Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for constructing vulnerability model of typical armed helicopter

A construction method and helicopter technology, applied in the direction of geometric CAD, can solve problems such as the inability to study the protection efficiency and damage probability of key components of armed helicopters, the inability to intuitively understand the damage degree of armed helicopters, and reduce the actual application effect of model construction, so as to achieve accurate Increased damage probability and protection strength

Pending Publication Date: 2021-04-20
中国人民解放军63863部队
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method for constructing a typical armed helicopter fragility model, which can effectively solve the problem that the protection efficiency and damage probability of the key components of the armed helicopter cannot be studied in the process of constructing the vulnerability model in the above-mentioned background technology. As a result, the key components of the armed helicopter cannot be better analyzed after the model components. At the same time, because the damage levels of the key components of the armed helicopter are indeed divided, researchers cannot have a more intuitive understanding of the damage degree of the armed helicopter, thereby reducing The problem of the actual application effect after the model is constructed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for constructing vulnerability model of typical armed helicopter

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0041] Example: such as figure 1 As shown, the present invention provides a kind of technical scheme, a kind of construction method of typical armed helicopter fragility model, comprises the steps:

[0042] S1. Analyze the battlefield tasks of typical armed helicopters;

[0043] S2. Determine the key components of the damage;

[0044] S3. Establishing an equivalent model of key component damage;

[0045] S4. Analyze the protection efficiency according to the protection area;

[0046] S5. Research on damage probability;

[0047] S6, dividing the damage level;

[0048] S7. Establishing a computer simulation model.

[0049] Based on the above technical solutions, in S1, the typical battlefield missions of armed helicopters mainly include ground attack, escort and anti-ship missions, and the ground attack part of the mission is selected for analysis;

[0050] In S2, when a typical armed helicopter performs a ground attack mission, the key components that lead to the damage of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a construction method of a typical armed helicopter vulnerability model, key parts are damaged to cause key function failure of an armed helicopter, and the key parts comprise a detector cabin, a cockpit, an electronic equipment cabin, a generator, a transmission device, an oil tank, an engine, a tail beam and ammunition. If some of the key components above are damaged, armed helicopter will be correspondingly damaged in different degrees. The vulnerability of the armed helicopter can be analyzed in a contrastive manner according to the damage of the key parts by determining the vulnerable key parts of the armed helicopter in the actual construction model and establishing the equivalent model of the damage of the key parts; therefore, a more effective judgment basis can be provided when people analyze the vulnerability of the armed helicopter, and meanwhile, key components are used as vulnerability evaluation indexes, so that a more accurate theoretical basis is conveniently provided for the establishment of a subsequent computer simulation model.

Description

technical field [0001] The invention relates to the technical field of model building, in particular to a method for building a typical armed helicopter vulnerability model. Background technique [0002] Armed helicopter, also known as attack helicopter, is a military helicopter equipped with offensive weapons. It is mainly used to attack ground targets such as infantry, armored vehicles and buildings. Its main weapons are machine guns and machine guns, rockets and precision guided missiles. Many attack Helicopters can also be equipped with air-to-air missiles, but they are mainly used for self-defense, while armed helicopters need to analyze their vulnerability when they actually perform tasks. analyze; [0003] However, in the process of constructing the vulnerability model, the protection efficiency and damage probability of the key components of the armed helicopter cannot be studied, which leads to the inability to obtain better analysis results for the key components ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F30/15
Inventor 陆盼盼于衍琴刘启超焦杨杜传通于立峣
Owner 中国人民解放军63863部队
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products