首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对考虑交会角和过载约束导引律在大机动时能量损失大的问题,提出一种考虑导弹机动效率的多约束制导律。应用最优二次型原理推导出考虑一阶弹体延迟的时变导引系数闭环次优制导形式,将导弹机动时刻阻力系数引入时变权系数,并通过迭代确定机动效率约束边界。将时变约束表示成剩余时间与弹体延迟时间的函数,代入制导指令,进行弹道仿真。结果表明,对于常值与机动目标,文中制导律与过载约束导引律同只考虑交会角约束的导引律相比,对目标均能实现末端弹道成型要求,而考虑机动效率的制导指令分配更为合理,在避免指令加速度饱和的同时有效降低了拦截末端速度损耗,提高制导精度与毁伤效果。且该制导律中时变权系数无须配平求解,在保证精度的同时极大地提高了迭代速度。  相似文献   

2.
针对终端角度约束制导问题,提出了一种新型基于自适应二阶滑模的有限时间收敛角度约束制导律.构建非奇异有限时间收敛滑模面,保证了滑模面上角度及角速率误差有限时间快速收敛.采用参数自适应二阶滑模算法构建角度约束制导律,所设计的制导律不仅可抑制目标机动加速度等未知干扰,而且可确保滑模面的有限时间可达.相比采用传统二阶滑模或者含有切换项的滑模制导律,所提出的制导律参数可自适应变化,从而无需提前已知目标加速度等不确定项的上界信息.在各种目标机动情况下仿真,结果表明所设计的制导律具有强自适应以及快速收敛的制导性能.  相似文献   

3.
为使舰炮制导炮弹在打击近岸机动目标的末制导段满足落角约束,考虑驾驶仪动态特性,基于自适应径向基逼近网络与动态面提出一种空间末制导律。构建弹目相对运动模型,通过带改进微分跟踪器的扩张状态观测器估计目标加速度。为零化视线角跟踪误差与角速率,采用自适应指数趋近律设计非奇异终端滑模,运用自适应径向基逼近网络削弱控制指令抖振。通过Lyapunov第二法证明了系统的视线角跟踪误差与视线角速率均最终一致有界。仿真实验表明:该末制导律使制导炮弹在空间中打击不同机动形式的近岸目标时,具备良好的末制导性能。  相似文献   

4.
为使大口径舰炮制导炮弹在打击近岸机动目标的末制导段满足落角约束,现考虑自动驾驶仪动态特性,基于自适应RBF逼近网络与动态面滑模提出一种空间末制导律。构建空间弹目相对运动模型,通过带改进微分跟踪器的扩张状态观测器估计目标加速度。为零化视线角跟踪误差与视线角速率,采用自适应指数趋近律设计非奇异终端滑模动态面,并运用自适应RBF逼近网络削弱控制指令抖振。通过Lyapunov第二法证明了全系统中视线角跟踪误差与视线角速率均最终一致有界。仿真实验表明:该末制导律使制导炮弹在空间中打击具有不同机动形式的近岸目标时,均具备良好的末制导性能。  相似文献   

5.
针对传统固定时间终端滑模制导方法在末制导中存在的奇异性、收敛速度慢以及加速度受约束问题,提出一种考虑攻击角、加速度约束的快速非奇异固定时间滑模制导律。利用终端滑模方法,构造快速收敛的新型非奇异终端滑模面,保证视线角、视线角速率在满足加速度约束的同时,能够在给定的固定时间内快速收敛至期望值,收敛时间上界独立于系统的初始状态。通过构造趋近律来设计新型固定时间制导律,并利用Lyapunov稳定性理论,对所设计的制导律进行理论分析与证明。最后通过仿真,验证了所设计制导律与其他固定时间收敛制导律相比,具有较快的收敛速度。  相似文献   

6.
针对飞行器跟踪预设轨迹的问题,提出非奇异快速终端滑模和角度约束的轨迹跟踪制导律。通过引入虚拟目标点,提出参考轨迹曲率半径的期望视线角约束条件,建立带有视线角约束并考虑自动驾驶仪动态特性的轨迹跟踪数学模型。为了保证在有限时间内跟踪预设轨迹并避免出现奇异问题,采用快速非奇异终端滑模和动态面控制方法进行制导律设计。推导出视线角误差和轨迹跟踪误差之间的数学关系,并利用Lyapunov稳定性准则证明轨迹跟踪误差最终有界任意小。与弹道成型轨迹跟踪制导律进行仿真对比,仿真结果表明所提出的制导律具有良好的跟踪性能及鲁棒性。  相似文献   

