反潜体系的搜索能力优化方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
人类目前对海洋水声环境的认识尚处在初级阶段,水下作战的相关领域还存在着很多空白,这种现状客观上为军事发达国家和军事发展中国家缩小反潜作战能力差距创造了条件。尽管反潜作战为各国所重视,但是对于潜艇的搜索、跟踪仍面临很多困难,尤其在浅海,混响和反射所形成的背景噪声几乎能把潜艇自噪声淹没,对潜探测和对潜搜索、跟踪很多时候需要在现有装备能力的基础上通过组合运用达到目标。本文针对反潜武器装备体系搜索能力优化方面的相关问题开展研究,目的是通过理论研究和仿真实验,使研究成果经过适应性改造能够服务于部队,辅助反潜武器装备体系作战指挥人员进行反潜决策。
     本文的研究内容主要包括:
     (1)反潜武器装备体系的研究背景和搜索能力优化问题的研究现状。给出了反潜武器装备体系的广义定义和狭义定义,对体系反潜搜索能力优化的研究现状和所面临的主要问题进行了归纳,提出了本文所要解决的关键问题。
     (2)反潜武器装备体系搜索能力优化问题的论证框架。建立了反潜武器装备体系的军事概念模型,对搜索能力优化问题可能涉及的边界条件进行了约定,建立了反潜武器装备体系搜索能力优化问题的论证框架。
     (3)基于加权Voronoi图(Weighted Voronoi Diagram,WVD)的反潜武器装备体系搜索能力配系与优化方法。建立反潜武器装备体系作战节点的能力指标体系,依据作战节点的综合能力指数生成反潜体系各种能力的WVD,通过能力之间关系的综合分析和搜索能力影响因素的针对性分析,提出搜索能力在体系层面的配系与优化方法。
     (4)基于反潜探测包络(Anti-Submarine Detection Profile,ASDP)的联合探测方法研究。针对反潜探测设备种类繁多、探测范围和探测区域的形状差异很大的特点,提出通过投影将不同探测设备的探测包络映射到海平面,进而对这些探测包络进行融合的思想,融合后的探测包络能够反映当前反潜探测的整体态势。为了更加精确地描述融合后的探测包络,提出了ASDP概率面,它通过概率分布的可视化方式相对精确地描述了反潜体系搜索能力的全局态势分布,这个结果经过实际改造就可以辅助反潜体系作战人员进行指挥决策。
     (5)基于隐马尔科夫过程(Hidden Markov Modeling,HMM)的联合搜索(JointSearch,JS)方法研究。提出反潜装备体系对潜联合搜索分为态势判断和搜索行动决策两个大的阶段。其中态势判断阶段采用HMM技术对目标潜艇进行运动建模,通过其状态特征以及提出的TSM(Tri-States-Matrix)概率转移矩阵来求得目标潜艇的状态;在搜索行动决策阶段,从时间配系和位置配系角度对体系层面的搜索能力进行了分析,得到行动决策方案。
     (6)基于异构传感器网络(Heterogeneous Wireless Sensor Network,HWSN)的联合覆盖方法研究。通过反潜武器装备体系的作战节点与无线传感器网络(WSN)中的节点相比较,提出基于ASDP概率面的HWSN概念,使WSN中的概率感知模型成为ASDP概率面的一个特殊情况。从重点方向防御、重点封锁线防御和重点区域防御三个角度对反潜装备体系的搜索能力问题进行了形式化描述和ASDP概率面仿真。仿真结果表明,得到的联合覆盖效果分析SCO问题方便直观,无论从体系态势的宏观还是到作战节点运动的微观,对反潜作战指挥人员都能起到辅助决策作用。
     论文的创新之处包括:(1)从体系层面对反潜武器装备体系的作战过程进行了宏观分析,对各个环节的主要问题进行了抽象,形成了完整的反潜武器装备体系搜索能力优化问题的论证框架;(2)提出了采用WVD技术分析反潜武器装备体系搜索能力配系和优化问题,该方法能从宏观上分析各作战节点能力之间的关系,也能从静态角度对体系的搜索能力进行配系和优化,结论具有很好的可信度,有很强的实用性;(3)提出将异构传感器的探测范围投影到海平面,融合形成联合探测包络,使反潜武器装备体系具有反潜统一态势,从根本上解决了以前体系层面没有反潜统一态势的局面,提出了ASDP概率面对反潜统一态势进一步量化,这一结果可以对反潜作战指挥人员提供辅助决策,从而将信息优势转化为决策优势;(4)提出了HMM-JS的联合搜索框架,将联合搜索分成目标态势决策和行动决策两个阶段,加强了联合搜索过程的理论性指导,同时这一框架与现有的各种战术反潜行动研究成果能有效结合起来,从而形成一套完整的联合搜索方法论;(5)节点同构无线传感器网络是节点异构的无线传感器网络的特殊情况,提出了基于概率感知模型的WSN是基于ASDP概率面的HWSN的特殊情况,通过仿真实验对这两者进行了对比分析,对三种重要的覆盖模式进行了形式化描述和仿真实验,结果表明后者完全可以包含前者,并具有更强的适用性,能够为指挥人员提供辅助决策。
     加强对反潜武器装备体系的搜索能力优化问题的研究,是以信息系统为基础的联合反潜作战行动的重要研究内容。作为传统的单平台或多兵种小尺度反潜搜索行动的延伸,本文所开展的是一项具有前瞻性同时又非常紧迫的研究,本文对反潜武器装备体系搜索能力优化的关键问题进行了分析建模,提出了相对完整的方法论,可以为反潜装备体系搜索能力的优化提供理论支撑,并为反潜体系作战指挥人员提供反潜作战辅助决策支持。
Anti-submarine War(ASW) issue has always been the navies attention.Given thecurrent level of scientific development, the knowledge and awareness people on theocean acoustic environment are still in the early recognition stage, and the gaps betweenthe developed countries and undeveloped countries in ASW capabilities are beingnarrowed objectively. Although the ASW to the attention of all countries, but for thesubmarine search, tracking is still faced with many difficulties, especially in shallow seaarea. Reverberation and reflection formed by background noise can almost put thesubmarine’s covered. Many times, the detecting and tracking to submarine need througha variety of military and intelligence as assistant means. In this paper, aiming at theASW searching methodolgy, macroscopic analysis on key issues such as detection,coverage, and searching and combat and other aspects of are discussed in detail. Thecontent of this research includes:
     (1) ASW systems of system (ASWSOS) research background and related research.After given the generalized definition and narrow definition of ASWSOS, mainproblems the anti-submarine facing are summarized, and puts forward the key problemsto be solved.
