首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
一种新的机动目标模型及其自适应跟踪算法   总被引:1,自引:0,他引:1  
针对机动目标跟踪问题,在截断正态概率密度模型的基础上,通过目标机动状况与相邻采样时刻间位置估计量变化之间的函数关系实现噪声方差自适应调整,提出了一种新的自适应滤波算法——基于截断正态概率密度模型修正的自适应滤波算法。计算机仿真结果表明,该算法在跟踪机动目标时,具有良好的跟踪性能,并极大地改善了跟踪非机动目标的能力。  相似文献   

2.
当前统计模型和截断正态慨率模型都需要预先设计目标最大机动加速度,不能适应各种机动情况.在截断正态概率加速度模型的基础上,提出了一种基于截断正态概率模型的模糊自适应算法.该算法使系统状态噪声方差随着机动特性能够自适应调整,自适应各种机动情况.仿真结果表明,该算法在跟踪精度和收敛速度都优于传统的基于"当前"统计模型和截断正态概率模型的跟踪算法.  相似文献   

3.
针对机动目标跟踪中常见的量测转换问题,提出了一种基于球坐标系下最优线性无偏估计滤波的交互多模型算法。该算法的核心思想是将最优线性无偏估计滤波作为交互多模型中的基本滤波,完成对机动目标的跟踪。在仿真试验中,将该算法与基于扩展卡尔曼滤波的交互多模型算法进行比较,结果表明该算法有效地抑制了扩展卡尔曼滤波中常见的滤波发散问题,并且提高了跟踪的精度,具有较好的实用性。  相似文献   

4.
为满足履带车辆作为机动目标的实时跟踪和对目标速度、航向角的准确估计,针对测量值含有相关乘性噪声,采用新息分析法依据噪声相关系数已知和未知改进容积Kalman滤波算法。考虑到单模型滤波器难以准确地实现机动目标的跟踪,采用交互式多模型算法对履带车辆运动轨迹进行描述,提出一种交互式多模自适应容积Kalman滤波算法。仿真表明交互式多模型自适应容积Kalman滤波算法对车辆机动具有稳定的跟踪效果且乘性噪声得到有效处理。  相似文献   

5.
针对非线性观测条件下的机动目标跟踪问题,基于机动目标的协同转弯模型,采用防发散无迹卡尔曼滤波方法和自适应网格的模型集自适应策略,研究了一种变结构交互式多模型算法。对二维机动目标跟踪的仿真结果表明,该算法与相应的固定结构交互式多模型算法相比,可以解决固定结构多模型算法存在的问题,有效提高多模型算法的精度和费效比,缩短计算时间,且适合工程应用。  相似文献   

6.
在机动目标跟踪过程中,传感器在利用量测数据计算目标状态的同时,需要完成对目标运动模式的估计,并根据估计结果对传感器滤波方程的参数或结构进行调整,以减小滤波方程与目标运动模式之间的差异,提高对机动目标的跟踪精度.针对已有多模型算法的不足,利用多个时刻的目标运动模式分布来解决混合估计问题,提出一种新的次优多模型(MTMM)算法.仿真结果证明了MTMM算法的有效性.  相似文献   

7.
针对网络化作战中单探测节点对机动目标的运动模型不确定性导致滤波精度低,为提高目标跟踪的稳定性和精确性,提出了多节点探测跟踪算法。基于网络体系中信息的共享需求,建立网络探测节点的目标跟踪模型;通过网络探测节点目标跟踪需求和实战要求发现目标经常有多种运动状态并存现象,而单一模型的滤波器不能满足对机动目标跟踪性能的要求。因此,探测节点采用了基于交互式多模型(IMM)的无迹卡尔曼滤波(UKF)算法进行状态估计,融合中心将各节点发送的目标状态估计融合后进行状态估计,有效地降低了目标机动造成的模型误差,提高了跟踪性能。仿真结果表明,所提出的算法提高了网络节点对机动目标的跟踪精度,并且收敛速度快,有较强的鲁棒性和实用性。  相似文献   

8.
基于修正转弯模型的交互多模型跟踪算法   总被引:1,自引:0,他引:1  
临近空间高超声速飞行器具有极快的飞行速度和独特的机动模式,传统单模型跟踪方法不能对此类目标进行有效跟踪。提出了基于修正转弯模型的交互多模型跟踪算法,该算法修正了转弯模型,利用当前统计模型思想对目标角速度进行实时估计。首先分析了临近空间高超声速目标的特性,然后根据目标运动方程,对目标角速度进行实时估计,最后通过交互多模型实现对临近空间高超声速目标的跟踪。蒙特卡罗仿真结果表明,IMM跟踪算法能够有效跟踪临近空间高超声速目标,且跟踪的精确度、稳定性等明显优于单模型。  相似文献   

9.
为了有效提高对机动目标的跟踪效果,将无迹卡尔曼滤波(UKF)引入到交互多模型(IMM)算法框架内,加强状态估计精度;引入强跟踪滤波器(STF)到UKF算法中,避免对强机动目标的过大时间延迟和跟踪性能差的缺点;提出虚拟检测函数法,在跟踪过程中自适应调整"当前"统计模型的机动参数,加大模型集与目标真实运动模式匹配概率。仿真结果验证了改进算法的有效性。  相似文献   

10.
针对基于多传感器组网进行机动目标跟踪的传感器管理问题,提出了一种基于Rényi信息增量的机动目标协同跟踪算法。首先结合"当前"统计模型和交互式多模型不敏卡尔曼滤波算法设计了一种变结构多模型算法,来进行机动目标的状态估计;然后以Rényi信息增量为评价准则,选择使Rényi信息增量最大的单个传感器进行目标跟踪;最后利用得到的最优加速度估计进行网格划分,更新变结构多模型中的模型集合。在一般机动及强机动场景下进行了算法性能分析,仿真结果表明,该算法能够合理地选择传感器,提高了对机动目标的跟踪精度。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号