999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Guidance laws for attacking defended target

2019-12-19 02:03:34QilongSUNChenfengZHANGNingLIUWeixueZHOUNimingQI
CHINESE JOURNAL OF AERONAUTICS 2019年10期

Qilong SUN, Chenfeng ZHANG, Ning LIU, Weixue ZHOU, Niming QI

a Beijing Institute of Space Long March Vehicle, Beijing 100076, China

b Department of Aerospace Engineering, Harbin Institute of Technology, Harbin 150001, China

KEYWORDS

Attacking;

Control effort;

Differential game theory;

Guidance law;

Miss distance

Abstract In this paper,two new guidance laws based on differential game theory are proposed and investigated for the attacker in an attacker-defender-target scenario.The conditions for the attacker winning the game are analyzed when the target and defender using the differential game guidance law based on the linear model. The core ideas underlying the two guidance laws are the attacker evading to a critical safe boundary from the defender,and then maintaining a critical miss distance.The guidance law more appropriate for the attacker to win the game differs according to the initial parameters. Unlike other guidance laws, when using the derived guidance laws there is no need to know the target and the defender’s control efforts. The results of numerical simulations show that the attacker can evade the defender and hit the target successfully by using the proposed derived guidance laws.

1. Introduction

When a missile (attacker) intercepts an aircraft (target), the aircraft will launch a defense missile (defender) to protect itself, making it difficult for the attacker to hit the aircraft.Thus, guidance laws that enable the attacker to overcome this difficulty in such engagements is desired.

The traditional attack-defense scenario consists of two players:an attacking missile and an evasive target.1-3Recently various pursuit-evasion scenarios involving multiple agents have been developed.Separate scenarios involving two players against one target were presented by Liu et al.4and Ganebny et al.5In those scenarios,two players worked to minimize the miss distance, whereas the target endeavored to maximize it.Refs.6,7investigated a scenario in which multiple missiles pursued one target. Active defense scenarios in which a ship launched a defender against an incoming attacker were also presented.8-10Rusnak11investigated a three-player conflict in which a woman endeavored to evade a bandit and her bodyguard tried to intercept the bandit before the bandit caught her. The problem was analyzed using the differential games theory and multi-objective optimization.In recent years,interest has been increasing in the aircraft active defense scenario.Two similar cooperative guidance laws aimed at protecting the aircraft had been proposed.12,13In these proposed laws,the target and the defender had information about the attacker and the core idea was to control the defender such that it always remained in the attacker-target’s line-of-sight. Numerical simulations had shown that a defender that used the derived cooperative line-of-sight guidance law fared better than a defender that only used the proportional navigation guidance law. Shima14presented a scenario in which the guidance law of the attacker was a linear form that was known to the defender and the target.The defender and the target cooperated with each other to guarantee that the defender could intercept the attacker before it hit the target. Shaferman and Shima15proposed a multiple model adaptive control scheme that estimated a possible homing missile guidance law in which the target and the defender were cooperative.Garcia et al.16-18analyzed the guidance law by using the nonlinear method. In Ref.17, they investigated the cooperative defended guidance law with the defender and the target working against the attacker using differential game theory. Kumar and Shima19derived a cooperative nonlinear guidance law based on the sliding model control theory under the assumption that the guidance law of the attacker was linear. Perelman et al.20derived a cooperative differential game guidance law based on a linear model. Further, a scenario in which two defenders protected the target was investigated.21In this paper the cooperative guidance law was one-way.

Ratnoo and Shima22analyzed the conditions for the attacker to evade the defender and hit the target when the defender and attacker used different guidance laws.In the scenario,the attacker ignored the defender and only used its guidance law to hit the target. A guidance law (Evade to a Boundary and Pursuit Guidance Law (EBPGL)) for the attacker to evade the defender and intercept the target was also investigated based on differential game theory by Rubinsky and Gutman.23In their study,the target used its optimal evasion strategy to evade the attacker and the defender used its optimal pursuit strategy to pursue the attacker. Further, the defender and the target were independent and they did not help each other. The core idea of the attacker was to evade to the safe boundary and then change the guidance law to the optimal pursuit strategy.For the attacker to win the game,the attacker needed to know the control effort information(maximum acceleration) of the target and the defender. However,obtaining such information was difficult.An evasion and pursuit guidance law was also presented based on differential game theory.24,25In Ref.24,the attacker chose an appropriate acceleration to evade the defender and then pursued the target.The attacker also needed to know the control effort of the rivals. Weiss et al.26,27proposed a method that guaranteed the required maximum miss distance for pursuit and the required minimum miss distance for evasion by using minimum effort assuming that the information was perfect.

