首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 828 毫秒
1.
飞行器低空突防威胁建模与航迹优化算法   总被引:2,自引:0,他引:2  
提出了一种飞行器在给定地形和威胁分布的威胁场进行低空突防的航迹优化算法。该方法首先对地形的高程栅格数据进行了图形简化预处理,将各种威胁叠加到地形图上,构成一个包含各种威胁的特定威胁场,再对其建立合理的有向图数学建模,用Dijkstra最短路算法进行航迹优化。航迹优化的过程中考虑了飞行器的过载限制,使优化航迹能够较好地满足飞行器各项性能指标及任务规划的要求,仿真结果显示,该算法简单快速,能很好地进行地形、威胁、障碍物的回避。  相似文献   

2.
针对飞行器在线航迹规划问题展开研究,提出了一种实时航迹搜索算法。该方法将飞行器的运动与航迹搜索结合在一起,可以有效地调节搜索的时间,满足在线实时应用的要求。通过在限定的时间内扩大寻优范围,该算法可以有效地避免不可行区域,并使生成的航迹更加优化。实验结果表明,算法能有效地处理各种航迹约束,实时地生成满意的三维航迹。  相似文献   

3.
四旋翼飞行器的飞行控制通常采用比例、积分和微分(PID)控制算法。文章针对传统PID控制算法调整时间过长,超调量大等问题,基于四旋翼飞行器的非线性动力学模型,设计了一种改进的自适应单神经元P ID飞行控制算法。该算法在调整加权系数的基础上,通过运用非线性控制方法,增加了对神经元比例系数的自适应调整。仿真结果表明,该算法动态响应速度快,稳态控制精度高,抗干扰能力强,能较好地实现对四旋翼飞行器的通道控制。  相似文献   

4.
不确定环境中的飞行器航迹快速搜索算法   总被引:1,自引:1,他引:0  
本文提出了一种飞行器两阶段航迹规划算法,该方法能够在具有不确定信息的飞行环境中进行实时规划。首先根据获得的先验信息建立概率模型———概率图;其次为保证航迹的鲁棒性及可行性,先用RYG算法确定飞行器的安全走廊,有效地缩小了搜索空间。在此基础上,考虑到实际约束条件,再利用A*搜索算法进一步细化,得到一条最优航迹。仿真结果表明,该算法能够快速有效地完成规划任务,获得较满意的航迹。  相似文献   

5.
基于TDOA的经典定位Chan算法主要针对地面移动台,针对中低空飞行器,将Chan算法推广到三维空间,并与飞行器上的惯导系统进行实时组合导航定位。主要思想是根据CDMA蜂窝网导频信号的到达时差(TDOA)两次使用加权最小二乘解算,吸收taylor算法的递推思想,得到飞行器位置的两组解。利用惯导系统提供的位置信息进行解模糊,从而得到飞行器的实时位置信息。仿真结果表明,在相同条件下,与其他经典算法相比,此算法定位精度高,定位运算速度快,其均方误差逼近克拉美罗界(CRLB),对中低空飞行器定位具有一定的参考价值。  相似文献   

6.
飞行器雷达突防是现代战争中自我保护的重要手段.综合考虑了雷达威胁和航程的影响,建立了关于雷达威胁模型和航程的代价函数.针对传统的Dijkstra算法搜索空间大,搜索效率低的问题,进行了改进,并考虑飞行器的偏航角约束,提出了基于栅格的Dijkstra算法.对简单雷达突防和复杂雷达突防进行了仿真验证.仿真结果表明:该算法不仅能较好地回避雷达威胁,而且较好地提高了搜索速度.  相似文献   

7.
高超声速飞行器是近年来各国大力发展的新概念飞行器,针对其飞行运动轨迹难以进行高精度跟踪这一问题,结合神经网络强大的自适应和自学习能力,提出了一种高超声速飞行器在线反馈滤波算法。其核心是在当前统计模型的基础上,利用BP神经网络与卡尔曼滤波相结合进行滤波器设计,实现对高超声速飞行器高精度跟踪。最后通过仿真试验进行比较,验证了此在线反馈滤波算法在跟踪高超声速飞行器时的有效性。  相似文献   

8.
为使所建立的气动力模型能够准确刻画复杂动态特性,提出一种基于改进UKF算法的小波神经网络(Wavelet Neural Network,WNN)飞行数据失速气动力建模方法。引入一种自适应因子来改善无迹卡尔曼滤波(Unscented Kalman Filter,UKF)算法的性能;按照飞行数据的气动力建模流程,利用改进UKF算法对WNN参数进行最优化估计,构建失速现象的气动力模型。实验结果表明,针对飞行器失速的气动力建模问题,基于改进UKF算法的WNN建模方法,在建模精度和速度方面,优于传统神经网络和其他现有WNN方法,因此,使用提出飞行器失速的气动力建模方法是可行和有效的,得到预测结果也能准确刻画飞行器失速的动态特性。  相似文献   

9.
飞行器状态估值器是现代火控的重要组成部分。本文根据直升机飞行的特点,提出了一种飞行器状态估值器的设计方法。为了能实时实现,本文采用了固定增益卡尔曼滤波算法。仿真表明,它对直升飞机机动飞行有较高的估值精度,并能在机载计算机上实时实现。  相似文献   

10.
高超声速飞行器弹道优化算法的综合评估对选取最优的弹道优化算法具有重要的参考意义。根据高超声速飞行器的特性,将其弹道分解为上升段、巡航段及俯冲段三个阶段,分别给出了各阶段的性能评价指标和对各阶段性能评价指标赋权的典型方法,并结合灰色关联度分析理论提出了弹道优化算法的综合评估方法。评估实例表明,该方法能定量地对多种弹道优化方法所生成的弹道进行综合性能评估,并能对备选优化方法的优劣进行排序。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
17.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号