Skip to main content
Log in

Estimation of damage probability of combat vehicle components based on modeling and simulation

  • Original Article
  • Published:
Journal of Mechanical Science and Technology Aims and scope Submit manuscript

Abstract

Many functions are considered for the design of GCV (ground combat vehicles), which are carried out to increase the survivability of GCV from enemy threats. By improving survivability, the interior of the GCV can be protected and the continuity of mission performance can be improved. The vulnerability assessment is calculated from the damage probability of the components of the target. The damage probability of the component is calculated by the damage probability of the sub-components. For the accuracy of the vulnerability assessment, it is important to accurately calculate the damage probability of sub-components. The damage probability of sub-components is usually calculated only by the penetration. However, it is difficult to calculate the exact damage probability by penetration alone. In this study, damage scenarios of sub-components are created and classified according to damage types such as a type of components, hit position, damage cause and result, etc., and damage rule is calculated and the damage probability of the sub-components is calculated. In order to improve the accuracy of the analysis of the shot line, which was used only to identify the penetration, we conducted the shot line analysis for the ricochet and deflection to enhance the accuracy of the vulnerability assessment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. P. C. Dykstra, The BRL-CAD Package: An Overview, Army Re-search Laboratory, ARL-RP-432 (2013).

    Google Scholar 

  2. L. A. Butler, E. W. Edwards and D. L. Kregel, BRL-CAD Tutorial Series: Volume III Principles of Effective Modeling, Army Research Laboratory, ARL-SR-119 (2003).

    Google Scholar 

  3. J. R. Anderson and E. W. Edwards, BRL-CAD Tutorial Series: Volume 4 — Converting Geometry Between BRL-CAD and Otherformats, Army Research Laboratory, ARL-SR-121 (2004).

    Google Scholar 

  4. ITT Corporation, COVART 6.0: User’s Manual, ITT Corporation, Report No. JASPO-M-07-03-013 (2009).

    Google Scholar 

  5. H. G. Hwang, J. W. Lee, J. S. Lee and J. S. Park, A development of 3D penetration analysis programfor survivability analysis of combat system: Focused on tank model, Journal of the Korea Institute of Information and Communication Engineering, 19 (1) (2015) 244–250.

    Article  Google Scholar 

  6. K. S. Kim and J. H. Lee, Integrated survivability assessment given multiple penetration hits, Journal of Ocean Engineering and Technology, 28 (1) (2014) 69–76.

    Article  Google Scholar 

  7. H. G. Hwang, B. G. Yoo, J. W. Lee and J. S. Lee, A development of hit probability-based vulnerability analysis system for armored fighting vehicle using fault tree analysis technique, Journal of the Korea Institute of Information and Communication Engineering, 19 (8) (2015) 1981–1989.

    Article  Google Scholar 

  8. J. S. Yang, Y. J. Choi, K. T. Lee and C. G. Jee, The study of vulnerability assessment method using fuzzy-theory in conceptual design phase of combat aircraft, Proceedings of the Conference of The Korean Society for Aeronautical and Space Sciences (2012) 812–817.

    Google Scholar 

  9. P. R. Schlegel, R. E. Shear and M. S. Taylor, A Fuzzy Set Approach to Vulnerability Analysis, Army Ballistic Research Laboratory, BRL-TR-2697 (1985).

    Google Scholar 

  10. R. W. Fleming and B. S. Captain, Vulnerability Assessment Using a Fuzzy Logic Based Method (1993).

    Google Scholar 

  11. C. Yoo, E. S. Jang, K. Park and S. Y. Choi, The target modeling and the shot line analysis system to assess vulnerability of the ground combat vehicle, Transactions of the Society of CAD/CAM Engineers, 20 (3) (2015) 238–245.

    Article  Google Scholar 

  12. J. G. Shin and K. Park, Penetration analysis on oblique impacts of a bullet using ANSYS, M.S. Thesis, Myongji University (2018).

    Google Scholar 

  13. M. G. Hartmann and P. E. Magnusson, Component impact kill criteria: An experimental study, Journal of Battlefield Technology, 13 (2) (2010) 13–18.

    Google Scholar 

  14. S. H. Moon, Complementary use of simulation and experimental methods in deriving Pcd/h for target components, Journal of Battlefield Technology, 17 (3) (2014) 1–6.

    Google Scholar 

  15. M. Driels, Weaponeering Conventionalweapon System Effectiveness, 2nd Edition, AIAA Press (2012).

    Google Scholar 

  16. J. A. Zook, Terminal Ballistics Test and Analysis Guidelines for the Penetration Mechanics Branch, Ballistic Research Laboratory (1992).

    Google Scholar 

  17. E. S. Jang and K. Park, The study for accuracy improvement of the penetrating target analysis by the warhead using the ANSYS, Korean Journal of Computational Design and Engineering (2015) 234–241.

    Google Scholar 

  18. M. J. Forrestal, T. Børvik and T. L. Warren, Perforation of 7075-T651 Aluminum Armor Plateswith 7.62 mm APM2 Bullets, Society for Experimental Mechanics, 50 (2010) 1245–1251.

    Article  Google Scholar 

  19. M. H. Son, Core Technologies of High-performance Tactical Aircraft; Combat Survivability and Stealth Technology, Aerospace Industry Research Institute, Sejong University (2012).

    Google Scholar 

  20. M. H. Nam, K. Park and W. S. Park, The vulnerability assessment of hydro-pneumatic suspension of ground combat vehicles using vulnerable area method and DMEA, Korean Journal of Computational Design and Engineering, 22 (2) (2017) 141–149.

    Article  Google Scholar 

  21. C. Yoo, K. Park and S. Y. Choi, The vulnerability assessment of ground combat vehicles using target functional modeling and FTA, International Journal of Precision Engineering and Manufacturing, 17 (5) (2016) 651–658.

    Article  Google Scholar 

  22. K. S. Kim, J. H. Lee and S. Y. Hwang, Simplified vulnerability assessment procedure for the warship based on the vulnerable area approach, Journal of the Society of Naval Architects of Korea, 48 (5) (2011) 404–413.

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by a research program (The Specialized Research Center for the Future Ground System) funded by the Agency of Defense Development of Korea and we appreciate it.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kang Park.

Additional information

Recommended by Editor Seungjae Min

Nam, Myung Hoon received the B.S. and M.S. degrees from Myongji University, South Korea. His research interests include CAD / CAM, reverse engineering, machine design, modeling and simulation, and vulnerability assessment of ground combat vehicle.

Park, Kang received the B.S. and M.S. degrees from Seoul National University, and received his Ph.D. from Pennsylvania State University. He is currently a Professor at the Department of Mechanical Engineering at Myongji University, South Korea. His research interests include CAD/CAM, reverse engineering, virtual reality, computer graphics and machine design, and modeling and simulation.

Kim, Hyung Chul received the B.S and M.S. degrees from Myongji University, South Korea. His research interests include CAD / CAM, reverse engineering, machine design, modeling and simulation, operability analysis and vulnerability assessment of ground combat vehicle.

Park, Woo Sung received the B.S and M.S. degrees from Myongji University, South Korea. His research interests include CAD / CAM, computer graphics, machine design, modeling and simulation, and robotics.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nam, M.H., Park, K., Kim, H.C. et al. Estimation of damage probability of combat vehicle components based on modeling and simulation. J Mech Sci Technol 34, 229–238 (2020). https://doi.org/10.1007/s12206-019-1224-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12206-019-1224-y

Keywords

Navigation