首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
针对GNSS导航信号模拟源中多星座轨道计算实时性问题,从计算效率、精度等角度分析和对比了牛顿多项式和埃尔米特多项式插值算法的性能,通过对牛顿插值的加“窗”改进,使得卫星位置、速度的插值精度显著提高.算例结果表明,该方法能够在等间距时间点上多个卫星位置已知、速度未知的条件下,高精度实时地内插出卫星的位置和速度,其中卫星位置插值精度为mm级,速度插值精度小于1e-5 m/s,计算量为广播星历直接计算的1/7,位置和速度的拟合精度均优于三阶埃尔米特插值结果.  相似文献   

2.
针对热-电场耦合仿真计算中非匹配网格之间的数据插值问题,提出了一种基于紧支径向基函数点插值的数据传递方法。推导了数据传递矩阵,根据所提出的数据传递方法编制了非匹配网格之间数据传递计算程序,以若干组非匹配网格之间的温度插值为例进行了验证,并分析了不同参数对计算时间及精度的影响,结果表明,算法效率较高,计算误差较小,适用于以热-电场耦合为代表的固体域耦合非匹配网格间的数据传递计算。  相似文献   

3.
针对热-电场耦合仿真计算中非匹配网格之间的数据插值问题,提出了一种基于紧支径向基函数点插值的数据传递方法。推导了数据传递矩阵,根据所提出的数据传递方法编制了非匹配网格之间数据传递计算程序,以若干组非匹配网格之间的温度插值为例对本文所提方法进行了验证,并分析了不同参数对计算时间及精度的影响,结果表明,本文算法效率较高,计算误差较小,适用于以热-电场耦合为代表的固体域耦合非匹配网格间的数据传递计算。  相似文献   

4.
针对单元网格发生变形重构中新旧网格之间的数据插值问题,提出一种基于格点格式有限体积法的流场数据传递方法。利用非结构动网格技术,将旧网格单元移动到新网格单元,同时时间推进求解流场控制方程,获得移动后旧网格单元物理量,并将其赋给新网格单元,以此来实现两套网格间的信息传递。计算结果表明,该方法在信息传递过程中没有引入插值误差,理论上流场求解方法的精度就是信息传递精度,验证结果表明其显著优于二阶插值精度。  相似文献   

5.
针对已有Radon-Wigner变换(RWT)对线性调频连续波(linear frequency modulated continuous wave,LFMCW)雷达目标加速度估计计算复杂高、精度低的问题,提出了一种改进的RWT算法。该算法通过熵值法得到加速度的粗估计,对RWT结果求二阶原点矩减小搜索计算量,并且提出了RWT插值方法,将其应用到迭代RWT中用于提高加速度估计精度。实验结果表明,该算法在低信噪比的情况下可以准确检测出匀加速微弱目标,计算量较小且精度较高。  相似文献   

6.
提出了一种非结构网格上解Hamilton Jacobi方程的自适应局部加密方法。讨论了加密方法关键的一步:光滑度指标的确定,通过采取无振荡插值,得到了无振荡数值格式,典型算例表明,该方法只需增加少量的点和计算量却能够提高计算精度和对间断的分辨能力。  相似文献   

7.
基于双向映射的非网格型全向图展开插值方法   总被引:1,自引:0,他引:1       下载免费PDF全文
原始的全向图存在严重的同心圆环状变形,通常需展开为更适合人眼观察的柱面全景图像。结合折反射全向成像特点,提出一种基于双向映射的全向图展开为柱面全景图像的插值方法,通过光路跟踪得到图像间的坐标映射关系,将所要生成的柱面全景图中每一点正向映射到原始的全向图中,确定插值邻域点;将这些邻域点逆向投影到柱面全景图中,针对邻域点在柱面全景图中呈非网格型分布的特点,采用非均匀二维插值算法进行图像插值运算。该方法既准确地定位插值邻域点,又避免了全向图的非线性畸变对邻域点权重计算的不利影响。实验证明该方法能有效提高插值精度和展开后图像的质量。  相似文献   

8.
针对火炮调炮精度检测中存在的不足, 提出了一种基于双目立体视觉的三重交会测量方法,在炮身管上附加球状标志物,利用CCD摄像机获取标志物图像,通过标志物成像的几何投影关系计算球心的三维坐标.为了降低图像识别误差的影响,对投影的识别位置进行拓展和细化,并对球心投影边界进行插值,摄像机光心与插值点连线射线形成了一个锥体,两摄像机的锥体分别与炮台球面相交形成曲面,计算两曲面公共部分的形心,即为球心位置.通过确定球心位置,对炮身管的高低角、方位角进行计算,从而检测火炮调炮的性能.实验证明,该算法简单、快速,具有较高的精度.  相似文献   

9.
为提高三维激光扫描点云数据的配准精度,提出了一种基于快速点特征直方图特征的迭代插值配准方法。配准过程中,点云数据获取时受扫描仪分辨率影响,点云局部或整体密度偏小,两次测量点云数据的相同位置不存在完全相同的点,以致对应点之间存在误差。为减小误差对配准精度影响,引入迭代插值方法,增加点云整体密度。通过计算关键点的快速点特征直方图的特征寻找对应关系,使用随机采样一致算法去除错误对应关系,对对应点协方差矩阵进行奇异值分解求得粗配准旋转平移矩阵,再使用迭代最近点算法进行点云的精确配准。实验结果表明,改进的配准方法简单、稳定可靠、计算速度有所增加,有效地提高了配准精度。  相似文献   

10.
针对滑行表面数值预报结果中船底出现异常水气分布的问题,基于三种常用CFD软件FLUENT、CFX及STAR-CCM+研究了VOF界面插值格式、网格类型及数目等因素对滑行表面性能数值预报的影响,并提出相应改善数值计算模拟的具体措施。研究表明:基于相同的结构化网格及计算设置时,采用几何重构界面插值格式预报滑行块的阻力及底部水气分布上最为准确,CICSAM格式次之,修正HRIC格式最弱。通过选择合理的网格类型及网格数目也可以改善滑行船体性能预报精度。CFX采用四面体网格,STAR-CCM+采用多面体网格可以较为准确预报滑行艇体的流场和阻力。建议在滑行艇的阻力及流场预报中采用几何重构的VOF界面插值方式,选择合理的网格类型并进行适当的网格加密可以提高水气界面捕捉的精度,减小阻力预报的误差。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号