首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对机动目标跟踪中常见的量测转换问题,提出了一种基于球坐标系下最优线性无偏估计滤波的交互多模型算法。该算法的核心思想是将最优线性无偏估计滤波作为交互多模型中的基本滤波,完成对机动目标的跟踪。在仿真试验中,将该算法与基于扩展卡尔曼滤波的交互多模型算法进行比较,结果表明该算法有效地抑制了扩展卡尔曼滤波中常见的滤波发散问题,并且提高了跟踪的精度,具有较好的实用性。  相似文献   

2.
IMM-EKF雷达与红外序贯滤波跟踪机动目标   总被引:1,自引:0,他引:1  
雷达与红外数据融合能够实现信息互补,改善对目标的跟踪、识别以及提高系统的生存能力.为了解决空中目标高速机动时,单一模型的雷达/红外序贯滤波跟踪发散的问题,提出了一种基于序贯滤波和交互多模型的雷达/红外融合跟踪机动目标的方法,通过在雷达与红外序贯滤波融合中引入交互多模型来跟踪机动目标.仿真结果表明,该方法与基于最优数据压缩的雷达与红外传感器融合跟踪机动目标相比,跟踪精度明显提高,是一种雷达与红外传感器融合跟踪机动目标的有效方法.  相似文献   

3.
临近空间高超声速目标具有机动特性强、轨迹变化快、强非线性等特点,在目标跟踪的过程中,易出现跟踪精度降低、滤波发散的问题。针对该问题,提出了一种交互式多模型容积粒子滤波算法。使用交互式多模型算法来对临近空间高超声速目标进行跟踪,使用容积粒子滤波算法对目标进行滤波预测。仿真结果表明,该算法跟踪性能优于交互式多模型卡尔曼滤波算法和交互式多模型粒子滤波算法,对临近空间高超声速目标有更好的跟踪效果。  相似文献   

4.
只测角单站无源定位跟踪系统中,目标初始状态估计精度较低时,采用扩展卡尔曼滤波算法经常出现滤波发散的情况.针对这一问题,提出了一种多模型扩展卡尔曼滤波方法,根据目标的初始状态估计设计了五个扩展卡尔曼滤波模型,对目标运动状态进行多模型估计,在滤波过程达到稳态后,再采用单模型滤波.仿真实验验证了算法的有效性.  相似文献   

5.
针对机动目标的交互多模跟踪滤波器,提出了基于模型过程噪声自适应调整的双门限的AIMM算法,并对其性能进行了研究,该算法对模型初始参数不敏感,具有稳定性,在目标模型与目标实际运动偏差较大的情况下,具有较好的跟踪性能;针对密集杂波和多目标情况下的目标跟踪,将多模交互滤波的模型自适应调整算法与JPDA算法结合,提出了AIMMJPDA算法的思想与实现。仿真结果显示该方法在机动目标跟踪方面具有模型调整简单、跟踪实时性良好的效果。  相似文献   

6.
在目标跟踪过程中,目标的动态模型通常在笛卡尔坐标系中,而量测是在极/球坐标系中得到的。在基于卡尔曼滤波及其一些改进算法中,设定量测方差固定不变,可能导致滤波发散。为此提出了一种基于时变量测方差的多传感器资源管理算法。该算法通过统计方法求出转换测量值误差的均值和方差,利用转化卡尔曼滤波算法估计误差协方差,基于协方差的效能函数进行多传感器多目标分配。仿真结果显示该算法在目标跟踪过程中满足跟踪精度要求,并实现传感器资源的充分的利用。  相似文献   

7.
自适应交互多模型算法在机动目标跟踪中的应用   总被引:1,自引:0,他引:1  
针对多模型算法在机动目标跟踪中存在的问题,运用交互多模型算法(IMM)和自适应滤波理论,设计了一种自适应交互多模型算法(AIMM),结合目标运动模型对目标当前加速度和其方差进行估计,并在此基础上给出了AIMM中模型集和模型转移概率的设计方法,进行了计算机仿真.蒙特卡罗仿真结果表明,与标准IMM算法相比,该算法比IMM算法的跟踪性能有很大提高,跟踪复杂机动目标比IMM有更快的收敛速度,跟踪滞后问题得到较好的解决,跟踪目标的稳定性和精确性均优于IMM算法,有利于机动目标的实时跟踪.  相似文献   

8.
基于模糊推理的机动目标自适应多模型跟踪算法   总被引:2,自引:0,他引:2  
针对当前空中来袭目标的主要特点,运用模糊理论和多模型理论探索空中机动目标跟踪问题,并设计了一种模糊自适应多模型(FAMM)目标跟踪算法,该算法采用五个基本模型,以加速度估值作为模糊推理系统的输入,经模糊推理融合得到系统状态和方差的估计值以及下一时刻的滤波模型(最多三个).经Monte Carlo仿真研究,与IMM算法相比较,该算法不仅在目标弱机动或不机动条件下,而且在复杂机动时能更稳定、精确地跟踪目标,较好地满足了海上对空防御作战中跟踪机动目标的需求.  相似文献   

9.
反舰导弹具有飞行速度高、进入目标高度低和机动性强等特点,对反舰导弹跟踪滤波属于典型的非线性系统估计问题,对算法要求较高。粒子滤波器可以获得近似最优解,采用粒子滤波代替交互多模型跟踪算法中的扩展卡尔曼滤波,将粒子滤波与交互多模型的优点相结合,用于非线性非系统的高速高机动反舰导弹目标跟踪,比较扩展卡尔曼滤波而言,这种滤波器对不确定情况有更好的滤波性能。将这种滤波器应用到跟踪算法中,可以对非线性系统取得良好的滤波效果。Monte Carlo仿真结果表明在反舰导弹各种机动情况下跟踪滤波算法是有效的。  相似文献   

10.
针对当前统计模型对弱机动或非机动目标跟踪效果不理想等问题,提出了一种修正当前统计模型与匀速模型的自适应交互式多模型算法,可在线修正当前统计模型的加速度极限值,调整过程噪声方差,提高了当前统计模型的自适应性。同时,通过在常规匀速模型中引入机动检测机制,抑制了常规匀速模型对机动目标跟踪的滤波发散,通过引入强跟踪算法,增强了模型对目标突发机动的自适应跟踪能力。仿真结果表明,该算法充分发挥了当前统计模型和交互式多模型算法的优势,对强机动和弱机动目标都具有很好的效果。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号