     (2) The hierarchical demonstration framework of ASWSOS searching issue. Jointdetecting, joint covering, joint searching and integrated system and optimization ofASW are analysed. After establishing the hierarchical decision framework on searchingproblem of ASWSOS, this paper lists these major theoretical issues to be solved in theframework.
     (3) Integrated configuration algorithm based on weighted Voronoi diagram (WVD).ASWSOS operational node with a variety of operational function is established abilityindex system which is described by power exponent. Such integrated indexes are asinput values of WVD which draw the range of ASWSOS operational node capability.Through analysis comparison in WVDs, the commander of ASWSOS can optimizeoperational force’s distribution or reposition plan.
     (4) Heterogeneous sensors joint detection algorithm. Because detection range anddetection region shape vary greatly for detection equipment in ASW, this chapter putsforward the concept of detection profile anti-submarine detection profile (ASDP) isintroduced as well. By planar integration of detected profiles from different detectiondevice, the probability of area (POA) detection is formed, and POA is one of the mostimportant concepts.
     (5) Joint search algorithm based on the HMM-JS framework. Submarine’s infestedfeatures in sea battlefield conform to Markov rules, and various states of submarinemoving underwater can be enumerated by parameters such as speed, heading, position and other parameters. Joint searching model based on Hidden Markov Modeling(HMM)is put forward and two cases combined search algorithm, medium and shortrange of search,, are proposed.
     (6) Combined coverage algorithm of heterogeneous wireless sensor network(HWSN). As operational nodes of WSN are similar to ones of ASWSOS, computingsimilarities and differences are studied in this chapter. Formal description of HWSN isgiven and it proposes operational node combined coverage algorithm in three typicalconditions with POA algorithm.
     The innovation of the thesis includes: After a macroscopical analysis fromASWSOS level, main issues of all aspects are abstracted and a hierarchicaldecision-making framework for ASWSOS searching algrithm is proposed; Put forwarda new capacity division method of operational node using WVD. Through the analysisof the different operational node ability, we can improve the theoretical basis ofASWSOS searching algorithm. ASDP algorithm are given which contains two aspect:one is the projection of heterogeneous sensors range and the other one is data fusion ofcombined detection, furthermore, the concept of POA is put forward, which is an veryimportant tool for analysis of integrated combat situation. The uniform state threatlevels can also be reflected by POA of ASDP; Three kinds of typical joint coveragealgorithms based on the HWSN are established, combined with joint searchingalgorithm based on HMM-JS two-layer decision framework," decision making andaction", is formed.Comparing Probabilistic Coverage model of WSN to POA-BasedHWSN, it is obviously that the former is one of a special case of the latter.
     Strengthen research on searching problem of ASWSOS is an important content ofjoint antisubmarine action based on information system. As the traditional singleplatform or the arms of small scale antisubmarine action extends, the research of issuein this paper is a forward-looking and very urgent research. This methodology thisarticle discussed will provide theory support for the future ASW.
引文
[1]国防科技名词大典:船舶[M],航空工业出版社,2002.1
    [2]王健,纪金耀,美国航母战斗群反潜作战[J],现代舰船,2004年第7期
    [3] David T. Hughes, Arjan Vermeij Heterogeneous underwater networks for ASW:technology and techniques[J],UDT Europe, Undersea Defence Technology Europe,Glasgow,United Kingdom,10-12June2008
    [4] Zaihan Jiang, Underwater Acoustic Networks–Issues and Solutions[J],International Journal Intelligent Control And Systems,2008, Vol(13).No.3:152-161
    [5] GEN James T. Conway, ADM Gary Roughead, ADM Thad W. Allen, ACooperative Strategy for21st Century Seapower[R], Washington, DC: GovernmentPrinting Office, U.S. Department of the Navy.2007
    [6] U.S. Department of the Navy. Anti-Submarine Warfare: Concept of Operations forthe21st Century, by Task Force ASW.2004[R]http://www.navy.mil/navydata/policy/asw/asw-conops.pdf [accessed April28,2008].
