首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
基于风险理论提出一种面向不同目标探测任务的传感器调度方法。将主动传感器辐射被截获风险和目标探测风险结合起来,建立一般目标探测框架下的传感器最小风险调度模型。分目标跟踪、目标识别和目标威胁等级评估三种情况将传感器最小风险调度模型具体化,给出不同情况下目标探测风险值的计算方法。针对模型的求解提出一种基于混沌思想、反向学习和双向轮盘赌的改进人工蜂群算法。通过仿真实验证明了模型的可行性和算法的有效性。  相似文献   

2.
针对导弹防御中多部雷达跟踪多个目标的问题,提出一种多传感器协同探测任务规划方法。将协同探测任务分解为按时间排序的若干探测子任务,将探测问题转化为每个子任务中优化分配传感器资源的0-1整数规划问题,求解形成多传感器的协同探测方案,满足探测能力约束和协同探测模式要求。基于假设的导弹防御场景验证方法,结果表明该方法能得到合理的多传感器协同探测方案,实现多种协同探测模式下对多个目标的连续、稳定跟踪。  相似文献   

3.
针对地面机动目标跟踪过程中的多传感器管理问题展开了研究,设计了一种基于跟踪精度控制的多传感器多目标分配方法。首先,在考虑目标与目标之间、目标与传感器之间和传感器与传感器之间等的多种约束条件下运用基于协方差控制的思想建立了多传感器多目标分配问题的优化模型;接着将等价伪量测的异步融合算法与IMM算法结合,计算各目标在不同融合周期的跟踪精度估计值;最后,以目标的跟踪精度需求为出发点,结合蚁群算法的思想,设计了一种求解所建立的多传感器多目标分配问题的优化模型的算法。仿真结果表明:该管理方法能在确保跟踪精度需求的前提下,根据对各目标跟踪任务的重要程度,合理地调度传感器资源。  相似文献   

4.
针对多传感器系统中基于冗余和互补信息的机动目标跟踪,以及传感器探测任务平稳交接问题,提出基于SRUKFIMM多信源综合滤波算法进行目标状态估计,提高了目标状态估计精度;并依据当前最新相关量测与滤波预测值的偏差等信息,进行自适应航迹升/降维控制。仿真结果表明:滤波输出稳定平滑、精度高,可有效降低部分信源采样缺失对目标跟踪稳定性的影响,具有较强的鲁棒性能。  相似文献   

5.
针对存在信息保障时间等约束的多传感器协同探测问题,提出一种基于时段优化拼接的多传感器协同探测任务规划方法。将作战过程中多个时间段上的传感器-目标分配问题,转化为“传感器-目标”空间上的传感器工作时段优选与拼接问题,在满足传感器资源限制、对目标探测连续性、传感器接力探测交接班过渡时间等约束下,生成多传感器协同探测计划,使对各目标的探测时段满足信息保障时间要求。在假设的条件下,验证提出的方法,结果表明该方法生成的多传感器协同探测计划满足各项约束,且有助于快速规划多传感器的协同探测任务,方法有效。  相似文献   

6.
无线传感器网络中,目标跟踪往往通过节点之间的协作完成。在无迹变换卡尔曼滤波基础上,提出一种多传感器动态自适应调度算法进行目标跟踪。该方法根据预测跟踪精度来确定采样间隔,然后基于特定的检测概率,为下一时刻选择一组传感器,形成一个临时工作组,并指定某一个传感器作为中心节点进行数据融合。仿真结果证明了该算法能有效提高跟踪精度和可靠性。  相似文献   

7.
针对多传感器多目标检测跟踪问题,提出了一种多传感器多目标双层粒子滤波检测前跟踪算法。算法采用双层粒子滤波结构,在目标检测层中采用量测消除法对多目标逐一检测,形成目标跟踪子粒子群,在目标跟踪层中采用二次重采样的方法对粒子群中粒子分布进行修正,在跟踪过程及时发现并剔除虚假目标。仿真结果表明算法的有效性。  相似文献   

8.
国外舰载红外搜索跟踪系统   总被引:1,自引:0,他引:1  
红外搜索跟踪(IRST)系统利用低空来袭目标机体散热或发动机尾气等红外特征,来探测跟踪目标的一种被动式全景探测系统。IRST系统有扫描型和凝视型两种型号。前者可在一定范围内进行扫描,用于目标搜索;后者采用无需光机扫描、能覆盖整个视场的二维红外探测器阵列,对目标进行仔细观察和识别。舰载IRST系统具有如下特点:  相似文献   

9.
书讯     
由青岛海军潜艇学院夏佩伦教授编著的《目标跟踪与信息融合》一书,于2010年4月由国防工业出版社出版。该书介绍了军事应用背景下目标跟踪和信息融合的主要问题、理论和技术。全书共分8章。第1章探讨多传感器目标检测的数据融合,主要介绍利用分布式多传感器探测目标的结果,来综合判断目标是否存在的判决技术。  相似文献   

10.
针对目标跟踪中雷达组网场景下多传感器管理问题,结合Rényi信息增量和协方差两种算法各自特性,利用并行处理的思想提出了一种基于Rényi信息增量和协方差联合控制的传感器管理算法。在具体仿真设计环节,分为传感器跟踪能力大于目标数和传感器跟踪能力小于目标数两种场景。仿真结果表明该算法在单目标匀速、多目标匀加速等多数场景下能够对目标进行有效跟踪,同时降低了传感器的切换频率,具有更好的实时性。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

16.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

17.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

18.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

19.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号