In the past works, the guidance law in the active defense scenario always focused on the cooperative guidance law between the target and the defender to intercept the attacker.The guidance law for attacking the defended target is scarce,and it is always analyzed under the assumption that control efforts of the players are bounded and the velocities of the players are fixed in the engagement.Meanwhile,the velocities,positions,and control efforts of the defender and the target are known to the attacker.23-26The strategy presented by Rubinsky and Gutman23is unsuited for the condition that the Zero-Effort-Miss (ZEM) distance between the attacker and the target is large, and the ZEM distance between the attacker and the defender is small. The guidance law needs to know the strategies of the defender and the target,24-26however, the control effort is difficult to obtain accurately. In this paper,we also assume that the control efforts of the players in the active defense scenario are bounded and that the velocities and positions of the defender and target are known to the attacker. However, the control effort information is unknown to the attacker. Under these assumptions, two new guidance laws are designed for the attacker to win the game under different conditions based on differential game theory. In this paper,the ZEM distance is used as the index.In past research,the attacker always evades to a safe miss distance boundary that is the same sign as the initial ZEM distance. However,in some circumstances,the attacker evading to a safe miss distance boundary that has an opposite sign as the initial ZEM distance will be better.The presented guidance laws are suited not only for the scenario that presented by Rubinsky and Gutman23, but also for the condition that the ZEM distance between the attacker and the target is large,and the ZEM distance between the attacker and the defender is small.

2. Problem formulation

2.1. Nonlinear model

The closing speeds VATand VADbetween the entities are

The rates of the angles of the line-of-sight are

It is assumed that the dynamics of each agent can be represented by linear equations:

Fig. 1 Illustration of engagement involving attacker (A), target(T), and defender (D).

The rates of the flight path angles are

2.2. Linearized kinematics

It is assumed that the engagements take place near the collision triangles, thus,we can linearize the problem around the initial line-of-sight. LOSAT0and LOSAD0represent the initial line-ofsight between the attacker and target,and between the attacker and defender, respectively. yATand yADare the relative displacement between the attacker and the target normal to LOSAT0, and the relative displacement between the attacker and the defender normal to LOSAD0, respectively. In order to linearize the problem around the initial line-of sight,we denote uALand uTLas the accelerations of the attacker and the target perpendicular to LOSAT0, respectively; uDLis denoted as the acceleration of the defender perpendicular to LOSAD0. For the sake of simplicity,it is assumed that the attacker,the target and the defender obey ideal dynamics; thus,Ai=0,bi=0,Ci=0,di=1, and uiL(i=A, T, D) are

The state vectors of the engagement are

The equations of motion are

where δ=cos(γA0-λAD0)/cos(γA0-λAT0). It is assumed that the defender is launched from the target, δ is a positive value.Π(t) is an indicator function reflecting the state of the defender, and it is

The equations of motion can be rewritten as

where

where RAT0and RAD0are the initial ranges between the attacker and the defender,and between the attacker and defender, respectively. VAT0and VAD0are the initial closing speeds,and they are

The time-to-go of the engagements are

3. Differential game between entities

3.1. Order reduction

The ZEM distances between the attacker and the target, and between the attacker and defender are denoted as ZAT(t) and ZAD(t), respectively. ZATt( ) and ZAD(t) can be obtained using

and ηATand ηADare

Combining Eqs. (16)-(19), then substituting gives

3.2. Differential game guidance laws

The dynamics of ZAT(t) and ZATt( ) are given by

In the attacker-target engagement,the aim of the attacker is to minimize the miss distance;conversely,the aim of the target is to maximize the miss distance.The cost function to solve the problem is

As yAT, the cost function can be rewritten as follows:

The optimal strategy of the attacker is to minimize the cost function, whereas that of the target is to maximize the cost function. The optimal strategies for the two players in this game can be easily obtained, and the optimal guidance laws are

In the attacker-defender engagement, the aim of the attacker is to maximize the miss distance, whereas that of the defender is to minimize the miss distance. Similarly, the cost function to solve the problem is

The optimal strategy of the attacker is to minimize the cost function, whereas that of the defender is to maximize the cost function. Both players’ optimal strategies can be easily obtained.