    [7] LIU B S,LEI J Y. Principles of Underwater Acoustic[M].Publishing house ofHaerbin engineering university,1993
    [8]门金柱,周明,伦九凯,反潜编队应召搜索能力计算及效果评估[J],指挥控制与仿真,2008,Vol(30),No.1:41-43
    [9]林福冬,杜一平,舰艇编队对潜搜索效能分析[J],火力与指挥控制,2008,Vol(33). No.2:104-106
    [10]王义涛,模糊AHP的舰机协同对潜搜索方式优选[J],火力与指挥控制,2010,Vol(18).3:167-170
    [11]张圣云,张安,王连柱等,反潜飞机对潜搜索法研究[J],火力与指挥控制,2006,Vol(31),No.l:70-74
    [12]丛红日,王宗杰,沈培志,反潜直升机应召搜索区模型研究[J],舰船电子工程,2010,Vol(30).No9:48-50
    [13]杨日杰,何友,孙明太.航空搜潜装备搜潜范围建模与仿真研究[J].系统仿真学报,2003,15(11):1547-1549
    [14]US Department of the Navy, The Navy Unmanned Undersea Vehicle (UUV)Master Plan[R], http://www.navy.mil/navydata/technology/uuvmp.pdf,9thNovember2004
    [15]吴小勇,基于语义的作战节点信息建模方法研究[R],xxxx研究院,2011.8
    [16]ZHANG R H. Smooth-averaged sound field in shallow water[J]. Acta Acustica,1981;3(4):535-544
    [17]Paul C. Etter. Underwater Acoustic Modeling and Simulation Third Edition[M].Publishing House of Electronics Industry.2005.
    [18]张仁和,金国亮,浅海平均混响强度的简正波理论[J],声学学报(中文版),1984,9(1):12-20
    [19]Jason C. Pittman, Zone Defense Anti-Submarine Warefare Strategy In The Age OfLittoral Warefare[R], U.S. Army Command and General Staff College, USA,2008
    [20]U.S. Naval Doctrine Command. Littoral Anti-Submarine Warfare Concept[R].http://www.fas.org/man/dod-101/sys/ship/docs/aswcncpt.htm [accessed April21,2008].
    [21]A.Benavoli,L.Chisci,A.Farina.Knowledge-based system for multi-target trackingin a littoral environment[J].IEEE Transactions on Aerospace and ElectronicSystems.2006,42(3):1110-1119
    [22]USDOD, Universal Naval Task List (UNTL),Version3.0Electronic only, viaDepartment of Navy Issuance [R]http://www.uscg.mil/hq/cg5/cg513/docs/UNTL_ver_3.0_Jan_07.pdf,2007
    [23]Massimo Annati, Anti-Submarine Weapons-The State of the Art[J], MilitaryTechnology.2008, Vol.32Issue8, p78-91
    [24]徐瑞恩.作战理论基本概念:战斗力、作战能力和作战效能度量.高技术战争与作战运筹分析[M].北京:海潮出版社,1998:465-475.
    [25]甘应爱,田丰,李维铮等.运筹学(第三版)[M].北京:清华大学出版社,2005.
    [26]罗鹏程,傅攀峰,周经伦,武器装备体系作战能力评估框架[J],系统工程与电子技术,2005,Vol(27).No(1):72-75
    [27]赵青松,谭伟生,李孟军,武器装备体系能力空间描述研究[J],国防科技大学学报,2009, Vol.31No.1:135-140
    [28]Franz Aurenhammer, Voronoi diagrams-a survey of a fundamental geometric datastructure[R], ACM Computing Surveys,1991,23(3):345-405
    [29]Franz Aurenhammer, Rolf. Klein, Voronoi Diagrams[R],www.pi6.fernuni-hagen.de/publ/tr198.pdf,1999
    [30]Kim D-S, Cho Y, Kim D. Euclidean Voronoi diagram of3D balls and itscomputation via tracing edges[J],Computer-Aided Design,2005,37(13):1412–1424
    [31]Kim D-S, Cho Y, Kim D. Edge-tracing algorithm for Euclidean Voronoi diagram of3D spheres[C], Proceedings of the16th Canadian conference on computationalgeometry.2004:176–179
    [32]Kim D-S,Chung, Yong-Chae, Seo, Sangwon,Kim, Sang-Pil, Kim, Chong Min,Extraction of crystal structures based on euclidean Voronoi diagram and angledistributions among atoms[J],Key Engineering Materials,2006,(317-318):881-884
    [33]Kim D-S, Chung YC, Seo S, et al.Crystal structure extraction in materials usingEuclidean Voronoi diagram and angular distributions among atoms[J]. Journal OfCeramic Processing Research,2005,6(1):63-67
    [34]刘振,史建国,高晓光,Voronoi图在航迹规划中的应用[J],航空学报,Vol.29Sup,2008.5:16-19
    [35]赵文婷,彭俊毅.基于VORONOI图的无人机航迹规划[J],系统仿真学报Vol.18Suppl.2Aug.2006:159-165
    [36]Homero F. Oliveira1, Mirian B. Gon alves, Eduardo S. Cursi, Antonio G. Novaes,A Model based in Voronoi Diagrams Find the Best Bus-stop Spacing to Minimizethe Total Travel Time of the Travelers[C],International Conference on EngineeringOptimization, Brazil,2008
    [37]Liu Wen-Xia, Zhang Jian-Hua,Yang Xu, et. Dynamic Planning of UrbanSubstation Based on Weighted Voronoi Diagram [C], Power and EnergyEngineering Conference,2009. Asia-Pacific Beijing27-31March2009:1-4
    [38]Nima Mirbakhsh, Arman Didandeh, Ebrahim Ehsanfar, et., Event Propagationthrough Hierarchical Weighted Voronoi Diagram of Facilities[J],2011(underreview after reviewer comments and resubmission to Elviser)
    [39]A. Wathelet, C. Strode, A. Vermeij, Simulating Multistatic ASW Operations withthe Multistatic Tactical Planning Aid (MSTPA) for Tactics Development[C],NATO RTO Modelling and Simulation Group Conference on ‘Improving M&SInteroperability, Reuse and Efficiency in Support of Current and Future Forces’,Prague, Czech Republic, on4-5October2007.
