首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
组合导航系统故障检测技术研究   总被引:5,自引:0,他引:5       下载免费PDF全文
提出了一种新的故障检测算法。该算法由联合滤波器的全局估计与各局部估计之差 ,得到残差序列 ,通过残差 χ2 检验 ,来判别系统是否出现了故障。同时进一步讨论了故障分离方法。数值仿真及实际应用结果表明 ,该算法能有效地检测出组合导航系统的故障 ,保证了系统的安全性和可靠性。  相似文献   

2.
针对运载火箭伺服机构故障,提出了一种基于扩展多模型自适应估计的故障检测与诊断算法。首先建立了考虑伺服机构故障的运载火箭姿态动力学模型,其次将故障角度作为状态变量得到增广状态空间模型,然后利用扩展卡尔曼滤波器进行状态向量和故障参数的非线性估计,并基于传感器测量数据采用假设检验算法在线计算故障发生的概率,最后给出了基于扩展多模型自适应估计的故障检测与诊断算法流程。该方法的优点是只用一个扩展卡尔曼滤波器就可完成一个伺服机构的故障检测与诊断,从而大幅减小用于伺服机构故障检测与诊断的滤波器数量。仿真结果表明,该方法在无故障时可对伺服机构进行健康监测,在单台伺服机构故障下,可以及时准确判断出哪一台芯级伺服机构发生故障,并可准确估计出伺服机构故障下的发动机摆角角度。  相似文献   

3.
基于传统的扩展卡尔曼滤波器(EKF),本文提出了一种带次优渐消因子的EKF用于非线性时变随机动态系统状态与参数的联合估计。应用于液体火箭发动机健康监控算法的仿真研究表明,本文所提出的联合估计器具有较好的收敛性、实时性和动态跟踪能力。此外,文中还讨论了联合估计器应用于实际系统的有关问题。  相似文献   

4.
针对以往方法对缓变故障存在较大的故障检测延时,从而降低导航系统可靠性的问题,实时的故障估计及补偿十分必要。将故障动力学建模为随机过程,提出了一种基于不准确状态和测量噪声协方差矩阵自适应学习的滑动窗口变分自适应卡尔曼滤波器。它由前向卡尔曼滤波、后向卡尔曼平滑和噪声协方差矩阵的在线估计组成。通过对滑动窗口状态向量的平滑后验分布进行逼近,利用变分贝叶斯方法将噪声协方差矩阵的后验分布解析更新为逆Wishart分布,避免了不动点迭代,获得了良好的计算效率。最后,基于捷联惯导/卫星(SINS/GPS)组合导航系统,进行了导航系统的故障估计及补偿的仿真验证。仿真结果表明,在不需要了解量测噪声和故障系数矩阵的情况下,该方法能够较好地估计出目标故障信号,然后利用估计出来的故障值对导航系统进行补偿,极大地提高了SINS/GPS组合导航系统的实时估计精度与可靠性。  相似文献   

5.
有色噪声干扰情况下非线性系统的状态估计是许多实际工程需要解决的问题.该文章针对传统Kalman滤波器噪声统计特性未知时,受色噪声的影响精度严重降低,甚至出现发散等现象,设计了一种基于神经模糊网络的自适应的Kalman滤波跟踪器.该滤波器通过利用神经模糊网络作为误差估计器,估计出Kalman滤波器的估计误差,从而对Kal...  相似文献   

6.
针对航天器推进系统的时变特性以及随机因素给故障隔离带来的困难,提出了基于Z-检验分析和解析冗余关系相结合的半定性故障隔离方法。基于状态空间转换的思想,运用基于系统诊断键合图模型建立的解析冗余关系挖掘系统时不变的结构特征空间信息,并对解析冗余关系残差进行趋势分析获取时不变、具有残差变化方向的故障特征矩阵,针对存在随机因素对残差定性化的影响,利用了Z-检验分析对残差进行定性化获取观察特征,通过观测特征与故障特征的比较进行系统故障隔离。将该方法应用于推进系统的故障隔离中,结果证明了该方法能有效避免获取推进系统时变诊断准则以及来自系统建模和参数测量等随机因素的干扰,提高了推进系统故障隔离的鲁棒性。  相似文献   

7.
一种基于滑模变结构观测器的故障检测方法   总被引:1,自引:0,他引:1  
提出一种基于滑模变结构观测器的残差生成及故障检测方法.利用滑模变结构所具有的对未知输入扰动的不变性,移除外界扰动对残差的影响,使残差只对故障信号敏感,从而提高故障检测的准确性,较好地解决基于状态估计的故障检测方法中检测鲁棒性与灵敏度之间的矛盾.仿真验证结果表明了该故障检测方法有较高的检测鲁棒性,同时对小幅值故障较为灵敏.  相似文献   

8.
再入目标质阻比估计算法研究   总被引:5,自引:0,他引:5       下载免费PDF全文
再入段目标识别的核心问题是快速高精度地估计出目标的质阻比。针对再入过程的非线性问题,重点研究了样条卡尔曼滤波器、扩展卡尔曼滤波器和一种基于"无损传输"的扩展卡尔曼滤波器,仿真实验从质阻比的估计精度和收敛速度以及计算量等方面比较了各滤波算法的性能。仿真结果表明基于无损传输的扩展卡尔曼滤波器的估计精度最高,收敛速度最快。  相似文献   

9.
残差χ~2法对幅值较小且持续时间长的故障会产生漏检和误检问题,改进SPRT(序贯概率比检测)方法对故障开始和结束时间不灵敏。基于此,给出了故障值大小的判定准则并提出一种残差χ~2与改进SPRT互辅的故障检测方法:在残差χ~2法检测到故障后,用SPRT方法确定故障持续时间;在残差χ~2法确定故障结束后,将SPRT方法检测函数值置零,提高后续检测的准确性。仿真结果表明:该方法能够解决持续时间长的小幅值突变故障的漏检和误检问题,适用于故障多发情况下的检测,能够提高系统可靠性。  相似文献   

10.
针对运载火箭伺服机构故障,提出一种基于扩展多模型自适应估计的故障检测与诊断算法。建立考虑伺服机构故障的运载火箭姿态动力学模型;将故障角度作为状态变量得到增广状态空间模型;利用扩展卡尔曼滤波器进行状态向量和故障参数的非线性估计,并基于传感器测量数据采用假设检验算法在线计算故障发生的概率;给出基于扩展多模型自适应估计的故障检测与诊断算法流程。仿真结果表明,该方法在无故障时可对伺服机构进行健康监测;在单台伺服机构故障下,可以及时准确判断出哪一台芯级伺服机构发生故障,并可准确估计出伺服机构故障下的发动机摆角角度。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号