Method of target damage probability distribution simulation and evaluation based on GPU parallel computing

被引:0
作者
Lei, Xiaoyun [1 ]
Tan, Yaping [1 ]
Zhu, Lihua [2 ]
机构
[1] School of Information Technology, Jiangsu Open University, Jiangsu Province, Nanjing
[2] School of Mechanical Engineering, Nanjing University of Science and Technology, Jiangsu Province, Nanjing
基金
中国国家自然科学基金;
关键词
damage probability; GPU parallel computing; numerical simulation; vulnerable position;
D O I
10.1504/IJICT.2024.142171
中图分类号
学科分类号
摘要
For the projectiles with proximity-fused warheads used to destroy the target, the most vulnerable information is vital to destroy targets efficiently. So, it is important to quickly locate the most vulnerable position of the target in combat. An algorithm combining GPU parallel computing and numerical simulation is proposed. For a specific target, a slicing processing method is used to define the spatial position parameters, and the damage probability distribution in the space near the target is established to determine the most vulnerable position. In the example, the computation speed of the method is about 3.6 times higher than that of the CPU serial calculation method. It could quickly locate the most vulnerable position of a certain ballistic missile, namely, when the projectile was situated in the plane of 1/5 projectile length from the bottom of the target, the target would be damaged with the highest probability of 90%. Copyright © The Author(s) 2024. Published by Inderscience Publishers Ltd.
引用
收藏
页码:37 / 56
页数:19
相关论文
共 34 条
  • [1] Chen G., Yao L., Wang G., Shang X., Chen W., Yan Y., Ming Z., A human-machine consensus formation method for robust decision making in battlefield situation assessment, Acta Armamentarii, 43, 11, (2022)
  • [2] Chen J., Yuan B.H., Xiao C., Chen Y.J., An experimental evaluation method of energy release characteristics of reactive materials, Chinese Journal of Explosives & Propellants, 38, 3, pp. 49-53, (2015)
  • [3] Cho A.H., Park K., Kim G.I., Estimation of penetration equation parameters by comparing numerical analysis and experimental results, Journal of Mechanical Science and Technology, 32, 12, pp. 5755-5765, (2018)
  • [4] Defez E., Ibanez J., Peinado J., Alonso-Jorda P., Alonso J.M., New Hermite series expansion for computing the matrix hyperbolic cosine, Journal of Computational and Applied Mathematics, 408, C, (2022)
  • [5] Deng L., Yang P., Liu W., Wang J., Application in damage effect evaluation of early warning radar of cloudy Bayesian network based on Dempster Shafer/analytic hierarchy process method, Acta Armamentarii, 43, 4, (2022)
  • [6] Fu J.P., Guo G., Feng S., Chen Z.G., Zhao T.Y., Hou X.C., Damage assessment method and application of blast-fragmentation warhead against ground target, Acta Armamentaria, 37, S1, pp. 7-12, (2016)
  • [7] Guber W., Nagel R., Goldstein R., Et al., A geometric description technique suitable for computer analysis of both nuclear and conventional vulnerability of armored military vehicles, Physics, pp. 2624-8174, (1967)
  • [8] Gyllenspetz I.M., Zabel P.H., Comparison of US and Swedish aerial target vulnerability assessment methodologies, Försvarets forskningsanst, (1981)
  • [9] Hong C., Jie H., Yi L., Sen L., Domain decomposition based SPH parallel computing method study and its application, Journal of System Simulation, 30, 10, pp. 3717-3723, (2019)
  • [10] Hou K., Liu W., Wang H., Feng W.C., Fast segmented sort on GPUs, Proceedings of the International Conference on Supercomputing, pp. 1-10, (2017)