共查询到20条相似文献,搜索用时 93 毫秒
1.
2.
当前统计模型和截断正态慨率模型都需要预先设计目标最大机动加速度,不能适应各种机动情况.在截断正态概率加速度模型的基础上,提出了一种基于截断正态概率模型的模糊自适应算法.该算法使系统状态噪声方差随着机动特性能够自适应调整,自适应各种机动情况.仿真结果表明,该算法在跟踪精度和收敛速度都优于传统的基于"当前"统计模型和截断正态概率模型的跟踪算法. 相似文献
3.
针对机动目标跟踪中常见的量测转换问题,提出了一种基于球坐标系下最优线性无偏估计滤波的交互多模型算法。该算法的核心思想是将最优线性无偏估计滤波作为交互多模型中的基本滤波,完成对机动目标的跟踪。在仿真试验中,将该算法与基于扩展卡尔曼滤波的交互多模型算法进行比较,结果表明该算法有效地抑制了扩展卡尔曼滤波中常见的滤波发散问题,并且提高了跟踪的精度,具有较好的实用性。 相似文献
4.
5.
6.
在机动目标跟踪过程中,传感器在利用量测数据计算目标状态的同时,需要完成对目标运动模式的估计,并根据估计结果对传感器滤波方程的参数或结构进行调整,以减小滤波方程与目标运动模式之间的差异,提高对机动目标的跟踪精度.针对已有多模型算法的不足,利用多个时刻的目标运动模式分布来解决混合估计问题,提出一种新的次优多模型(MTMM)算法.仿真结果证明了MTMM算法的有效性. 相似文献
7.
《火力与指挥控制》2017,(10)
针对网络化作战中单探测节点对机动目标的运动模型不确定性导致滤波精度低,为提高目标跟踪的稳定性和精确性,提出了多节点探测跟踪算法。基于网络体系中信息的共享需求,建立网络探测节点的目标跟踪模型;通过网络探测节点目标跟踪需求和实战要求发现目标经常有多种运动状态并存现象,而单一模型的滤波器不能满足对机动目标跟踪性能的要求。因此,探测节点采用了基于交互式多模型(IMM)的无迹卡尔曼滤波(UKF)算法进行状态估计,融合中心将各节点发送的目标状态估计融合后进行状态估计,有效地降低了目标机动造成的模型误差,提高了跟踪性能。仿真结果表明,所提出的算法提高了网络节点对机动目标的跟踪精度,并且收敛速度快,有较强的鲁棒性和实用性。 相似文献
8.
基于修正转弯模型的交互多模型跟踪算法 总被引:1,自引:0,他引:1
《现代防御技术》2015,(3)
临近空间高超声速飞行器具有极快的飞行速度和独特的机动模式,传统单模型跟踪方法不能对此类目标进行有效跟踪。提出了基于修正转弯模型的交互多模型跟踪算法,该算法修正了转弯模型,利用当前统计模型思想对目标角速度进行实时估计。首先分析了临近空间高超声速目标的特性,然后根据目标运动方程,对目标角速度进行实时估计,最后通过交互多模型实现对临近空间高超声速目标的跟踪。蒙特卡罗仿真结果表明,IMM跟踪算法能够有效跟踪临近空间高超声速目标,且跟踪的精确度、稳定性等明显优于单模型。 相似文献
9.
10.
针对基于多传感器组网进行机动目标跟踪的传感器管理问题,提出了一种基于Rényi信息增量的机动目标协同跟踪算法。首先结合"当前"统计模型和交互式多模型不敏卡尔曼滤波算法设计了一种变结构多模型算法,来进行机动目标的状态估计;然后以Rényi信息增量为评价准则,选择使Rényi信息增量最大的单个传感器进行目标跟踪;最后利用得到的最优加速度估计进行网格划分,更新变结构多模型中的模型集合。在一般机动及强机动场景下进行了算法性能分析,仿真结果表明,该算法能够合理地选择传感器,提高了对机动目标的跟踪精度。 相似文献
11.
12.
John Hussey Ian F.W. Beckett Hew Strachan Michael T. Isenberg 《Small Wars & Insurgencies》2013,24(1):158-163
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5 Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7 Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3 Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7 Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9 相似文献
13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level. 相似文献
14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性 相似文献
15.
Douglas Mastriano 《Defense & Security Analysis》2017,33(1):68-76
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West. 相似文献
16.
Uri Bar-Joseph 《战略研究杂志》2013,36(5):718-742
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked. 相似文献
17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。 相似文献
18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。 相似文献
19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions. 相似文献
20.
Stephen A. Emerson 《Small Wars & Insurgencies》2013,24(4):669-687
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region. 相似文献