首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 500 毫秒
1.
为了解决通信时延下关于参考状态的二阶一致性问题,提出了一种一致性算法。该算法利用Lya-punov稳定性理论,首先给出多智能体系统在固定时延下达到一致性的充分的线性矩阵不等式(LMI)判据;再给出满足一定条件的多智能体系统在时变时延下达到一致性的判据;最后,以水下无人航行器(UUV)集结为应用背景进行算法验证。运算结果表明了所提出的一致性算法和判据的有效性。该算法适用于具有时延的有向通信网中多智能体系统关于参考状态的二阶一致性问题。  相似文献   

2.
为解决多智能体协同工作问题,开展了广播式通信拓扑多智能体系统信息一致性研究。基于随机矩阵谱半径的唯一性,对固定和时变通信结构的离散系统证明了一致性问题的可解性。根据广播式通信拓扑的特点,具体给出通信协议中智能体的通信形式,并证明了系统在实现信息一致性后,系统的状态收敛到主个体的状态。针对智能鱼雷编队攻击协同技术,给出了实际仿真实例,仿真结果证明了理论结果的有效性。  相似文献   

3.
自然界中许多现象都间接地映射了多智能体分布式协同控制问题,在实践应用中展现了潜在的应用价值,如何实现一致性一直是多智能体研究的基础和热点问题。基于李雅普诺夫稳定性分析、自适应控制理论等方法研究了具有绝对未知输入的多智能体系统的自适应容错一致性问题。首先,根据故障的演变特征建立了一种马尔科夫跳变故障模型;其次,提出一类包含固定控制器增益、相邻智能体的局部状态信息及时变辅助控制函数的容错一致协议,利用辅助控制函数来补偿执行器故障和领导者未知输入;然后,建立适合于该系统的H;性能指标函数,减少了估计误差和多智能体初始状态对闭环系统的影响;最后,通过仿真验证了所设计方法的有效性,能较好的估计故障和实现容错一致性。所提供的算法为无人协同编队在复杂环境下的应用提供理论支撑。  相似文献   

4.
针对l阶链式积分器型多智能体平均一致性问题,给出联合连通拓扑条件下LMI表示的时延相关稳定判据.利用状态分解思想,将收敛条件转化为判断不一致系统零平衡点的稳定性;考虑存在多个时变通信时延的情况,采用构造公共的Lyapunov-Krasovskii泛函的方式来分析系统稳定性,为获得较低保守性判据,在主要结论中引入了自由权...  相似文献   

5.
研究了通信延时下基于事件触发的一阶多智能体系统一致性问题。针对有向固定拓扑,设计了通信延时下基于事件触发机制的控制器。利用李雅普诺夫稳定性理论提出了能够使系统稳定和一致的事件触发函数和时延上界,并利用该事件触发规则求取两次触发之间的最小间隔,证明了该系统不存在Zeno行为。事件触发机制的引入有效减少了控制器的更新次数和智能体之间的通信频率,节约了资源,最后通过仿真实例验证了该理论方法的可行性与有效性。  相似文献   

6.
对于复杂系统的建模与仿真,利用高层体系结构标准的统一框架以解决一致性和互操作问题,而多智能体技术可以提高邦员的智能性,更好贴近实际。因此,将多智能体系统与高层体系结构相集成可以有效提高系统仿真与建模的效果。但二者集成仿真还存在着种种问题,针对这些问题,根据军事训练仿真的具体要求,提出集成仿真的基本设计流程,并设计出了集成仿真的通信模式和交互过程。  相似文献   

7.
随着"网络中心战"概念的进一步延伸以及"信息栅格"技术的快速发展,网络化火控系统已成为现代防空系统的主流。将多智能体一致的思想引入火控系统设计中,提出了一种基于多智能体一致的分布式网络化防空火控系统的体系结构,并设计了基于无偏测量转换的Kalman一致性滤波算法。试验结果表明,火控单元利用通信拓扑结构进行信息交互,所提算法可使各火控单元获得精确一致的目标状态估计。与传统网络化防空火控系统相比,所提火控系统将火控网中心的信息融合功能分散到各节点,可快速获得目标的状态估计信息;基于多智能体一致的分布式系统结构降低了火控网中心的通信量和计算量,提高了网络化防空火控系统的抗毁性。  相似文献   

8.
对固定拓扑结构下多智能体有向网络一致性问题进行了研究,提出了一类协调控制器并证明了使多智能体网络在固定拓扑结构下取得全局渐进一致的充要条件,考虑到智能体之间通讯过程中存在的时延问题,给出了最大固定延时时间的紧凑上界,取得了满意效果,最后将信息一致性思想应用于多机器人的编队控制。结果表明,基于信息一致性的方法可成功应用于机器人编队控制。  相似文献   

9.
面向多智能体系统编队协同完成既定任务,针对具有非线性动态的二阶多智能体系统的编队控制问题,开展分布式编队控制协议设计.考虑到集群运动过程中,各智能体只需调整自身与相邻智能体的相对位置即可维持整体队形.基于邻居智能体之间的相对状态信息,提出了具有时变增益的自适应控制协议,证明了多智能体系统在该控制协议作用下能实现编队控制...  相似文献   

10.
多无人水下航行器(UUV)编队控制在实际复杂海洋环境中面临着水声通信时延大、多中断和丢包等弱通信难题,如何提高其对通信的鲁棒性是重点研究方向之一。首先,建立了多UUV编队模型;其次,将多UUV编队航行分为有无参考路径两种状态,针对已知编队期望路径条件,将编队问题分解为路径跟踪与速度同步问题,设计了基于模型预测控制的路径跟踪控制和速度误差同步机制;再次,针对编队处于机动过程而缺乏参考路径的条件,提出了基于最小二乘的融合状态估计及其一致性编队控制方法;最后,在仿真环境最大队形误差0.6 m,验证了算法的有效性。与单积分器系统一致性编队控制算法对比分析表明,所提方法在队形控制精度、队形恢复时间以及编队的稳定性方面均具有一定优势,研究结果对多UUV编队应用具有重要的指导意义。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号