首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 437 毫秒
1.
针对潜标空间运动的强非线性及数学模型中存在的干扰不确定性为控制带来的挑战,提出了一种基于反馈线性化的深海潜标姿态滑模控制律,并编程进行了仿真及与输入输出线性化控制方法进行比较,结果表明,两种方法均能将潜标控制到参考姿态,滑模控制对系统的不确定性干扰和执行器滞后具有更好的鲁棒性。另外,通过程序可以数值模拟的方式观察潜标在控制过程中的水动力、力矩,潜标姿态、空间运动轨迹、缆索动力学特征等信息,为客观分析潜标的控制与水动力机理提供了支撑。  相似文献   

2.
控制力矩陀螺的动态扫描成像卫星姿态控制   总被引:1,自引:0,他引:1       下载免费PDF全文
针对卫星动态扫描成像任务中的姿态控制问题,建立卫星姿态动力学模型,分析动态扫描成像任务对姿态控制的特殊需求。结合动态扫描成像任务需求提出一种典型的姿态机动方案,对姿态机动过程所需控制力矩进行估计。基于期望力矩和星体实时姿态设计一种俯仰机动控制律,并提出五棱锥构型陀螺群的操纵方案。针对某动态扫描成像任务卫星,对提出的控制律进行数值仿真。仿真结果证明所提方案可以满足卫星动态扫描成像的姿态控制要求。  相似文献   

3.
为了解决再入飞行过程中,飞行器故障时的姿态控制问题。提出了一种故障检测策略和在故障状态下的姿态控制方法。首先,设计了非线性故障检测观测器,通过姿态角观测误差阈值确定故障是否发生。其次,使用自适应控制技术和滑模控制技术实现了故障情况下的再入飞行器姿态控制。最后,通过数值仿真算例,测试了经典双回路控制律和提出的容错控制律下的姿态指令跟踪效果,证明了提出的容错控制策略的有效性。  相似文献   

4.
为了提高制导火箭弹的控制效果,基于最优控制理论,提出将非线性预测控制方法应用于火箭弹姿态的控制器设计.根据火箭弹的运动特点,结合弹箭一般运动方程组,给出了尾翼稳定火箭弹姿态动力学模型.以舵偏角为控制变量,推导出姿态控制系统的状态方程、目标函数与控制律,并设计了姿态控制器.在控制时域一定的条件下,利用6自由度弹道模型仿真分析了控制阶数对制导火箭弹非线性姿态控制器的影响,得到控制阶数对非线性最优预测控制影响的定性规律.仿真结果表明:该控制器具有良好的控制效果,系统控制响应快,可基本实现无差控制.  相似文献   

5.
在飞行姿态控制仿真中,基于飞机运行数据建立的机型运动模型误差较大,为此提出用运行数据训练飞行姿态仿真控制律,减小运动模型的误差。具体是根据姿态变化快慢划分三通道控制回路,通过状态量反馈调整逆系统,利用模型输出与机型运行数据相关量的偏差设计自适应补偿结构,修正运动模型误差。仿真验证表明,加入自适应补偿结构的控制器能有效降低姿态角误差。  相似文献   

6.
基于实际背景需求,针对单平台纯方位水面编队目标运动要素解算问题,从可观测性、观测平台机动及解算模型三方面作了探讨.利用线性系统可观测理论,基于伪线性量测方程对编队目标运动要素的可观测性进行了研究,给出了可观测条件.以Fisher信息阵行列式为性能指标,探讨了观测平台最优机动的理论轨线和工程轨线形状.给出了3种编队目标运动要素解算模型,并进行了仿真比较分析.研究结论和仿真结果表明:水下单平台基于纯方位解算编队目标运动要素,自身必须作有效机动,可以采用单目标运动要素解算的最佳机动策略;提出的联合解算模型的效果显著好于已有的两种模型.  相似文献   

7.
针对临近空间驻留飞艇姿态运动的非线性、耦合和不确定等特点,提出了一种模糊变结构解耦控制方法。首先,推导了定点模式下飞艇的姿态运动方程,通过选取状态向量和控制向量,将其描述为非线性系统。然后,采用反馈线性化方法将非线性姿态控制系统输入输出解耦为三个通道的线性子系统;利用滑模变结构控制对参数摄动的不变性设计了定点姿态控制系统,并应用Lyapunov理论证明了系统的全局稳定性;为提高控制性能,以变结构控制的滑模面及其变化率为模糊控制器的输入,以趋近律参数为模糊控制器的输出设计了模糊变结构控制器,通过模糊规则在线调整控制律参数。最后,对具有参数不确定的姿态控制系统进行了数值仿真,验证了控制方法的有效性和鲁棒性。  相似文献   

8.
针对空空导弹越肩发射初制导俯仰平面180°转弯,提出了一种基于最优控制理论的最优转弯方法,该方法是确定一个最佳推力方向角,使转弯完成时导弹的末端速度最大。建立了简化的用于姿态控制的姿态动力学模型,采用反作用喷气控制系统(RCS)设计了导弹的姿态控制律。对空空导弹180°转弯的飞行过程进行了仿真并给出分析结果。  相似文献   

9.
载人飞船在逃逸飞行过程中,需要对其姿态作较大幅度的调整,调整幅度可达0°~180°,飞船姿态的调整可以通过控制俯仰通道来完成。由于飞船姿态运动的三个通道一般是相互交连的,因此,在作姿态大幅度调整的过程中,还需要对其它两个通道进行姿态稳定。本文设计的一种相平面开关曲线和相应的姿态控制律,既可以用于飞船作大姿态调整,又可以用于姿态稳定。数字仿真结果表明,只要合理选择开关控制曲线的有关参数,可使姿态控制精度满足设计要求。  相似文献   

10.
为了提高捷联惯导姿态解算的精度,介绍了捷联惯导姿态更新的流程及常用方法,并提出了一种改进的等效旋转矢量姿态解算算法。对改进算法的姿态解算算法在低动态条件和高动态条件下分别进行了仿真实验,结果表明改进算法在低动态条件下的姿态解算精度和毕卡四元数法相当,在高动态条件下的姿态解算精度远高于传统毕卡四元数法。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号