首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 219 毫秒
1.
GAP准则在驾驶员诱发振荡预测中的应用   总被引:1,自引:0,他引:1  
随着高增益、全权限电传飞行控制系统在大型运输机和先进战斗机上的广泛应用,非线性驾驶员诱发震荡现象不断增加,已造成多起事故,严重影响飞行安全,运用GAP准则对驾驶员诱发振荡现象预测。需要建立舵机速率限制正弦输入/三角输出描述函数模型和尼尔-史密斯驾驶员模型,运用描述函数法研究P IO的产生机理,介绍GAP准则的一般计算方法,最后运用GAP准则对某型飞机展开研究并进行仿真验证。结果表明:GAP准则物理计算高效、结果直观、意义明晰,可以有效预测P IO的发生。研究结果能为飞机飞行控制系统的设计提供重要的理论依据。  相似文献   

2.
指令驾驶系统能极大地减轻驾驶员负担并帮助驾驶员更好地完成飞行控制任务。研究了某型飞机在高度保持方式下引入指令驾驶系统的方案。对指针偏转规律采用模糊建模,进行了人机闭环系统仿真,并与自动驾驶仪的控制效果作了对比分析。结果表明,采用模糊建模,借助于自动驾驶仪系统在各种情况下的工作数据对模糊系统进行训练,从而得到的指令驾驶系统控制律是可行的。  相似文献   

3.
飞机俯仰运动指令驾驶H∞鲁棒控制器   总被引:1,自引:0,他引:1  
指令驾驶是第三代战斗机的飞行控制系统中广泛采用的一种基本工作方式,对减轻驾驶员负担和提高驾驶员控制效能有积极的意义.首先介绍了指令驾驶系统的组成结构和工作原理,讨论了利用H∞混合灵敏度方法设计鲁棒控制器的基本算法.然后进行了人机闭环系统建模,并基于H∞混合灵敏度方法设计了指令驾驶系统的指针偏转规律,给出了详细的控制算法和设计步骤.最后,在某型飞机的俯仰运动控制工作方式下,进行了人机闭环系统仿真.  相似文献   

4.
等效系统拟配对于采用主动控制电传操纵系统的飞机的飞行品质评价具有重要意义。为了评价特定状态下飞机纵向整体品质的好坏,建立了综合考虑电传操作系统环节、驾驶员环节和大气扰动环节的人-机-环闭环系统。使用遗传算法对此高阶系统进行了降阶等效拟配,使用等效系统准则依据拟配后的等效参数进行了人-机-环系统的品质评价,并在驾驶员高延迟时间的条件下比较分析了使用等效系统准则与使用Neal-Smith准则得出的飞行品质的一致性。仿真结果说明了人-机-环闭环系统等效拟配评价的可行性、合理性。  相似文献   

5.
本文研究现代控制理论在航空火控人—机系统分析中的应用。利用D.L.Kleinman的人模型,在最佳控制和估计理论的基础上,建立了火控系统闭环回路中关于跟踪反应方面歼击机驾驶员的一个计算机化的预测模型。系统动力学包含时变因素,模型还包括了人在执行任务中具有的时间滞后和随机干扰等各种限制。文中提出了火控系统中驾驶员关于信息处理和执行控制特性方面建立预测模型的方法,并在近距离和远距离跟踪条件下进行了数字模拟,计算表明:模型预测和已经了解的驾驶员实际跟踪过程是非常接近的。从对具有不同阻尼系数瞄准具的系统进行模拟的结果也得到与以往关于阻尼系数分析相一致的认识。  相似文献   

6.
基于人体骨骼结构分析,结合坦克驾驶员驾驶特点,建立坦克驾驶员的二维运动学模型;根据该二维模型的几何特性,建立人体各关节链的闭环矢量方程,并运用Newton-Raphson方法对方程进行求解;以求解计算结果为依据,分析不同身高尺寸的驾驶员对某型主战坦克驾驶舱的静态人机适应性。  相似文献   

7.
从外场的数据分析得知,某型飞机液压系统的故障主要是由飞机液压导管故障引起的。在众多引发液压导管的故障因子中,环境因子起着非直接但又不可忽略的影响。通过半参数分析法,对两种环境下飞机液压导管故障率进行比对,获得不同环境下飞机液压导管故障率的定量比较,为改善日常飞机液压系统维护提供有效判断依据。  相似文献   

8.
针对间隙非线性机翼颤振系统的亚临界问题,引入了非线性能量阱(nonlinear energy sink,NES)技术来提高系统发生极限环振荡的临界速度。建立了具有NES控制的间隙非线性机翼颤振系统动力学模型,并分析了质量比、频率比、阻尼比、相对位置等NES参数对颤振系统极限环振荡的抑制效果,以及NES参数对颤振系统极限环振荡临界速度的影响规律。结果表明,阻尼比越大,可以在越小的自振频率比情况下使系统进入稳定区,但需要更苛刻的NES位置要求,即越靠近机翼前缘;而阻尼比越小,则使颤振系统极限环振荡响应进入稳定区所需的NES质量越小。在NES位置靠近机翼前缘时,增大自振频率比会使极限环振荡抑制效果有明显的提升,而增大质量比可以显著提高极限环振荡的抑制效果和临界速度。此外,NES的阻尼比越小,其颤振系统的极限环振荡抑制效果越好。  相似文献   

9.
朱翼 《国防科技》2021,42(4):4-9
发展值得人类用户信任的人工智能系统是影响人机合作发展的核心问题之一。目前,人机合作中信任的研究主要来自于计算机领域,侧重于研究如何构建、实现和优化人工智能系统面对特定任务的计算能力与处理能力。针对"什么因素影响了人对人工智能系统的信任,如何准确测量人对人工智能系统的信任"等问题的研究仍处于起步阶段,尚缺乏人类用户参与的实证研究或实验研究中缺乏严谨的行为科学实验方法。本文回顾了行为科学领域中对人际信任的研究方法,在人机合作框架下,探讨了人与人工智能系统之间的信任关系,梳理了人类个体对人工智能系统信任态度的影响因素。希冀该研究成果能够为构建人机合作中的信任度计算模型提供一定理论依据。  相似文献   

10.
根据现代作战飞机设计对人机功能分配的需求,结合执行任务过程中人机协作的特点及一般协同工作模式,综合考虑人机功能分配的一般方法,研究了作战飞机设计中人机功能分配的原则和方法.建立了适于大型作战飞机的功能分配一般流程,运用定性和定量相结合的分析方法,引入多目标模糊决策的数学方法,建立了人机功能分配的一般模型.为飞机设计中合理进行人机功能分配提供了一种新的参考方法.  相似文献   

11.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

12.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

17.
18.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

19.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

20.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号