Because δ is a positive value, Eq. (26) can be written as follows

In order for the attacker to win the game,we need to design a feasible guidance law that guarantees that the attacker evades the defender and successfully attains the target. Two cases are discussed.

Case 1. the signs of ZATt=0( ) and ZADt=0( ) are opposite.

For this case,it is known that-sign ZADt( )[ ]=sign ZATt( )[ ].The optimal strategies of the attacker in Eqs.(24)and(26)are the same. If the attacker uses the optimal evasion strategy to evade the defender, it can also successfully pursue the target.The time evolutions of the ZEM distances for this case are shown in Fig. 2. In the figure, the ZEM distance between the attacker and the target is shown as ZAT(t), that between the attacker and the defender is shown as ZAD. Similarly, In the subsequent figures,the time evolutions of the ZEMs are shown as ZAT(t) and ZAD(t).

In Fig. 2, ZAT(t=0) and ZAD(t=0) satisfy

where R is the kill radius of the defender;thus,if the miss distance between the attacker and the defender is not greater than R, the attacker will be intercepted. R1is the kill radius of the attacker; thus, if the miss distance between the attacker and the target is not greater than R1, the attacker will win the game.

Thus, the ranges are

This case is simple, as the attacker only needs to use the optimal pursuit strategy to accomplish the evasion and pursuit task.

Case 2. the signs of ZATt=0( ) and ZADt=0( ) are the same.

Fig. 2 Time evolutions of ZEMs distances.

Fig. 3 Attacker ZEMs for optimal pursuit strategy.

For this case, we need to design a reasonable guidance law for the attacker to accomplish the evasion and pursuit task.

3.3. Design of attacker’s guidance law

In consideration of the attacker easily being intercepted by the defender,the attacker uses the OPGL under the condition that the signs of ZATt=0( ) and ZADt=0( ) are the same. Meanwhile, if the attacker uses the EPGL, it cannot pursue the target because of the large ZATt( ). Thus, we design a new guidance law for the attacker. The cost function is

The adjoint equation and transversality condition are as follows:

Thus, λ1can be obtained using

Substituting Eq. (33) into Eq. (31), we obtain

The attacker tries to minimize H,whereas the defender tries to minimize the miss distance from the attacker. Thus, the optimal strategy of the defender is given by Eq. (26). Meanwhile, the optimal strategy of the target is given by Eq. (24).We can solve the close-loop optimal strategy of the attacker using

Fig. 4 Attacker ZEMs for optimal evasion-pursuit strategies.

N can be given by

Thus, SSBGL needs to satisfy

Substituting Eq. (35) into Eq. (41), we obtain

We solve for the analytical solutions for three general cases.

t*can be given by

Fig. 5 Time evolutions of ZEMs in Case 1 by using SSBGL.

In Fig. 5, ZAT(t=0) is a relatively large value, and ZAT(t=0) needs to satisfy

Substituting Eqs. (44) and (39) into Eq. (47), we obtain

where

Fig. 6 Time evolutions of ZEMs in Case 2 by using SSBGL.

tηsatisfies ZAT(tη)=0; thus,

tηcan be given by

In Fig. 6, it satisfies

Thus, substituting Eq. (39) into Eq. (52), and combining Eq. (55), we obtain

where

where ZAT(tσ)=0. tσsatisfies

Thus, in Fig. 7, ZAT(t=0) satisfies

where

(1) If the range α ≤ZAT(t=0)<μ exists, then ZAT(t =0)=α is the low boundary value for the attacker to win the game using SSBGL.

(2) If the range μ ≤ZAT(t =0)≤κ exists, then ZAT(t =0)=κ is the upper boundary value for the attacker to win the game using SSBGL.

