identification is constructed, and the AHP-Entropy-DEA-TOPSIS method is given to evaluate the deceptive of evidence. Finally, the method is applied to the Japanese intelligence analysis of Battle of Midway in an example to verify the feasibility and effectiveness of the method.
|
10 |
,Technical Exploration of High-Resolution Optical Detection System for Ultra-Low Orbit, |
Hongwei He,Huan Yan,Hongyue Geng,Qianyu Hu,Xiangguo Xiao |
|
Abstract
Currently, aerospace activities are becoming increasingly frequent, and investment in research and development of the aerospace is constantly increasing. Especially in the United States, the “Starlink” program occupies a large amount of airspace, leading to a saturation of the use of space orbit resources. In response to this reality, after researching and analyzing the characteristics of the ultra-low orbit environment, a construction technology of the high-resolution optical detection system for the ultra-low orbit was proposed. The overall structure of the high-resolution optical detection system was designed with the imaging module, the radiation calibration module, and the control module as the main modules. The working characteristics and basic tasks of the main modules were analyzed, and the capability requirements and construction direction of the ultra-low orbit detection system were given. The research results of this paper will provide a certain reference for the construction of the high-resolution optical detection system for the ultra-low orbit.
|
11 |
,Electromagnetic Segmentation Technology for Heterogeneous Unmanned Aerial Vehicles Based on Mosaic Warfare, |
Mingqiu Ren,Bingqie Wang,Qian Guo |
|
Abstract
Mosaic warfare as an important means for the US military to implement “decision center warfare”, will become an important traction for the intelligent transformation of unmanned warfare. Starting from the connotation of the concept of mosaic warfare, this paper analyzes the principles and characteristics of the application of heterogeneous electronic warfare UAVs in the US military. Based on future unmanned combat scenarios, electromagnetic segmentation combat styles such as battlefield situation ubiquitous detection, early warning detection network segmentation, and manned and unmanned cooperative attack are studied. Key issues that need to be addressed in heterogeneous unmanned aerial vehicle swarm operations are discussed from the aspects of command and control architecture design, dynamic communication networking, and intelligent task allocation.
|
12 |
,Key Technologies for Heterogeneous Unmanned Aerial Vehicle Swarm Cross-Domain Collaborative Operations, |
Mingqiu Ren,Bingqie Wang,Huabing Yang |
|
Abstract
The Russia-Ukraine conflict and the Nagorno Karabakh war show that the unmanned combat force represented by UAVs has become an important part of the joint combat force system, playing an increasingly prominent role as an efficiency multiplier. In recent years, military powers such as the United States and Britain have taken cross domain collaboration as an important development direction for unmanned aerial vehicle swarm warfare. Section . analyzes the main characteristics of using drone swarms to perform tasks. Section . analyzes the latest progress of drone swarm projects at research institutions such as DARPA and Dassault Aircraft in France. Section . studies the key technologies to achieve cross domain application of heterogeneous UAV swarms, mainly including the overall swarm command and control architecture design, UAV swarm combat support system, swarm collaborative planning technology, and so on. The research provides key technical support for suppressing, jamming, and attacking the enemy‘s modern air defense early warning system using heterogeneous drone swarms.
|
13 |
,Research on Cyberspace Intrusion Detection Model for Wireless Agile Network Planning, |
Xiaotao Xu,Huai Wang,Haoyin Mo,Fu Lin |
|
Abstract
As the Internet technology rapidly advances, the world is transitioning into an information society with a growing amount of valuable data in cyberspace. Consequently, ensuring the security and reliability of cyberspace has become a critical challenge. Although traditional intrusion detection techniques have shown effectiveness, they suffer from drawbacks such as slow detection speed, low accuracy, and high false alarm rates. To address these issues, this paper presents a novel intrusion detection model, the Neuron-mapping-based Inception Convolutional Neural Network (NICNN), based on deep learning technology. Experimental results reveal impressive accuracy rates of 99.56% and 99.24% on the 10% KDD99 data set and KDDTRAIN + data set, respectively, along with remarkably low false alarm rates of 0.15% and 0.22%. Compared to existing intrusion detection methods, NICNN exhibits superior detection performance.