7.
BTT导弹制导律研究综述   总被引:1,自引:1,他引:0       下载免费PDF全文
与STT导弹相比,BTT导弹在气动效率、机动能力、控制性能等方面具有明显优势,但其运动耦合特性也给传统研究框架下的制导律设计带来了挑战。本文针对BTT导弹制导律设计问题展开研究,首先描述了BTT导弹制导基本问题,分析了BTT导弹制导律设计的技术难点,需要综合考虑运动耦合、多约束、目标机动、弹体动态效应等因素,然后综述了国内外现代制导律设计的基本方法,将其分为双通道解耦法、球坐标法、现代几何法等,最后指出了BTT导弹制导律的进一步研究方向。  相似文献   

8.
零控脱靶量有限时间收敛制导律   总被引:1,自引:1,他引:1       下载免费PDF全文
针对高速机动目标的拦截问题,研究了一种考虑导弹自动驾驶仪动态特性的零控脱靶量有限时间收敛制导律。对导弹-目标三维相对运动几何关系进行解耦,并考虑导弹的自动驾驶仪动态特性,推导了一种新型三维零控脱靶量模型;在此基础上,基于自适应滑模控制理论和有限时间稳定性理论,选取俯仰平面和偏航平面的零控脱靶量为滑模面,设计了零控脱靶量有限时间收敛三维自适应滑模制导律;对该制导律的稳定性和有限时间收敛特性进行了分析和证明。仿真结果表明,与比例制导律相比,所设计的制导律可使导弹的零控脱靶量在有限时间内收敛到零,且具有更高的制导精度。  相似文献   

9.
变论域模糊自适应滑模有限时间收敛制导律   总被引:1,自引:1,他引:1       下载免费PDF全文
针对拦截高速机动目标的需求,研究了一种变论域模糊自适应滑模有限时间收敛制导律。推导了导弹-目标空间拦截模型,设计了三维滑模制导律;根据有限时间收敛制导律专家的经验,采用模糊自适应控制方法对滑模制导律的非切换项进行逼近,并设计了有限时间收敛模糊控制规则;提出了一种新型变论域伸缩因子,设计了基于新型伸缩因子的变论域模糊自适应滑模有限时间收敛制导律。仿真结果表明,所设计的制导律能够使导弹准确命中目标,并能够达到视线角速率有限时间收敛,且与比例制导律相比,具有更高的制导精度和更短的飞行时间。  相似文献   

10.
基于拦截机动目标的末制导问题,提出了一种新的具有鲁棒性的非线性末制导律。基于二维平面内弹目相对运动学关系,将目标机动作为有界干扰量,建立了描述弹目相对运动的数学模型。引入一阶弹体动态特性,借助于零化弹目视线角速率的思想,采用Nussbaum-type增益技术,设计一种非线性鲁棒末制导律,同时利用Lyapunov稳定性理论证明了在该制导律作用下末制导系统的稳定性。最后通过与比例导引律进行对比,数字仿真验证了所设计的非线性制导律的有效性,具有很强的鲁棒性和适应性。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

16.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
本文介绍了笔者为开发名为OONMES的网络管理专家系统所实现的一个简单专家系统工具SIM-LISP。SIM-LISP是一个用C/C++语言来实现的模拟LISP语言的可调用函数集,它短小精巧,速度快,可以完成针对网管专家系统的事实或规则知识的表示、匹配、合一和推理等基本操作,并有与知识对象的连接功能,是网管专家系统内核实现的支撑环境。  相似文献   

19.
This article consists of selected translations from captured interviews and dairies of Al Qaida members. The time period covered is from mid-2001 to early 2002 and concerns their operations in Afghanistan. The material clearly conveys a range of emotion, from confident to despondent, as well as efforts to contest the US actions. The first several pages give the reader context and some possible “lessons learned,” but the story(ies) are best told by the Al Qaida members themselves. All names are pseudonyms.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号