(3) If the range 0 ≤ZAT(t=0)<o exists, then ZAT(t =0)=o is the upper boundary value for the attacker to win the game using SSBGL.

(2) and (3) cannot occur at the same time.

Theorem 1. If (1) and (2) hold true, the attacker can win the game by using SSBGL when ZAT(t=0)∈α,κ[ ].

Theorem 2. If (1) and (3) hold true, the attacker can win the game by using SSBGL when ZAT(t=0)∈α,o[ ].

Fig. 7 Time evolutions of ZEMs in Case 3 by using SSBGL.

We solve the analytical solutions for three general cases:

In Fig. 8 tχsatisfies ZAD(tχ)=0, thus, we obtain

tχcan be given by

tεsatisfies ZAD(tε)=-R; thus,

tεcan be given by

Fig. 8 Time evolutions of ZEMs in Case 1 by using OSBGL.

ZAT(t=0) satisfies

In Fig. 8, it satisfies

Thus, substituting Eq. (39) into Eq. (73), and combining Eq. (74), we obtain

where

and

Fig. 9 Time evolutions of ZEMs in Case 2 by using OSBGL.

Combining Eqs. (79) and (88), ZAT(t=0) satisfies

where

ZAT(t=0) satisfies

tη1satisfies ZAT(tη1)=0; thus,

Fig. 10 Time evolutions of ZEMs in Case 3 by using OSBGL.

In Fig. 10, it satisfies

Combining Eqs (83) and (86), we obtain

where

and

Thus, the following statements hold:

(1) If the range γ ≤ZAT(t =0)<λ exist, then ZAT(t =0)=γ is the low boundary value for the attacker to win the game using OSBGL.

(2) If the range τ ≤ZAT(t =0)<? exist, then ZAT(t =0)=τ is the low boundary value for the attacker to win the game using OSBGL.

(3) If the range ? <ZAT(t=0)≤ρ exist, then ZAT(t=0)=ρ is the upper boundary value for the attacker to win the game using OSBGL.

(1) and (2) cannot occur at the same time.

Theorem 3. If (1) and (3) hold true, the attacker can win the game using OSBGL when ZAT(t=0)∈γ,ρ[ ].

Theorem 4. If (2) and (3) hold true, the attacker can win the game using SSBGL when ZAT(t=0)∈τ,ρ[ ].

4. Nonlinear simulation

In this section,a nonlinear simulation that verifies the designed guidance law is presented. First, verification of the SSBGL is presented.

Table 1 Initial parameters for Case 1 by using SSBGL.

Fig. 11 Time evolutions of ZEMs in Case 1 by using SSBGL with various values of R.

Fig. 12 Trajectories in Case 1 by using SSBGL.

Fig. 13 Time-to-go in Case 1 by using SSBGL.

Table 2 Initial parameters for Case 2 by using SSBGL.

Fig. 14 Time evolutions of ZAT t( ) in Case 2 by using SSBGL with various values of R.

Fig. 15 Trajectories in Case 2 by using SSBGL.

Fig. 16 Time-to-go in Case 2 by using SSBGL.

Table 3 Initial parameters for Case 3 by using SSBGL.

Fig.17 Time evolutions of ZAT t( )for Case 3 using SSBGL with various R.

Fig. 18 Trajectories in Case 3 using SSBGL.

Fig. 19 Time-to-go in Case 3 using SSBGL.

Table 4 Initial parameters for Case 1 by using OSBGL.

Fig. 20 Time evolution of ZEMs in Case 1 by using OSBGL with various values of R.

Fig. 21 Trajectories in Case 1 by using OSBGL.

Fig. 22 Time-to-go in Case 1 by using OSBGL.

Fig. 23 Trajectories in Case 1 by using SSBGL.

Table 5 Initial parameters for Case 2 by using OSBGL.

Fig. 24 Time evolution of ZEMs in Case 2 by using OSBGL with various values of R.

Fig. 25 Trajectories in Case 2 by using OSBGL.

Fig. 26 Time-to-go in Case 2 by using OSBGL.

Fig. 27 Trajectories in Case 2 by using SSBGL.

Fig. 28 Trajectories in Case 2 by using EBPGL.