|
14 |
,Research on Routing Planning of Wireless Sensor Networks Based on Cat Swarm Optimization Algorithm, |
Xiaotao Xu,Xing Yang,Min Chen,Xun Wang,Jian Zhang |
|
Abstract
In the wireless sensor network, the sensor node is not charged by the micro-battery, which makes the network energy limited and the topology is unstable. Therefore, it is designed to ensure the stability of the network while finding a balance on the basis of energy balance. A routing algorithm that senses the routing path between a node and a sink node or base station is necessary. Cat Swarm Optimization (CSO) is a new clustering intelligent algorithm. It is aimed at the shortcomings of cat group algorithm in wireless sensor network routing applications, such as easy to fall into local optimum and slow convergence. An improved cat group algorithm. There are two improvements. One adjusts the grouping rate of the cat group mode with time, accelerates the convergence speed of the cat group algorithm, and finds the optimal path faster. Secondly, the inertia weighting factor is introduced in the tracking mode to avoid the optimal solution falling into the local part. Optimal and balanced energy consumption. The simulation experiment of the proposed routing algorithm is carried out by NS2 (Network Simulator-version2) simulator. The experimental results show that the improved algorithm converges faster and the convergence speed is increased by about 20% compared with that before the improvement. Factor, the search ability is stronger, can avoid falling into local optimum, the average residual energy of the improved node is higher and the residual energy standard deviation is less than before the improvement, indicating that the improved energy consumption is more balanced, and can extend the life cycle of the network and improve the cat population. The performance of the algorithm is better than the basic cat group algorithm. In the contrast experiment, the directional diffusion routing algorithm is added. The initial energy of the node is 500 energy units. The average residual energy of the cat group optimization algorithm is 320 energy units higher than the 200 energy units of the directed diffusion routing, indicating that the cat group optimization algorithm can Better extend the life of wireless sensor networks. The experimental results show that the cat group optimization algorithm can better balance the energy consumption of wireless sensor network nodes, prolong the network lifetime and improve the stability of the network.
|
15 |
,Critical Technologies for UAV Swarm Collaborative Mission Planning, |
Sun Yu,Yin Ranran,Li Nan |
|
Abstract
This paper delves into the pivotal technologies of cooperative mission planning of Unmanned Aerial Vehicle (UAV) swarms, encompassing collaborative control technology, task allocation and path planning technology of UAV swarm, communication technology of UAV swarm, and decision-making and execution technology. Challenges of UAV swarm collaborative mission planning are analyzed, including technical, security, privacy, and regulatory and policy issues. The future development direction of UAV swarm collaborative mission planning is also discussed, with the anticipation that UAV swarm joint mission planning technology will mature further, and its application field will expand. Recommendations for future research are also provided.
|
16 |
,Attitude Autopilot for a Gliding Spinning Projectile via Modified Trajectory Linearization Control, |
Yuchen Wang,Shiyao Lin,Zhichen Yu,Yichen Cheng,Wei Wang |
|
Abstract
In this paper, the rapid attitude stabilization problem of guided spinning projectile (GSP) with uncertainties and disturbance is investigated. First, a coupled attitude dynamics model for GSP was developed as control plant with parameter uncertainties and external disturbance. Then a sliding mode based fixed-time trajectory linearization control method is presented with a novel fast fixed-time integral sliding mode (ISM). The ISM is singular-free and ensuring the settling time independent to the initial condition. Moreover, an adaptive sliding mode control (SMC) technique is then synthesized to alleviate SMC inherent chattering. The stability and fixed-time convergence of GSP states are rigorously proved. The numerical simulations are carried out to validate the efficient of proposed control scheme in attenuating system uncertainties.
|
17 |
,Desired Impact Time Range Based on BP Neural Network, |
Chang Liu,Weipeng Fan,Junzhi Li,Ziyang Zhu |
|
Abstract
This paper focuses on the analysis of the desired impact time range under multiple constraints. In order to solve the problem that the precision of the traditional formula method is not high enough to calculate the time range, this paper proposes, for the first time, the application of a BP neural network to address the problem, thereby mitigating the failure of the salvo attack. First, a specific guidance law with multiple constraints was selected, and it was demonstrated that the desired impact time range cannot be accurately solved by the traditional formula method, which leads to miss. Secondly, analyzed the parameters that affected the guidance time range, and carried out sensitivity analysis on them, so as to obtain the influence degree of each parameter on the range, and reduced the sample size while ensuring accuracy. Then, the binary search method was applied to obtain the impact time range, in order to obtain the samples. After obtained the samples, the BP neural network was used to train the samples. Finally, the accuracy of this method was verified by simulation, which provided an important premise for salvo attacks.
|
18 |
,Research on Communication Anti-jam Analysis Model Based on Effect, |
Shi Wei,Zhu Yang |
|
Abstract
The article explores the module composition of a communication anti-jam analysis model based on effect. The sub modules of each model are designed from three levels: communication equipment, link, and network. The main process of model instantiation is explored, and the workflow of four main steps during model operation, including loading device instances, constructing electromagnetic environments, generating adversarial situations, and providing simulation services, is analyzed.
|
19 |
,The Data Flow Method Based on Extended Finite State Machine, |
Boting Xu,Yi Liu,Lingzhi Shan |
|
Abstract
The current data flow of battlefield situation has the characteristics of real-time acquisition, elements complexity and cross-domain collaboration. Based on the data flow technology in cloud architecture, we design a state model for the data flow of battlefield situation, and introduce an extended finite state machine (E-FSM) model to describe it in levels. Then, a mapping relationship between the data flow process and the E-FSM model has been established, and we propose a data flow method of battlefield situation in cloud architecture based on E-FSM model. The new method will improve the perception ability of data flow, which would contribute to the battlefield situation sharing in practice.
|
|
|