首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 593 毫秒
1.
在目标跟踪系统中,特别是在复杂背景情况下对地面目标的跟踪中,传统相关算法采用全局搜索的方法,使得计算量相当大,不易实时实现,而且当发生目标局部遮挡时,目标容易丢失.为此,提出一种基于模糊推理和卡尔曼预测器的目标相关跟踪的方法,它充分利用卡尔曼预测器的预测功能来预测下一帧目标可能出现的区域,然后在较小的预测区域中进行相关匹配运算,找到最佳相关匹配点,跟踪更具主动性,同时用模糊推理方法对卡尔曼预测器的参数进行自适应调整,从而可以跟踪各种机动目标.实验中用传统算法和本算法对高速行驶的坦克进行跟踪时,传统算法容易跑飞,而本算法不受遮挡干扰,始终稳定跟踪且耗时大幅减少,且能够跟踪机动速度大幅变化的目标.  相似文献   

2.
二阶马尔可夫加速度模型下的机动目标预测器   总被引:2,自引:1,他引:1  
采用二阶马尔可夫加速度模型建立机动目标跟踪滤波器,并将其扩展到预测器中形成六阶多项式预测模型来解决机动目标预测问题。仿真的结果表明本文建立的预测器使机动目标预测精度有了明显的提高。  相似文献   

3.
分析了二阶多项式模型对机动目标进行跟踪和预测时存在的不足,研究了"当前"统计模型在火控预测器中的应用;通过仿真计算,比较了基于"当前"统计模型的火控预测器和基于二阶多项式模型的火控预测器对横向机动目标提前点的预测性能  相似文献   

4.
本文的主要目的是阐明标准卡尔曼滤波器和卡尔曼预测器之间的差别。为此,发表了标准卡尔曼滤波器和卡尔曼预测器在雷达跟踪问题中的应用。为了获得跟踪目标的较好的位置和速度精度,这两种标法已被广泛地用在边搜索边跟踪的雷达系统中。两种方法间的性能分析和比较与实际卫星跟踪数据一起已被发表。结果表明对于大机动目标,标准卡尔曼滤波器优于卡尔曼预测器。  相似文献   

5.
非线性系统的神经网络广义预测控制   总被引:2,自引:0,他引:2  
研究了神经网络广义预测控制方法在非线性系统中的应用,基于BP网络构造神经网络预测器,利用非线性系统的开环输入输出数据离线训练神经网络,根据拟牛顿BFGS优化算法使得二次型性能指标函数达到最小,得到了最优的控制序列。同时给出了神经网络广义预测控制算法的步骤,讨论了提高系统鲁棒性的措施。仿真结果表明,这种神经网络预测控制算法具有响应速度快、控制效果好和跟踪精度高等特点。  相似文献   

6.
为了提高目标轨迹预测的精度以及预测模型的泛化能力,提出基于改进蝙蝠算法优化的核极限学习机(Kernel Extreme Learning Machine,KELM)和集成学习理论目标机动轨迹预测模型。构建KELM模型,并采用改进的蝙蝠算法对KELM的参数进行优化;以优化后的KELM神经网络为弱预测器,结合集成学习算法生成强预测器,通过训练不断优化强预测的结构和参数,得到一种基于集成学习理论的目标机动轨迹预测模型;基于不同规模的样本,将所得预测模型与逆传播神经网络、支持向量机和极限学习机等模型进行对比分析。仿真结果表明:所提目标机动轨迹预测模型具有较好的预测精度和泛化能力。  相似文献   

7.
针对装甲车上的图像跟踪系统,提出了一种机动目标预测方法.将目标的运动分解为两部分,即全局运动和局部运动,并根据各自的动态特性分别进行预测.以局部运动预测为重点,通过对机动目标跟踪技术的研究,建立起性能优良的跟踪滤波器,并将其扩展到预测滤波器中对目标的未来运动状态进行预测,从而提出了"交互式多模型预测算法".仿真结果表明,该算法具有预测精度高、自适应能力强的特点,同时给出了计算方法.  相似文献   

8.
以无人机拍摄的运动车辆为研究对象,针对航拍视频中的某一车辆目标,研究其目标跟踪方法。为准确预测车辆在未来帧中出现的位置,提出基于K邻域的目标预测算法,对于车辆目标可能会出现被全部遮挡的情况,提出基于车辆运动状态估计的抗遮挡算法,在目标检测过程中,针对可能会有多个目标被检测出来的情况,提出多特征融合的图像匹配算法以对检测结果进行匹配。将上述算法相结合,形成车辆目标跟踪方法。测试结果表明,提出的目标跟踪方法平均准确率达到了91.1%,准确率相对于常见的目标跟踪算法提升了约6.35%。  相似文献   

9.
临近空间高超声速目标具有机动特性强、轨迹变化快、强非线性等特点,在目标跟踪的过程中,易出现跟踪精度降低、滤波发散的问题。针对该问题,提出了一种交互式多模型容积粒子滤波算法。使用交互式多模型算法来对临近空间高超声速目标进行跟踪,使用容积粒子滤波算法对目标进行滤波预测。仿真结果表明,该算法跟踪性能优于交互式多模型卡尔曼滤波算法和交互式多模型粒子滤波算法,对临近空间高超声速目标有更好的跟踪效果。  相似文献   

10.
火控系统的交互多模型框架   总被引:1,自引:0,他引:1  
本文简要介绍了交互多模型方法的基本原理,并将其应用于机动目标的跟踪与预测,通过计算机仿真证明了该方法应用于目标跟踪时对机动与非机动目标均有广泛的适应性,且具有良好的跟踪精度。据此,本文提出一种火控系统的交互多模型框架,将传统火控系统的目标跟踪,未来点预测及弹道解算功能统一纳入交互多模型框架中,使火控系统具有对付机动与非机动目标的综合能力。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
20.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号