首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 65 毫秒
1.
为解决混合动力装甲车辆多动力源输出优化匹配难题,针对一种具有3个动力源的混合动力系统中各动力源的输出特性和驱动电机功率需求特点,制定了具有双层结构的能量管理策略:顶层的系统功率分配策略完成负载功率估计及其在各动力源间的分配;底层的部件级控制策略实现发动机-发电机组和动力电池的优化控制。通过构建一种分布式硬件在环仿真平台对能量管理策略进行仿真验证。结果表明:混合动力系统能够很好地满足负载功率需求,实现了对多个目标的优化控制。  相似文献   

2.
针对ISG混合动力汽车的能量管理问题,提出了一种控制车辆驾驶员行为的模型预测控制策略。首先由马尔可夫链预测车辆未来需求功率模型,对求得的需求功率模型结合驾驶员行为进行随机学习控制;运用动态规划算法以燃油消耗最小为目标进行滚动优化;最后在Advisor和Matlab/Simulink平台上搭建仿真模型。仿真结果表明:与逻辑门限控制策略相比,该控制策略能有效地改善ISG混合动力汽车燃油经济性,并具有良好的实时性。  相似文献   

3.
混合动力系统是军用电传动车辆具有优越性能的基础,能量管理技术则负责实现负载需求在系统中各动力源间的合理分流及部件的优化控制,是军用车辆混合动力系统研究的关键技术之一。分析了军用车辆混合动力系统的特点,研究了其对系统能量管理的影响,总结了当前能量管理技术研究现状,最终,针对当前能量管理技术存在的问题提出了相应的解决方案。  相似文献   

4.
雷达辐射的功率会影响射频隐身性能,基于对射频隐身原理的分析,提出了目标跟踪状态下射频隐身功率实时控制的方法。实现了在射频隐身状态下,雷达跟踪单目标和多目标的辐射功率的实时控制。利用射频隐身性能指标和雷达临界截获模型,建立跟踪状态下雷达低截获模型。并以截获概率为优化目标,雷达最小接收功率为约束条件,得到了跟踪状态下单次辐射功率控制模型。提出基于目标跟踪状态下跟踪单目标和多目标的射频隐身功率控制方法。仿真实验与传统的功率最小法比较,得到该方法实现较低的雷达截获概率,证明了功率控制方法的合理性和有效性。  相似文献   

5.
针对多车辆系统大间距编队控制问题,设计了一种分布式的改进模型预测控制(MPC)方法。建立二阶2自由度非完整约束模型及基于领航跟随法的编队模型。修正线性化展开点,优化MPC预测模型,提升系统保守性,增强实时轨迹跟踪性能。通过滚动优化完成编队控制。仿真实验结果验证了所提控制方法的有效性与可靠性。  相似文献   

6.
电网负载功率的剧烈变化会引起电网特别是小容量电网的供电质量和稳定性降低,为保证电网供电稳定,需对电网负载输出功率及功率变化率进行限幅控制;负载为电机时,需考虑在电机驱动系统中增加功率控制策略。针对上述问题,首先分析了电机驱动控制系统中的功率控制策略对系统动态性能的影响,通过分析发现低功率变化率限制会引起电机转速超调,进而会造成整个系统控制的不稳定和功率波动,因此提出了一种低功率变化率下的功率补偿算法。然后,通过仿真和实验,证明采取该功率控制方法能够解决转速超调和负载功率波动的问题,且具有良好的动静态效果。  相似文献   

7.
针对火控稳瞄系统存在较大的不确定性及干扰,其特征参数,如固有频率、阻尼以及负载干扰等,将随着被控炮之间差异、载弹量、目标位置的变化及工作海况的影响而产生较大变化的特点,提出了一种PFC-PID串级透明控制策略,通过内环PID控制来提高抗干扰性,外环采用预测函数控制来获得良好的跟踪性能和强鲁棒性。针对舰载火控系统的稳定瞄准中的预测函数控制,提出了船舶运动实时预报问题,根据不同海况、不同船舶的惯导信号特性的不同特点,研究了一种基于自适应长自回归模型和径向基函数神经网络芯片ZISC78的船舶运动实时预报方法。通过对射击过程的仿真,表明基于实时预报的PFC-PID串级透明控制完全可以满足舰载火控系统战技指标,且算法简单,鲁棒性好,是一种实用的火控算法。  相似文献   

8.
考虑到舰船环境限制和高能脉冲负载对储能的需求,有必要对储能装置进行合理的选型和优化配置,来提升综合电力系统性能。为此,基于带权极小模理想点法和层次分析法,提出了一种储能装置性能评价函数,并以其为优化目标,进行储能装置优化配置。所提出的评价函数充分考虑系统需求和脉冲负载特性,以储能装置体积、质量和经济性作为评价函数主要组成部分,同时考虑功率、能量、电压、荷电状态等约束,建立优化配置模型,并采用差分进化算法进行求解。以高性能锂电池和超级电容器为例,对所提模型进行求解计算,结果表明在所给权重系数下锂电池性能更优,更适用于综合电力系统,并给出了优化配置后的指导方案。  相似文献   

9.
在建立基于神经网络模型的非线性预测函数控制系统结构和基于BP网络非线性预测模型的基础上,提出了基于神经网络模型的非线性预测函数控制方法,并对其优化法等进行了讨论。通过与PID方法的仿真比较表明,预测函数控制方法具有抑制干扰能力强、跟踪性能好的特点,能够满足一些非线性系统的控制要求。  相似文献   

10.
针对无人机飞行过程中避障问题,提出了一种基于模型预测控制的无人机避障路径规划方法。通过对无人机平台模型进行分析,构造了无人机状态空间预测模型。为保证路径规划过程输出的平稳性,采用一阶指数变化形式作为无人机飞行路径的参考轨迹。设计了预测模型调整策略,并给出了参数调整流程,以能力-时间组合最优为目标,建立了无人机避障路径优化模型,采用有限时域优化的滚动优化算法对无人机避障优化模型进行了求解。算例仿真结果表明,该算法可有效解决无人机飞行路径的避障问题。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号