首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
一种新的机动目标模型及其自适应跟踪算法   总被引:1,自引:0,他引:1  
针对机动目标跟踪问题,在截断正态概率密度模型的基础上,通过目标机动状况与相邻采样时刻间位置估计量变化之间的函数关系实现噪声方差自适应调整,提出了一种新的自适应滤波算法——基于截断正态概率密度模型修正的自适应滤波算法。计算机仿真结果表明,该算法在跟踪机动目标时,具有良好的跟踪性能,并极大地改善了跟踪非机动目标的能力。  相似文献   

2.
当前统计模型和截断正态慨率模型都需要预先设计目标最大机动加速度,不能适应各种机动情况.在截断正态概率加速度模型的基础上,提出了一种基于截断正态概率模型的模糊自适应算法.该算法使系统状态噪声方差随着机动特性能够自适应调整,自适应各种机动情况.仿真结果表明,该算法在跟踪精度和收敛速度都优于传统的基于"当前"统计模型和截断正态概率模型的跟踪算法.  相似文献   

3.
针对机动目标跟踪中常见的量测转换问题,提出了一种基于球坐标系下最优线性无偏估计滤波的交互多模型算法。该算法的核心思想是将最优线性无偏估计滤波作为交互多模型中的基本滤波,完成对机动目标的跟踪。在仿真试验中,将该算法与基于扩展卡尔曼滤波的交互多模型算法进行比较,结果表明该算法有效地抑制了扩展卡尔曼滤波中常见的滤波发散问题,并且提高了跟踪的精度,具有较好的实用性。  相似文献   

4.
为满足履带车辆作为机动目标的实时跟踪和对目标速度、航向角的准确估计,针对测量值含有相关乘性噪声,采用新息分析法依据噪声相关系数已知和未知改进容积Kalman滤波算法。考虑到单模型滤波器难以准确地实现机动目标的跟踪,采用交互式多模型算法对履带车辆运动轨迹进行描述,提出一种交互式多模自适应容积Kalman滤波算法。仿真表明交互式多模型自适应容积Kalman滤波算法对车辆机动具有稳定的跟踪效果且乘性噪声得到有效处理。  相似文献   

5.
针对非线性观测条件下的机动目标跟踪问题,基于机动目标的协同转弯模型,采用防发散无迹卡尔曼滤波方法和自适应网格的模型集自适应策略,研究了一种变结构交互式多模型算法。对二维机动目标跟踪的仿真结果表明,该算法与相应的固定结构交互式多模型算法相比,可以解决固定结构多模型算法存在的问题,有效提高多模型算法的精度和费效比,缩短计算时间,且适合工程应用。  相似文献   

6.
在机动目标跟踪过程中,传感器在利用量测数据计算目标状态的同时,需要完成对目标运动模式的估计,并根据估计结果对传感器滤波方程的参数或结构进行调整,以减小滤波方程与目标运动模式之间的差异,提高对机动目标的跟踪精度.针对已有多模型算法的不足,利用多个时刻的目标运动模式分布来解决混合估计问题,提出一种新的次优多模型(MTMM)算法.仿真结果证明了MTMM算法的有效性.  相似文献   

7.
针对网络化作战中单探测节点对机动目标的运动模型不确定性导致滤波精度低,为提高目标跟踪的稳定性和精确性,提出了多节点探测跟踪算法。基于网络体系中信息的共享需求,建立网络探测节点的目标跟踪模型;通过网络探测节点目标跟踪需求和实战要求发现目标经常有多种运动状态并存现象,而单一模型的滤波器不能满足对机动目标跟踪性能的要求。因此,探测节点采用了基于交互式多模型(IMM)的无迹卡尔曼滤波(UKF)算法进行状态估计,融合中心将各节点发送的目标状态估计融合后进行状态估计,有效地降低了目标机动造成的模型误差,提高了跟踪性能。仿真结果表明,所提出的算法提高了网络节点对机动目标的跟踪精度,并且收敛速度快,有较强的鲁棒性和实用性。  相似文献   

8.
基于修正转弯模型的交互多模型跟踪算法   总被引:1,自引:0,他引:1  
临近空间高超声速飞行器具有极快的飞行速度和独特的机动模式,传统单模型跟踪方法不能对此类目标进行有效跟踪。提出了基于修正转弯模型的交互多模型跟踪算法,该算法修正了转弯模型,利用当前统计模型思想对目标角速度进行实时估计。首先分析了临近空间高超声速目标的特性,然后根据目标运动方程,对目标角速度进行实时估计,最后通过交互多模型实现对临近空间高超声速目标的跟踪。蒙特卡罗仿真结果表明,IMM跟踪算法能够有效跟踪临近空间高超声速目标,且跟踪的精确度、稳定性等明显优于单模型。  相似文献   

9.
为了有效提高对机动目标的跟踪效果,将无迹卡尔曼滤波(UKF)引入到交互多模型(IMM)算法框架内,加强状态估计精度;引入强跟踪滤波器(STF)到UKF算法中,避免对强机动目标的过大时间延迟和跟踪性能差的缺点;提出虚拟检测函数法,在跟踪过程中自适应调整"当前"统计模型的机动参数,加大模型集与目标真实运动模式匹配概率。仿真结果验证了改进算法的有效性。  相似文献   

10.
针对基于多传感器组网进行机动目标跟踪的传感器管理问题,提出了一种基于Rényi信息增量的机动目标协同跟踪算法。首先结合"当前"统计模型和交互式多模型不敏卡尔曼滤波算法设计了一种变结构多模型算法,来进行机动目标的状态估计;然后以Rényi信息增量为评价准则,选择使Rényi信息增量最大的单个传感器进行目标跟踪;最后利用得到的最优加速度估计进行网格划分,更新变结构多模型中的模型集合。在一般机动及强机动场景下进行了算法性能分析,仿真结果表明,该算法能够合理地选择传感器,提高了对机动目标的跟踪精度。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号