Table 6 Initial parameters for Case 3 by using OSBGL.

Fig.29 Time evolutions of ZAT t( )in Case 3 using OSBGL with various R.

Fig. 30 Trajectories in Case 3 by using OSBGL.

Fig. 31 Time-to-go in Case 3 by using OSBGL.

Fig. 32 shows the trajectories when the attacker uses SSBGL with a running time of 12 s. The attacker fails.Fig. 33 shows the trajectories when the attacker uses EBPGL guidance law with simulation running for 12 s. The attacker cannot hit the target.

Fig. 32 Trajectories in Case 3 by using SSBGL.

Fig. 33 Trajectories in Case 3 by using EBPGL.

5. Conclusions

Evasion and pursuit guidance laws for a missile attacking a defended aircraft are derived based on differential game theory. In this paper, two new guidance laws were proposed and sufficient conditions for the missile to succeed were analyzed by using the linear method. Although the actual feasible range of ZAT(t=0) deviates from the range calculated by the linear model,the range provided by the solution can be used as a reference.With the two guidance laws,it is not necessary for the attacker to know the control efforts of the defender and the target.However,the position and velocity of the defender and those of the target, which are easily measured by the attacker,need to be known by the attacker.

In future works, the nonlinear guidance law for attacking the defended aircraft will be investigated while taking noise sensitivity into consideration.

Acknowledgements

This work was co-supported by the National Natural Science Foundation of China (No.11672093) and the Shanghai Aerospace Science and Technology Innovation Foundation, China(No. SAST2016039).

主站蜘蛛池模板: 亚洲天堂网在线播放| 欧美三级不卡在线观看视频| 一级福利视频| 美女扒开下面流白浆在线试听| 久久久成年黄色视频| 精品人妻无码区在线视频| 欧美国产综合色视频| 无码丝袜人妻| 国产高清色视频免费看的网址| 国产精品福利社| 国产精品亚洲片在线va| 国产亚洲精品91| 91精品免费高清在线| 色欲不卡无码一区二区| 国产福利免费视频| 国产97色在线| 国产欧美性爱网| 日韩成人在线视频| 国产精品无码在线看| 亚洲国产中文精品va在线播放| 日本精品影院| 在线播放精品一区二区啪视频| 国产成人综合久久| 综合久久久久久久综合网| 538国产视频| 国产丝袜91| 亚洲国产精品不卡在线 | 最新国产精品第1页| 久热中文字幕在线观看| 国内精品一区二区在线观看| 精品五夜婷香蕉国产线看观看| 久综合日韩| 3344在线观看无码| 日韩无码精品人妻| 欧美a在线视频| 色视频国产| 国产96在线 | 99爱在线| 久久精品国产999大香线焦| 国产杨幂丝袜av在线播放| 日韩小视频在线观看| 99热这里只有免费国产精品 | 国产日韩欧美在线播放| 亚洲一区二区三区麻豆| 日韩精品成人网页视频在线| 日韩色图在线观看| 国产另类视频| 嫩草在线视频| 四虎精品国产AV二区| 亚洲三级a| 国产白丝av| 欧美中日韩在线| 亚洲天堂网在线播放| 五月天天天色| 国产精品视频猛进猛出| 亚洲高清日韩heyzo| 日韩少妇激情一区二区| 亚洲精品无码日韩国产不卡| 免费又黄又爽又猛大片午夜| 免费A∨中文乱码专区| 国产第八页| 夜夜高潮夜夜爽国产伦精品| 欧美一级特黄aaaaaa在线看片| 欧美成人精品欧美一级乱黄| 亚洲自偷自拍另类小说| 欧美性猛交xxxx乱大交极品| 色欲色欲久久综合网| 国产剧情一区二区| 四虎影视库国产精品一区| 精品视频一区在线观看| 日韩中文无码av超清| 97久久免费视频| 国产一区二区福利| 激情综合图区| 青青青国产视频手机| 亚洲天堂网2014| 精品国产Av电影无码久久久| 亚洲天堂啪啪| 亚洲AⅤ无码日韩AV无码网站| 国产精品不卡片视频免费观看| 成人在线观看一区| 91热爆在线|