    [40]S. Coraluppi and D. Grimmett, Multistatic Sonar Tracking [C], Proceedings of theSPIE Conference on Signal Processing, Sensor Fusion, and Target RecognitionXII,Orlando2003FL, USA, Proc.5096, pp.399-410, April2003
    [41]Kolev N. ZH.1, Ivanov P. VL.2, Kalovyanchev P. ST,MultiStatic Sonar PulseSignals Time Delay Estimation[J], Journal Of Marine Engineering AndEnviroment,2010,vol3(1): pp169-180
    [42]Yi Ren, Vladimir Oleshchuk, Frank Y. Li, Xiaohu Ge,Security in Mobile WirelessSensor Networks-A Survey[J], JOURNAL OF COMMUNICATIONS, VOL.6,NO.2, APRIL2011,128-142
    [43]Dario Pompili, Tommaso Melodia, Ian F. Akyildiz, Deployment Analysis inUnderwater Acoustic Wireless Sensor Networks[C],WUWNet’06, September25,2006, Los Angeles, California, USA,48-55
    [44]籍林峰,陈建军,吴少鹏,海战场协同探测与目标综合识别技术研究[J],雷达与对抗,2007年第4期:5-9
    [45]王中杰,李侠,周启明,胡国庭,雷达实际平面探测威力模型与仿真算法研究[J],现代防御技术,2007. Vol(35).No.3:117-122
    [46]刘己斌,关祥辰,路建伟,张艺,复杂电磁环境下雷达探测能力分析及仿真[J],系统工程理论与实践,2008年第5期:142-146
    [47]Thomas Clouqueur, Veradej Phipatanasuphorn, Parameswaran Ramanathan,et.Sensor Deployment Strategy for Detection of Targets Traversing a Region[J],Mobile Networks and Applications8,2003:453–461
    [48]SHEN Zhi he, SONG Bao wei, LI Yan, Analysis and Simulation ofSubmarine-searching Operation of Surface Ships, Journal of System Simulation,2008.Vol.(20).No.13:3517-3520
    [49]王义涛,马政伟,水面舰艇编队对潜搜索效能评估模型[J],军事运筹与系统工程,2007.12, Vol(21).No.4:76-79
    [50]徐俊艳,杨日杰,周旭,基于马尔可夫过程的水下运动目标搜索概率研究[J].测试技术学报,2008, Vol.22(4):333-337
    [51]徐俊艳,何友,杨日杰,被动浮标阵搜潜中积累搜索概率研究[J].测试技术学报,2009,3(1):19-22
    [52]杨日杰,改进的螺旋形搜索模型及其在吊放声纳应召搜潜中的应用[J],指挥控制与仿真,2010,Vol(32), No2:35-39
    [53]孙东平,董永峰,刘吉军,反潜直升机搜素常规潜艇概率分析与建模[J],舰船科学技术,2009.07,Vol(31).No.7:126-128
    [54]张阳程,盛飞,王光源,赵绪明,航空磁探仪搜索概率模型建立与仿真研究[J],海军航空工程学院学报,2008,Vol.23, No.3:332-335
    [55]孙飞龙,郑援,王栋,潜艇规避反潜潜艇平行航向法再搜索研究[J],指挥控制与仿真,2009,Vol(31), No2:59-61
    [56]沈治河,潜艇反潜的搜索效能分析与仿真,军事运筹与系统工程[J],2004,Vol(18).No.3:41-43
    [57]周旭,杨日杰,高学强等,基于遗传算法的被动浮标阵优化布放技术研究[J],电子与信息学报,2008,Vol.(30).No.10:2533-2536
    [58]丛红日,声纳浮标阵搜潜效能通用仿真模型研究[J],系统仿真技术,2010.04,Vol6, No.2:104-109
    [59]崔旭涛,杨日杰,何友,声纳浮标与磁探联合搜潜仿真研究[J]。系统仿真学报,2008.8,Vol(20), No16:4357-4359
    [60]Mei Liu, Nuo Xu, and Haihao Li. Multi-Sensor Multi-Target Passive Locating andTracking[J]. International Journal of Control, Automation, and Systems, April2007,Vol(5),No.2:200-207
    [61]Kyeong-Sik Min, Young-Hwan Park, Kyeong-Woo Im,Design for SonobuoyTransmitting Antenna for Anti Submarine Warfare[C], Proceedings of ISAP’04,Sendai, JAPAN,2004,4A3-5:1201-1204
    [62]吴芳,杨日杰高青伟,基于马尔可夫过程的水下运动目标启发式搜索[J],电子与信息学报,2010.Vol.32.No.5:1088-1093
    [63]Lawrence R. Rabiner, A Tutorial on Hidden Markov Models and SelectedApplications in Speech Recognition [C], Proceedings of the IEEE, VOL.77, No.2,February1989.
