首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
组合导航系统故障检测技术研究   总被引:5,自引:0,他引:5       下载免费PDF全文
提出了一种新的故障检测算法。该算法由联合滤波器的全局估计与各局部估计之差 ,得到残差序列 ,通过残差 χ2 检验 ,来判别系统是否出现了故障。同时进一步讨论了故障分离方法。数值仿真及实际应用结果表明 ,该算法能有效地检测出组合导航系统的故障 ,保证了系统的安全性和可靠性。  相似文献   

2.
针对运载火箭伺服机构故障,提出了一种基于扩展多模型自适应估计的故障检测与诊断算法。首先建立了考虑伺服机构故障的运载火箭姿态动力学模型,其次将故障角度作为状态变量得到增广状态空间模型,然后利用扩展卡尔曼滤波器进行状态向量和故障参数的非线性估计,并基于传感器测量数据采用假设检验算法在线计算故障发生的概率,最后给出了基于扩展多模型自适应估计的故障检测与诊断算法流程。该方法的优点是只用一个扩展卡尔曼滤波器就可完成一个伺服机构的故障检测与诊断,从而大幅减小用于伺服机构故障检测与诊断的滤波器数量。仿真结果表明,该方法在无故障时可对伺服机构进行健康监测,在单台伺服机构故障下,可以及时准确判断出哪一台芯级伺服机构发生故障,并可准确估计出伺服机构故障下的发动机摆角角度。  相似文献   

3.
基于传统的扩展卡尔曼滤波器(EKF),本文提出了一种带次优渐消因子的EKF用于非线性时变随机动态系统状态与参数的联合估计。应用于液体火箭发动机健康监控算法的仿真研究表明,本文所提出的联合估计器具有较好的收敛性、实时性和动态跟踪能力。此外,文中还讨论了联合估计器应用于实际系统的有关问题。  相似文献   

4.
针对以往方法对缓变故障存在较大的故障检测延时,从而降低导航系统可靠性的问题,实时的故障估计及补偿十分必要。将故障动力学建模为随机过程,提出了一种基于不准确状态和测量噪声协方差矩阵自适应学习的滑动窗口变分自适应卡尔曼滤波器。它由前向卡尔曼滤波、后向卡尔曼平滑和噪声协方差矩阵的在线估计组成。通过对滑动窗口状态向量的平滑后验分布进行逼近,利用变分贝叶斯方法将噪声协方差矩阵的后验分布解析更新为逆Wishart分布,避免了不动点迭代,获得了良好的计算效率。最后,基于捷联惯导/卫星(SINS/GPS)组合导航系统,进行了导航系统的故障估计及补偿的仿真验证。仿真结果表明,在不需要了解量测噪声和故障系数矩阵的情况下,该方法能够较好地估计出目标故障信号,然后利用估计出来的故障值对导航系统进行补偿,极大地提高了SINS/GPS组合导航系统的实时估计精度与可靠性。  相似文献   

5.
有色噪声干扰情况下非线性系统的状态估计是许多实际工程需要解决的问题.该文章针对传统Kalman滤波器噪声统计特性未知时,受色噪声的影响精度严重降低,甚至出现发散等现象,设计了一种基于神经模糊网络的自适应的Kalman滤波跟踪器.该滤波器通过利用神经模糊网络作为误差估计器,估计出Kalman滤波器的估计误差,从而对Kal...  相似文献   

6.
针对航天器推进系统的时变特性以及随机因素给故障隔离带来的困难,提出了基于Z-检验分析和解析冗余关系相结合的半定性故障隔离方法。基于状态空间转换的思想,运用基于系统诊断键合图模型建立的解析冗余关系挖掘系统时不变的结构特征空间信息,并对解析冗余关系残差进行趋势分析获取时不变、具有残差变化方向的故障特征矩阵,针对存在随机因素对残差定性化的影响,利用了Z-检验分析对残差进行定性化获取观察特征,通过观测特征与故障特征的比较进行系统故障隔离。将该方法应用于推进系统的故障隔离中,结果证明了该方法能有效避免获取推进系统时变诊断准则以及来自系统建模和参数测量等随机因素的干扰,提高了推进系统故障隔离的鲁棒性。  相似文献   

7.
一种基于滑模变结构观测器的故障检测方法   总被引:1,自引:0,他引:1       下载免费PDF全文
提出一种基于滑模变结构观测器的残差生成及故障检测方法.利用滑模变结构所具有的对未知输入扰动的不变性,移除外界扰动对残差的影响,使残差只对故障信号敏感,从而提高故障检测的准确性,较好地解决基于状态估计的故障检测方法中检测鲁棒性与灵敏度之间的矛盾.仿真验证结果表明了该故障检测方法有较高的检测鲁棒性,同时对小幅值故障较为灵敏.  相似文献   

8.
再入目标质阻比估计算法研究   总被引:5,自引:0,他引:5       下载免费PDF全文
再入段目标识别的核心问题是快速高精度地估计出目标的质阻比。针对再入过程的非线性问题,重点研究了样条卡尔曼滤波器、扩展卡尔曼滤波器和一种基于"无损传输"的扩展卡尔曼滤波器,仿真实验从质阻比的估计精度和收敛速度以及计算量等方面比较了各滤波算法的性能。仿真结果表明基于无损传输的扩展卡尔曼滤波器的估计精度最高,收敛速度最快。  相似文献   

9.
残差χ~2法对幅值较小且持续时间长的故障会产生漏检和误检问题,改进SPRT(序贯概率比检测)方法对故障开始和结束时间不灵敏。基于此,给出了故障值大小的判定准则并提出一种残差χ~2与改进SPRT互辅的故障检测方法:在残差χ~2法检测到故障后,用SPRT方法确定故障持续时间;在残差χ~2法确定故障结束后,将SPRT方法检测函数值置零,提高后续检测的准确性。仿真结果表明:该方法能够解决持续时间长的小幅值突变故障的漏检和误检问题,适用于故障多发情况下的检测,能够提高系统可靠性。  相似文献   

10.
针对运载火箭伺服机构故障,提出一种基于扩展多模型自适应估计的故障检测与诊断算法。建立考虑伺服机构故障的运载火箭姿态动力学模型;将故障角度作为状态变量得到增广状态空间模型;利用扩展卡尔曼滤波器进行状态向量和故障参数的非线性估计,并基于传感器测量数据采用假设检验算法在线计算故障发生的概率;给出基于扩展多模型自适应估计的故障检测与诊断算法流程。仿真结果表明,该方法在无故障时可对伺服机构进行健康监测;在单台伺服机构故障下,可以及时准确判断出哪一台芯级伺服机构发生故障,并可准确估计出伺服机构故障下的发动机摆角角度。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号