ACTA AERONAUTICAET ASTRONAUTICA SINICA >
Concept and architecture for new generation aircraft mission system
Received date: 2015-05-05
Revised date: 2015-05-11
Online published: 2015-05-12
Supported by
National Key Basic Research Program of China (2014CB744900)
A new-generation aircraft will be the core power for the global strategic demands, tactics capabilities and mission organization. The aircraft mission system is an important part of the global awareness and vigilance, the global reach and confrontation, as well as the global power and task system. This article analyzes the strategy requirements of new-generation aircraft and describes its global strategy visions, tactics goals and task objects. Meanwhile, it uses the butterfly effect principle to illustrate the basic concepts of the capability organization to realize global vigilance, global reach and global power strategy, and to define the roles and tasks of strategy, tactics and mission of new-generation aircraft mission system. It then creates and describes strategic cloud, tactical cloud and task cloud. It also describes the concepts of complex system, uncertainty and intelligent processing.
WANG Guoqing , GU Qingfan , WU Jianmin , WANG Miao . Concept and architecture for new generation aircraft mission system[J]. ACTA AERONAUTICAET ASTRONAUTICA SINICA, 2015 , 36(8) : 2735 -2752 . DOI: 10.7527/S1000-6893.2015.0130
[1] Maybury M T. Air force cyber vision 2025[Z/OL]. [2015-05-05]. http://cybernyalliance.ogr/wpcontent/uploads/2012/08/CyberVision2025MarkMarburyBrief18-Jul12.pdf.
[2] Wang G Q, Gu Q F, Wang M, et al. Research on the architecture technology for new generation integrated avionics aystem[J]. Acta Aeronautica et Astronautica Sinica, 2014, 35(6): 1473-1486 (in Chinese). 王国庆, 谷青范, 王淼, 等. 新一代综合化航空电子系统构架技术研究[J]. 航空学报, 2014, 35(6): 1473-1486.
[3] Ji C Q, Li Y, Qiu W M, et al. Big data processing in cloud computing environments[C]//2012 International Symposium on Pervasive Systems, Algorithms and Networks, 2012: 17-23.
[4] Mehdi B, Mukesh S. The role of cloud computing architecture in big data[C]//Information Granularity, Big Data, and Computational Intelligence Studies in Big Data, 2015: 275-295.
[5] Todd G H. Armed attack in cyberspace: Deterring asymmetric warfare with an asymmetric definition[J]. Air Force Law Review, 2009, 64: 64-65.
[6] Air Force Cyber Command (provisional). Air force cyber command strategic vision[EB/OL]. (2008-04-03)[2015-03-14]. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA479060.
[7] Welsh Ⅲ, Gen M A. Global vigilance, global reach, global power for America: The world's greatest air force-powered by airmen, fueled by innovation[J]. Air & Space Power Journal, 2014: 1-8.
[8] Liu J X, Chen S D, Wang F. The tactical maneuver in cyber space[J]. Electronics Optics & Control, 2014, 21(9): 1-6 (in Chinese). 刘金星, 陈哨东, 王芳. 赛博空间的战术机动[J]. 电光与控制, 2014, 21(9): 1-6.
[9] Ventola E. Systemic functional theory and cyberspace[J]. Equinox Publishing, 2014(2): 370-377.
[10] Weber R H V. Realizing a new global cyberspace framework[M]. Berlin: Springer, 2015: 99-160.
[11] United States Air Force. Cyberspace science and technology vision 2012-2025, cyber vision 2025[EB/OL].[2015-03-14]. http://www.defenseinnovationmarketplace.milresources/cybervision2025.pdf.
[12] Wójcik D. The butterfly defect: how globalization creates systemic risks and what to do about it[J]. Journal of Economic Geography, 2015, 15(1): 250-252.
[13] Xie H, Tan Y, Xu Y. Research on simulation of the emergency information dissemination based on netlogo[C]//Proceedings of 2013 4th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2013). Berilin: Springer, 2014: 847-857.
[14] Wang G Q, Gu Q F, Wang M, et al. Research on integrated technology and model in avionics system[C]//2014 IEEE/AIAA 33rd Digital Avionics Systems Conference. Piscataway, NJ: IEEE Press, 2014: 1-52.
[15] Wang G Q, Gu Q F. Research on distributed integrated modular avionics system architecture design and implementation[C]//2013 IEEE/AIAA 32nd Digital Avionics Systems Conference. Piscataway, NJ: IEEE Press, 2013: 7D6-1-10.
[16] Zikopoulos P, Eaton C. Understanding big data: Analytics for enterprise class hadoop and streaming data[M]. McGraw-Hill Osborne Media, e-book: IBM Corporation, 2012.
[17] Paul P K, Kumar K, Chatterjee D. Cloud computing and information infrastructure: emerging possibilities-a SWOT analysis[J]. SRELS Journal of Information Management, 2014, 51(2): 129-134.
[18] Chang V. The business intelligence as a service in the cloud[J]. Future Generation Computer Systems, 2014, 37: 512-534.
[19] Gouglidis A, Mavridis I, Hu V C. Security policy verification for multi-domains in cloud systems[J]. International Journal of Information Security, 2014, 13(2): 97-111.
[20] Berl A, Gelenbe E, Di Girolamo M, et al. Energy-efficient cloud computing[J]. The Computer Journal, 2010, 53(7): 1045-1051.
/
〈 | 〉 |