    [64]Michael Felsberg, Fredrik Larsson, Learning Higher-Order Markov Models forObjectTracking in Image Sequences [C], Proceedings of the5th InternationalSymposium on Advances in Visual Computing: Part II, Lecture Notes in ComputerScience,2009,Vol.5876,184-195
    [65]Andrew Adam, Saleema Amershi, Identifying humans by their walk and generatingnew motions using hidden Markov models [C], CPSC532A Topics in AI:Graphical models and CPSC526computer animation, December15,2004.
    [66]Ardo¨, H., A°stro¨m, K., Berthilsson, R.: Real time viterbi optimization of hiddenmarkov models for multi target tracking [C]. In: Proceedings of the WMVC.(2007)
    [67]I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensornetworks: A survey[J].. Computer Networks (Elsevier) Journal,2002.Vol.38(4):169–181.
    [68]Tian D, Georganas N D. A coverage-preserving node scheduling scheme for largewireless sensor networks[A]. Proceedings of the ACM International Workshop onWireless Sensor Networks and Applications[C]. New York, NJ, USA: ACM,2002.32-41
    [69]Andrew Howard:Mobile Sensor Network Deployment using Potential Fields: ADistributed, Scalable Solution to the Area Coverage Problem[C], In Proceedings ofthe6th International Symposium on Distributed Autonomous Robotics Systems(DARS02) Fukuoka, Japan, June25-27,2002
    [70]Andrew Howard, Maja J Matari′c, and Gaurav S Sukhatme,Mobile SensorNetwork Deployment using Potential Fields: A Distributed, Scalable Solution to theArea Coverage Problem[C], In Proceedings of the6th International Symposium onDistributed Autonomous Robotics Systems (DARS02) Fukuoka, Japan, June25-27,2002
    [71]C. F. Huang and Y. C. Tseng. The coverage problem in a wireless sensornetwork[C]. In Proc. of the2nd ACM international Workshop on Wireless SensorNetworks and Applications (WSNA’03), San Diego, CA, September2003.
    [72]X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. Gill. Integrated coverage andconnectivity configuration in wireless sensor networks[C]. ACM Transactions onSensor Networks,2005
    [73]M.-C. Zhao, J. Lei, M.-Y. Wu, Y. Liu, and W. Shu, Surface coverage in wirelesssensor networks[C], Proceedings of the28th IEEE INFOCOM,2009, pp.109–117.
    [74]S. Adlakha and M. Srivastava, Critical Density Thresholds for Coverage inWireless Sensor Networks [J], IEEE Wireless Communications and Networking,2003.Vol3, pp16-20
    [75]Santosh Kumar, Ten H. Lai, and Anish Arora. Barrier coverage with wirelesssensors[C]. MobiCom’05.,, New York, NY, USA,2005. ACM pp:284–298
    [76]吕超,王硕,谭民,水下移动无线传感器网络研究综述[J],控制与决策,2009.Vol.24No.6:801-807
    [77]臧传治,于海斌,梁韡,白洁音,无线传感器网络覆盖问题中的目标最优运动模式[J],控制与决策,2006Vo l.21No.10:1119-1123
    [78]秦宁宁,张林,徐保国,异构传感器网络覆盖势力剖分算法[J],电子与信息学报2010,Vol.32. No.1:189-194
    [79]王成,樊建席,王仁喜,李硕,基于Voronoi图的无线传感器网络K覆盖算法[J],计算机工程,2012. Vol.38No.4:84-87
    [80]孙华春,李长文,反潜直升机雷达搜索概率模型,舰船电子工程,2009,Vol(28),No8:116-118
    [81]纪金耀.直升机吊放声纳探测和潜艇规避跟踪研究[J].潜艇学术研究,1997(3);20-29.
    [82]S. Garrido, L. Moreno, M. Abderrahim and F. Martin, Path Planning for MobileRobot Navigation using Voronoi Diagram and Fast Marching[C], Conference onIntelligent Robots and Systems, Beijing, China,2006:2376-2381
    [83]叶媛媛,闵春平,沈林成,等.基于VORONOI图的无人机空域任务规划方法研究[J].系统仿真学报,2005,17(6):1353-1355.
    [84]肖秦琨,高晓光.基于空间改进型Voronoi图的路径规划研究[J].自然科学进展,2006,16(2):232-237.
