首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 218 毫秒
1.
分析了地磁场水平梯度对飞机磁场模型的影响,利用航空磁测试验数据和地磁场水平梯度仿真数据,对飞机磁场模型系数进行了求解计算,并对飞机在特定航向上机动飞行时产生的干扰磁场进行了仿真补偿试验.计算和仿真试验结果表明:地磁场水平梯度引起的飞机磁场和方向余弦变化会使飞机磁场求解结果产生偏差,从而降低飞机磁干扰补偿精度.  相似文献   

2.
为解决现有磁定位方法的定位精度较大程度上依赖于定位参数初始值估计精度的问题,提出了基于混合优化算法的单分量磁定位方法.首先利用舰船垂向磁场的衰减特性构造了相关系数函数,该函数与测量面上磁场的拟合误差函数共同组成了一种新的多目标规划函数,然后将微分进化算法与方向加速法相结合形成了混合优化算法,再利用该算法通过多目标规划函数确定最优的定位参数解.实验证明,对于未安装定位系统的半合作舰船,该定位方法利用磁传感器所测目标的垂向磁场,能较准确地确定舰船相对于磁传感器的位置,定位结果稳定可靠,定位精度较高.  相似文献   

3.
获得载体航行路径上各点地磁场的精确测量值是地磁匹配导航的前提,而载体上各种干扰磁场的存在会引起磁力仪输出的偏差,影响匹配的精度,因此必须对载体干扰磁场进行补偿。在分析载体干扰磁场特性的基础上,提出利用矢量测量值对地磁场总场值进行补偿的方法。该方法首先根据矢量磁力仪的测量模型得到关于载体磁场参数的非线性方程,然后采用非线性参数估计方法估计出精确的载体干扰磁场系数,最后再利用估计结果对测量值进行补偿。通过仿真对该方法的有效性进行研究,并设计了半实物实验对其实用性进行验证。结果表明采用本文提出的方法补偿后地磁场总场值的测量误差在20nT以内,而且该方法参数估计精度高,应用方便,可以有效地对导航载体干扰磁场进行补偿。  相似文献   

4.
为深入研究阳极数量和安装位置对舰船电场特性的影响,在分析单个和两个阳极情况时电场特性的基础上,通过多群进化规划算法对电场分布进行优化计算,建立数学模型并仿真分析了采用三补偿阳极时舰船周围水下电场的分布情况,得到了三个补偿阳极对于舰船电场防护效果的影响.最后,进行实船安装三个阳极的电场测量分析实验,实验结果与仿真结果一致,证明该方法对舰船阳极的安装数量和位置有直接指导作用.  相似文献   

5.
本文提出了用两个主航向上舰船磁场测量数据来换算任意航向上任意深度下的舰船磁场的设想。针对静态磁场,提出了一种新的磁场换算方法即磁荷模型换算法。由于该法的模型更接近于物理模型,故该法建立模型容易,换算所需的测量数据少,换算精度高。对安装消磁系统的舰船其任意航向上的磁场换算,作者采用消磁系统绕组磁场和舰船本身磁场分别计算然后合成的处理方法。实验证明,本文提出的舰船任意航向上的磁场换算方法是可行的,换算精度能够满足工程实用要求。  相似文献   

6.
针对数值计算方法精度难以保证、双航向及两地测量法难以实施、地磁模拟法测量精度与所模拟的地磁场均匀度高度相关等问题,提出了一种基于体单元与测点间磁场映射关系的舰艇感应磁场测量方法。该方法利用消磁站已有的地磁补偿线圈产生磁场来对船体进行磁化,且不需要线圈产生的磁场在舰艇所占区域内均匀,因而大大降低了在单一航向上准确测量舰艇感应磁场的难度。仿真分析和实验室实验的结果均表明:该方法测量精度高、测量步骤简单、易于工程实现。  相似文献   

7.
为了准确了解舰船的固定磁场分布,进而对舰船磁性防护作出指导,用等效磁偶极子的方法对舰船固定磁场分量分离的方法进行了研究,通过对固定磁场垂直分量总和的曲线进行分析,根据磁偶极子组合产生磁场规律的先验知识,选择最佳的磁偶极子的排列方式,然后对磁偶极子磁矩范围进行估计,最后利用遗传算法这种全局优化算法求出磁源的参数,进而分离出固定磁场各个分量。仿真计算结果表明,该方法能够比较好地搜索到磁偶极子的最佳数目、位置和磁矩,可以用于舰船固定磁场的分离。  相似文献   

8.
针对目前在消磁站对舰船进行磁场测量时,探头阵列所测磁场值不是舰船标准测量点的磁场值这一情况,讨论依据探头阵列(基准测量点)测量出来的磁场值,采用二次二维插值算法计算舰船标准测量点上的磁场值.实验结果表明,该方法计算精度高,具有较高的应用价值.  相似文献   

