首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
利用波形合成技术对柴油机排气噪声实行有源控制的研究   总被引:3,自引:2,他引:1  
对四冲程柴油机(4-85)的排气噪声的机理和特性进行了研究;利用波形合成的原理,控制高速信号处理芯片TMS320C25合成次级声源的声波,可以实现宽带消声.对柴油机的排气噪声进行了有源消声的初步设计.  相似文献   

2.
探讨管道中高次波的有源控制问题.首先,对消声条件下的次级声源强度进行了理论分析,并对误差传声器的数目与位置进行了讨论.最后,进行了控制方截面管中(0,0)次波(平面波)和(1,0)次波的实验.结果表明,对管道中的高次波实施有源控制是完全可能的.  相似文献   

3.
针对浅海中球形声源诱发的海底地震波预报问题,提出了一种基于等效源-有限元联合法的快速预报方法。首先,基于波叠加原理,将球形声源的辐射声场等效为其对称轴上若干等效点源辐射声场的线性叠加,根据与球形声源表面上等效点源数量一致的场点振速匹配原则,确定等效点源的强度;然后,采用有限元法建立球形声源、浅海环境、边界条件的耦合动力学模型,计算相应源强下每个等效点源诱发的海底地震波场,并将其线性叠加快速求得球形声源诱发的海底地震波场;最后,从计算精度和效率两个方面,分别采用上述方法和有限元法,给出不同频率、不同海底底质时海水-海底界面上的法向应力级衰减曲线。结果表明:所提方法具有建模简洁、计算精度和效率高等特点,可用于快速预报浅海中球形声源诱发的海底地震波场。  相似文献   

4.
经典的纯方位目标运动分析(TMA)只限于具有常运动参数(通常是位置和速度)的声源。然而,大多数感兴趣的声源具有机动能力,这就降低了经典TMA的性能。在被动声呐范围内,声源—观察者之间长时间的遭遇是现实的,因此,声源机动的可能性对于声源和基阵基线可能是重要的。这就值得对包括声源机动不确定性的整个声源轨迹进行研究和建模。基于这个目的,一种简便的柜架就是隐马尔可夫模型(HMM),其基本思想由状态空间的两级离散化构成。由于速度转移的概率直接与声源机动能力有关,从而使位置转移的概率减小。 声源状态序列估计是通过经典动态规划(DP)实现的,这个方法不要求关于声源机动的任何先验信息。但是,声源机动的随机性质对于观察者机动的最优化起主要作用。这个问题通过使用马尔可夫决策过程(MDP)的一般框架解决。  相似文献   

5.
通过实验数据与理论计算结果的对比,分析了气流对振动系统的阻尼作用;并以实验声源为基础,以等效电路方法分析了调制气流声源振动系统的弹性系数、磁感应强度、音圈质量、电阻、电感以及绕线方式等参数对音圈振幅的影响;根据调制气流声源的用途差异,提出了用于语音广播和产生大功率低频声波时振动系统各参数的选择方法.  相似文献   

6.
针对混响及噪声环境下的多声源定位与计数问题,引入局部信噪比追踪及相关性检测模块,提取出传统广义互相关角度谱中受噪声及声源互扰影响较小的时频支撑域;同时引入双宽度匹配追踪方法替代传统的峰值搜索,改进后续定位与计数的精确度。仿真研究验证了综合应用滤波后的角度谱及双宽度匹配追踪的多声源定位与计数算法相比传统算法在较低信噪比、较强混响以及较多声源数的环境中更加精确及稳健。  相似文献   

7.
针对逆向求解声源识别中的声辐射传输建模问题,采用无网格法将Kirchhoff- Helmholtz边界积分方程离散为受边界条件约束的有限维线性方程组,通过分块矩阵法对该约束方程组进行求解,得到了离散后声辐射传输模型的数值表达式.在此基础上,进一步研究了逆向求解声源识别问题的基本原理及其不适定性.为克服其不适定性,采用Tikhonov正则化和L曲线正则化参数选取方法,从而确立了有效的逆向求解方法.此外,还进行了扬声器阵列声源识别实验,实验结果验证了逆边界无网格声源识别理论和方法的可行性及可靠性.  相似文献   

8.
针对常用的运动声源定位方法存在计算量较大或测试难度大的问题,提出一种基于阵列信号短时处理的运动声源定位方法。分析单、双五元十字阵列的定位性能,并基于单阵列的高精度定向能力,借鉴波束形成中帧处理思想,使用双阵列方位交叉的方法实现声源运动定位。使用自行火炮的发动机周期噪声作为模拟声源,进行外场定位实验,对参与短时相关数据的截取原则和传播路径补偿进行研究。实验结果表明,该方法能够有效实现周期声源的运动定位,最大相对误差保持在5%的水平。  相似文献   

9.
以结构-声耦合振动系统中的互易原理为基础,通过水下互易实验分析了双层圆柱壳体结构中力-声传递函数反向测量与正向测量之间的差异。通过不同声源激励功率下的对比试验,以及声源扫频和单频激励模式下的对比实验,排除了实验中激励功率及激励模式对实验结果的影响。结果表明:通过实验获取的修正系数可以有效减小不同模型及声源深度组合条件下正、反向测量结果之间的差异。  相似文献   

10.
面向虚拟战场提出了实现实时四声道立体声合成的简化算法。针对四声道立体声的特殊性 ,首先探讨了四声道立体声系统中扬声器的配置方案。在四声道立体声系统扬声器配置方案的基础上 ,解决了单声源的表示、声强衰减及实时立体声化问题 ,然后提出一种评价混声效果的标准及一个评价声源对整个声音所作贡献的公式 ,并由此提出一个混声公式 ,从而解决了多声源环境的实时混声问题。该套算法用于应用系统 ,取得了较好的效果。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号