    [85]宋保维、姜军、王鹏、常明,基于Markov过程的潜艇占位能力模型研究[J],鱼雷技术,2007.Vol(15). No.4:45-48
    [86]樊高月,美军联合作战指挥机构及其运作[J],外国军事学术,2003年第3期:9-17
    [87]吴小勇,钟玮珺,基于信息标签的作战信息网络建模方法研究[J].论证与研究.2012.3,Vol.29:20-24.
    [88]R. J. Urick, Principles of underwater sound, Revised ed. xiii[M], New York:McGraw-Hill,1996
    [89]A. Ghosh. Estimating Coverage Holes And Enhancing Coverage In Mixed SensorNetworks[C]. In LCN’04, Washington, DC, Nov.2004.
    [90]Q. Fang, J. Gao, and L. Guibas. Locating and Bypassing Routing Holes In SensorNetworks[C]. In INFOCOM’04, Hong Kong, China, March2004.
    [91]A. Boukerche and X. Fei, A Voronoi Approach For Coverage Protocols In WirelessSensor Networks[C], in Proceedings of IEEE Global Communications Conference,2007, pp.5190–5194.
    [92]王维平,朱一凡,李群,杨峰,曹星平.离散事件系统建模与仿真[M].第二版ed.北京:科学出版社,2007.
    [93]王维平,李群,朱一凡,杨峰.柔性仿真原理与应用[M].湖南长沙:国防科技大学出版社,2003.
    [94]唐苏妍,网络化防空导弹体系动态拦截联盟形成机制与方法研究[D],湖南长沙:国防科学技术大学,2011.3
    [95]徐瑞恩,武器装备效能模型和方法概论[J].装备指挥技术学院学报,2002.Vol(23).No.1:1-5.
    [96]张有会,一种加权Voronoi图的画法[J],计算机科学,2001,8(26):126-130
    [97]Zhang Youhui,Asano Tetsuo,Obokata Koji,Research On Voronoi Diagrams forGeneral Figures By Approximation Structuring[J], Journal On Numerical MethodsAnd Computer Applications,2002,23(3):216-225
    [98]Kei Kobayashi, Kokichi Sugihara, Crystal Voronoi diagram and its applications[J],Future Generation Computer Systems,2002,18(5):681-692
    [99]Schaudt, B.F., Drysdale, R.L.Multiplicatively weighted crystal growth voronoidiagrams[C], Proceedings of the Seventh Annual Symposium on ComputationalGeometry, NY. USA,1991:214-223
    [100] WU Xiaoyong,Zhu Yifan,JingTao.The Algorithm of Points Set Extractingfrom2D Voronoi Diagram Based on Crystal Growth [J].Applied Mechanics andMaterials,2011. Vols.130-134. pp.2249-2252.
    [101] S. Garrido, L. Moreno and D. Blanco,Exploration of a cluttered environmentusing Voronoi Transform and Fast Marching[J], Robotics and AutonomousSystems,2008,56(12):1069-1081
    [102] Kefeng Xuan, Geng Zhao, David Taniar, Maytham Safar and Bala Srinivasan,Voronoi-based multi-level range search in mobile navigation [J],Multimedia Toolsand Applications2011, Vol(53). No.2:459-479
    [103] D. Li, K. Wong, Y.H. Hu, and A. Sayeed. Detection,Classification andTracking of Targets in Distributed Sensor Networks [C], IEEE Signal ProcessingMagazine,2002.19(2), March,
    [104] WU Xiaoyong, Liu Gang, Jing Tao. Algorithm Of ASDP Based OnHeterogeneous Sensors [C]. IEEE,20114th International Symposium onComputational Intelligence and Design, ISCID2011. Zhejiang,Hangzhou.2011.Vol1:89-92.
    [105] B. Karp, H. T. Kung, GPSR: greedy perimeter stateless routing for wirelessnetworks [C], Proc. ACM MobiCom’00, Boston, MA, USA, Aug.2000, pp.243–254
    [106]王树禾,图论[M],北京:科学出版社,2004
    [107]刘伯胜,雷家煜,水声学原理(第2版)[M],哈尔滨工程大学出版社,2010
    [108]孙荣光,马鑫,董永峰,吊放声纳浅海作用距离预报研究[J],中国声学学会2009年青年学术会议[CYCA’09]论文集,2009.
    [109]高学强,杨日杰,周旭,跃变层对主动声纳搜潜概率影响仿真研究[J],测试技术学报,2008,Vol.22,No.1:55-58
    [110]刘孟庵,连立民.水声工程[M].浙江:浙江科学技术出版社,2002
    [111] Ronald T. Kessel, Thomas J. Pastore, Josef Traxl, and Ceyhun Ilguy, SonarPerformance:Treating observations of detection range as measurements [C], Proc.of the Underwater Acoustics Measurement Conference2009(UAM2009), Nafplion,Greece, June2009
    [112] Jin Zhu Men, Qun E, Ke Ming Yao, Study on the Route Planning forAnti-Submarine Ship-Based UAV Based on Genetic Algorithm[J], AdvancedMaterials Research,2012, Vol433-440,4823-4826
    [113] WU Xiaoyong,JING Tao,LIU Lei.Algorithm The Research Of TargetSituation Assessment Based On HMM [C].IEEE,2010International Conferenceon Computer Application and System Modeling,Shanxi,Taiyuan.2010.10.Vol3:307-311
    [114] T. Zhao, R. Nevatia, and F. Lv. Segmentation and tracking of multiple humansin complex situations [C]. In CVPR01,2001, pages II:194–201,.