9.
基于地磁场的新型导航方法研究   总被引:1,自引:0,他引:1  
利用地磁场的特性来寻找一种新型的自主导航方法.通过在飞行器上使用三轴磁强计敏感到当地的地磁场强度矢量,参考国际地磁场模型(IGRF),使用广义卡尔曼滤波算法对飞行器位置进行估计,获取位置信息.仿真验证了这种方法的可行性,并给出了导航精度.  相似文献   

10.
三轴磁强计轨道确定   总被引:6,自引:0,他引:6       下载免费PDF全文
未来卫星的发展趋向于微小型化 ,采用小型化、廉价和中等精度的自主导航系统是非常必要的。利用三轴磁强计量测得地磁场矢量在仪表坐标系中的分量 ,并通过卡尔曼滤波器来确定卫星的轨道参数。仿真算例结果表明 ,三轴磁强计定轨方案具有一定的精度 ,能满足卫星定轨精度的要求。  相似文献   

11.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

12.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

13.
14.
本文介绍了笔者为开发名为OONMES的网络管理专家系统所实现的一个简单专家系统工具SIM-LISP。SIM-LISP是一个用C/C++语言来实现的模拟LISP语言的可调用函数集,它短小精巧,速度快,可以完成针对网管专家系统的事实或规则知识的表示、匹配、合一和推理等基本操作,并有与知识对象的连接功能,是网管专家系统内核实现的支撑环境。  相似文献   

15.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

16.
This article consists of selected translations from captured interviews and dairies of Al Qaida members. The time period covered is from mid-2001 to early 2002 and concerns their operations in Afghanistan. The material clearly conveys a range of emotion, from confident to despondent, as well as efforts to contest the US actions. The first several pages give the reader context and some possible “lessons learned,” but the story(ies) are best told by the Al Qaida members themselves. All names are pseudonyms.  相似文献   

17.
The prospect of terrorists deploying weapons of mass destruction (WMD) is often referred to as the foremost danger to American national security. This danger has become more realistic because of al-Qaeda's expanding global network and the expressed willingness to kill thousands of civilians. In the past four years, numerous media reports have documented the group's ongoing quest for WMD capabilities; many reports have detailed al-Qaeda members’ attempts to manufacture or obtain certain chemical, biological, radiological, and nuclear (CBRN) agents to use in WMD against targets in the West and the Middle East. Yet the question remains: Does al-Qaeda's current WMD capability match its actual intent? While most studies of the group have focused on its explicit desire for WMD, allegations of CBRN acquisition, and the killing potential of specific CBRN agents, few open-source studies have closely examined the evolution of al-Qaeda's consideration of WMD and, most notably, the merit of actual CBRN production instructions as depicted and disseminated in the group's own literature and manuals. The following report will examine the history of al-Qaeda's interest in CBRN agents, the evolution of the network's attitude toward these weapons, and the internal debate within the organization concerning acquisition and use of WMD. More so, the following research will assess the validity of actual CBRN production instructions and capabilities as displayed and disseminated in al-Qaeda's own literature and websites.  相似文献   

18.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

19.
Despite the lance’s status and the amount of attention the couched lance has received in historiography, study of its martial art has been neglected. The various lance types and techniques used by western European cavalry have only recently begun to receive scholarly attention. Additionally, Medieval European lance use has too often been studied in isolation, without an adequate understanding of the idiosyncratic and asymmetrical dynamics of mounted combat. Although the charge with the couched lance was a valid tactic, it was only one of many. Light and heavy lances were used in one hand or two to trip, block, unhorse, and wrestle. These techniques were governed by the harsh laws of distance, speed, impact, iron, and asymmetry. By utilizing the surviving Fechtbücher and several Peninsular and Near Eastern sources, a brief foray into the diverse techniques of lance use and their purposes has been attempted here.  相似文献   

20.
This article describes the Distributed Interaction Campaign Model (DICM), an exploratory campaign analysis tool and asset allocation decision‐aid for managing geographically distributed and swarming naval and air forces. The model is capable of fast operation, while accounting for uncertainty in an opponent's plan. It is intended for use by commanders and analysts who have limited time for model runs, or a finite budget. The model is purpose‐built for the Pentagon's Office of Net Assessment, and supports analysis of the following questions: What happens when swarms of geographically distributed naval and air forces engage each other and what are the key elements of the opponents’ force to attack? Are there changes to force structure that make a force more effective, and what impacts will disruptions in enemy command and control and wide‐area surveillance have? Which insights are to be gained by fast exploratory mathematical/computational campaign analysis to augment and replace expensive and time‐consuming simulations? An illustrative example of model use is described in a simple test scenario. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 562–576, 2016  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号