    [115] Midori Sugaya, Yuki Ohno, and Tatsuo Nakajima, Lightweight AnomalyDetection System with HMM Resource Modeling[C], International Journal ofSecurity and Its Applications,2009,Vol.3, No.3
    [116] Submarine Tracking by Means of Passive Sonobuoys K. Demirbas,Manoeuvring-Target Tracking With The Viterbi Algorithm In The Presence ofInterference [C], IEE Proceedings F: Radar and Signal Processing,1989. pp.262-268,
    [117] Sumeetpal Singh and Vikram Krishnamurthy. The Optimal Search For AMarkovian Target When The Search Path Is Constrained: The Infinite-HorizonCase[J]. IEEE Trans. On Automatic Control,2003,48(3):493-495
    [118]高学强,杨日杰,杨春英.潜艇规避对主动声纳浮标作战效能影响研究[J].系统工程与电子技术,2008,30(2):300-303.
    [119]高学强,杨日杰,安昕,杨春英,潜艇机动规避对抗吊放声纳搜索技术仿真研究[J],测试技术学报,2009,Vol.23.No.1:14-18
    [120]屈也平,反潜巡逻飞机搜潜辅助决策系统建模与仿真研究[D],湖南长沙:国防科学技术大学,2009
    [121] Bezdek C James. Convergence Theory for Fuzzy C-Means: Counter Examplesand Repairs[J]. IEEE Transaction On Systems, Man and Cybernetics,1987,17:873-877
    [122] Hamid Mahboubi, Kaveh Moezzi, Amir G. Aghdam and KamranSayrafian-Pour,Self-Deployment Algorithms for Field Coverage in a NetworkofNonidentical Mobile Sensors [C], IEEE Communications Society subject matterexperts for publication in the IEEE ICC2011American Control Conference (ACC),2011:3227-3232
    [123] Bang Wang, Wei Wang, Vikram Srinivasan, and Kee ChaingChua,Information Coverage for Wireless Sensor Networks[J], IEEECOMMUNICATIONS LETTERS, VOL.9, NO.11, NOVEMBER2005:967-969
    [124] Y. Bar-Shalom and W. D. Blair. Multitarget-Multisensor Tracking:Applications and Advances, volume III[M]. Archtech House, Norwood, MS,2000.
    [125] Jaco Vermaak, Simon J.Godsill, Patrick P’Erez, Monte Carlo Filtering forMulti-Target Tracking and Data Association[J],IEEE TRANSACTIONS ONAEROSPACE AND ELECTRONIC SYSTEMS.2005.Vol.41, No.
    [126] W. Ng, J. Li, S. Godsill, and J. Vermaak. Multiple target tracking using a newsoft-gating approach and sequential Monte Carlo methods[C]. In Proceedings of theInternational Conference on Acoustics, Speech, and Signal Processing,2005. Vol4:1049–1052
    [127] Y. Bar-Shalom, Ed., Multi-Target, Multi-Sensor Tracking: Applications andAdvances[M]. Norwood, MA: Artech House,1998
    [128] A. Filippou, D.A. Karras, R.C Papademetriou,Coverage Problem for SensorNetworks: An Overview of Solution Strategies[C].17th Telecommunicationsforum TELFOR2009Serbia, Belgrade,2009.pp:24-26,
    [129] C.-F. Huang and Y.-C. Tseng. The coverage problem in a wireless sensornetwork[C]. ACM Int’l Workshop on Wireless Sensor Networks and Applications(WSNA), ACM Int’l Workshop,2003. pp:115-121.
    [130] X.-Y. Li, P.-J. Wan, and O. Frieder, Coverage in Wireless Ad-hoc SensorNetworks[J] IEEE Transactions on Computers,2002.Vol52, pp753-763,
    [131] L. Benmohamed, P. Chimento, B. Doshi, B. Henrick,and I-J. Wang, SensorNetwork Design for Underwater Surveillance[C] in Proc. of IEEE Milcom,Washington, DC, Oct.2006
    [132] Zhang H, Hou J C. Maintaining sensing coverage and connectivity in largesensor networks[J]. Ad Hoc and Sensor Networks,2005,1(1/2):89~124.
    [133] S. Meguerdichian, F. Koushanfar, M. Potkonjak, and M. Srivastava, CoverageProblems in Wireless Ad-Hoc Sensor Networks[J], IEEE Infocom2001, Vol3, pp1380-1387
    [134] Wang X R, Xing G L, Zhang Y F, Lu C Y, Pless R, Gill C.Integrated coverageand connectivity configuration in wireless sensor networks[C]. In: Proceedings ofthe1st International Conference on Embedded Networked Sensor Systems. LosAngeles, USA: ACM,2003.28-39
    [135] J. Jaffe and C. Schurgers, Sensor networks of freely drifting autonomousunderwater explorers[C], in Proc.1st ACM Int. Workshop on UnderwaterNetworks (WUWNet’06), USA, Sep.2006, pp.93–96.
    [136] M. Erol, L. Vieira, and M. Gerla, AUV-aided localization for underwatersensor networks[C], in Wireless Algorithms, Systems and Applications,2007.WASA2007. International Conference on,2007, pp.44–54.
    [137] GUO H,YU M. Data Fusion in Distributed Multi-sensor System[J]. Geo-spatialInformation Science(Quarterly),2004,19(3):15-18
    [138] I.J. Cox and S.L. Hingorani. An efficient implementation of reid’s multiplehypotheses tracking algorithm and its evaluation for the purpose of visual tracking[J], IEEE Trans. Pattern Analysis and Machine Intelligence,1996.18(2):138–150
    [139] N. Ikoma and S. J. Godsill. Extended object tracking with unknown association,missing observations, and clutter using particle filters[C]. In Proceedings of the2003IEEE Workshop on Statistical Signal Processing,2003.pp:485–488, St. Louis
    [140] WU Xiaoyong,Zhong Weijun,Jing Tao,Zhu Yifan, The ModelingMethodology of OIN Based on Ontology [C].IEEE,3rd International Conferenceon Multimedia Information Networking and Security, MINES2011.Shanghai,China.2011. pp.91-94.
    [141] John R. Benedict,The Unravelling and Revitalization of U.S. NavyAntisubmarine Warfare[J], Naval War College Review, Spring2005, Vol.58, No.2
    [142] Portela, J.N.,Alencar, M.S.,Cellular Network as a Multiplicatively WeightedVoronoi Diagram [C],Consumer Communications and Networking Conference,2006. CCNC2006, Vol(2):2,Page(s):913-917
    [143] Jeffcoat, D., Krokhmal, P., and O. Zhupanska (2006) A Markov ChainApproach to Analysis of Cooperation in Search Missions. In: D. Grundel et al (Eds),Cooperative Systems: Control and Optimization, Springer Lecture Notes inEconomics and Mathematical Sciences,588,171-184.
    [144] K. Johansson and P. Svensson,“Submarine Tracking by Means of PassiveSonobuoys”, Methodology report, Division of Command and Control WarfareTechnology SE-581, Sweden, June1997
    [145] Christopher Lum,Coordinated Searching and Target Identification UsingTeams of Autonomous Agents[D], University of Washington,2009
    [146] Christopher W. Lum, Matthew L. Rowland, and Rolf T. Rysdyk.Human-in-the-Loop Distributed Simulation and Validation of StrategicAutonomous Algorithms[C]. In Proceedings of the2008AerodynamicMeasurement Technology and Ground Testing Conference, Seattle, WA, June2008.
    [147] Luo Guangcheng, Zhang Dan, Sun Hongxing, Li Dexin,Modeling andSimulating the Single Anti-Submarine Helicopter for the Range-Searching[J],American Journal of Engineering and Technology Research,2011.Vol.11,No.12
    [148] Tim Hardy, Gavin Barlow, Unmanned Underwater Vehicle (UUV)deployment and retrieval considerations for submarines[C], UUV Deployment andRetrieval Options for Submarines presented at INEC2008in Hamburg, Germany
    [149] Haye Lau, Shoudong Huang, Gamini Dissanayake,Probabilistic Search for aMoving Target in an Indoor Environment[C],Proceedings of the2006IEEE/RSJ,International Conference on Intelligent Robots and Systems,October9-15,2006,Beijing, China
    [150] Lan Mu, John Radke,A weighted difference barrier method in landscapegenetics,Journal of Geographical Systems[J],200911(2):141-154Journal ofGeographical Systems,2009, vol.11, issue2, pages141-154
    [151] Fatemeh AHMADI NEJAD MASOULEH,Constructing Weighted VoronoiDiagrams Using Computer Programs,http://giswin.geo.tsukuba.ac.jp/sis/tutorial/GISHint,fatemeh.pdf,2004
    [152] Carbunar B, Grama A, Vitek J, et al. Redundancy and Coverage Detection inSensor Networks[J]. ACM Transactions on Sensor Networks,2006,2(1):94-128
    [153] Chakrabarty K, Iyengar S. S, Qi H, et al.. Grid coverage for surveillance andtarget location in distributed sensor networks [J]. IEEE Trans. on Computers,2002,51(12):1448-1453
    [154] Michael Balzer Capacity-Constrained Voronoi Diagrams in ContinuousSpaces[C],ISVD '09Proceedings of the2009Sixth International Symposium onVoronoi Diagrams Pages79-88
    [155] Avneesh Sud,Danyel Fisher, Huai-Ping Lee,Fast Dynamic VoronoiTreemaps[C], ISVD '10Proceedings of the2010International Symposium onVoronoi Diagrams in Science and Engineering,85-94
    [156] B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley, Mobility improvescoverage of sensor networks[C], in Proc. ACM MobiHoc’05, Urbana-Champaign,IL, USA, May2005, pp.300–308
    [157] Jaffe and C. Schurgers, Sensor networks of freely drifting autonomousunderwater explorers[C], in Proc.1st ACM Int. Workshop on UnderwaterNetworks (WUWNet’06), Los Angeles, CA, USA, Sep.2006, pp.93–96

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700