首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
针对大型跟踪系统在某些特定场合不适用的问题,设计了一种集视频采集、目标捕获、识别与跟踪、云台随动控制、无线电台通信、远端预警点火等多功能于一体的导弹近程防御预警点火系统.上位机采用双DSP处理器设计结构,应用波门和相关两种方式跟踪算法,以及三段式云台伺服控制方式确保了系统的跟踪适应能力.下位系统采用LPC936单片机系统完成远端通信和中断点火控制.经实验测试,系统达到预定指标.  相似文献   

2.
本文简要介绍了一种能用于智能化仪器仪表工业,由MC68HC05L9和TMS320C25两片微处理器组成的并行处理系统.该系统采用乒乓式RAM结构进行数据通讯,处理速度可达1100万次/秒.软硬件采用了抗干扰技术,具有成本低、性能高、结构简单等特点.稍加改进,也可应用于自动控制系统中.  相似文献   

3.
舒畅 《火力与指挥控制》2022,(5):159-162+170
基于统一的基础平台,采用时钟同步和通信解析相关技术,设计了packet.xml、network.xml、packet_adapter.xml插件,实现了武器系统间数据通信,解决了武器导调系统的通信问题。平台开发采用模块化和中间件技术,开放式体系结构,使系统具有更好的可移植、可扩展、可互操作、可剪裁性,提高了系统的可集成性和集成效率,既方便了升级,又降低了开发成本。  相似文献   

4.
航天器推进系统模块化建模方法   总被引:4,自引:2,他引:2       下载免费PDF全文
为了研究由复杂增压气路和推进剂供应管路组成的航天器推进系统的动力学问题,基于AMESim软件平台,构建了模块化、可扩展的航天器推进系统仿真模型UPSSim.模型中,增压气路采用分段集中参数模型,推进剂供应管路采用分布参数模型,并考虑了系统各组件与环境的换热.对某型轨控发动机的变轨过程进行了仿真,UPSSim能准确模拟该发动机变轨过程中系统参数的变化,计算结果与设计性能参数、飞行遥测数据吻合较好.仿真结果表明,本文所采用的模块化建模与仿真方法适用于复杂管网的建模,在航天器推进系统仿真建模与仿真领域具有较好的应用前景.  相似文献   

5.
坦克动力装置润滑系统计算与分析   总被引:2,自引:0,他引:2  
本文介绍了车用内燃机润滑系统流动与传热仿真方法.采用一维的方法研究了车用内燃机润滑系统流动问题;采用网络法研究了车用内燃机润滑系统的传热问题,并建立了润滑系统各部件的传热数学模型.编制了计算程序.对某型坦克内燃机润滑系统的流动与传热进行了实例计算,仿真结果与试验值符合较好.  相似文献   

6.
基于完全互补码极好的相关特性,采用其作为扩频码,提出了基于完全互补码的DS-UWB系统模型.为了多个用户使用该系统,其中发射端采用码片移位方式实现.接收端则采用相关接收机解调用户信息.N路接收信号分别相关运算后叠加并进行判决,对前后码元的关联性使得系统性能有很大提高.在AWGN环境下和802.15.3a推出的UWB信道模型(CM2)下,对单用户和4用户情况下该模型的误比特率性能与采用Gold码和Walsh码时的性能进行了仿真分析.从仿真结果可以看出,采用完全互补码的DS-UWB系统性能有显著提高.  相似文献   

7.
介绍了一种中小型石油库站CAD系统的开发方法与开发工具,分析和讨论了系统构建的技术策略和采用的技术路线.采用基于工程参数驱动的图块设计、基于单元图的设计、基于工程定型图的设计和泵站设计与水力计算集成等技术,在系统构建时考虑工程项目管理、设计环境配置、总图设计、数据结构与数据库设计以及系统文件与信息流向等策略,使得中小型石油库站CAD系统的开发围绕工程设计实际需求展开.  相似文献   

8.
为了满足水下航行远航程和长时间的要求,远航程自主水下航行器(AUV)采用的是以SINS导航为主、卫星导航定期修正的方式,以提高导航的精度和可靠性.设计一种采用GPS卫星定位导航模拟器、GPS接收机、惯性测量器件(IMU)和实时仿真计算机构成的采用SINS/GPS组合导航方式的AUV导航半实物仿真系统,并对该系统的硬件接口设计、算法和软件开发进行了论述.所开发的系统通过外部的线运动补偿实现了惯性导航系统的完整计算,通过时间同步策略解决了各导航子系统的并行同步问题.部分仿真试验的结果表明,所设计的半实物仿真系统方案可行,可用于更高置信度的AUV组合导航仿真实验.  相似文献   

9.
某装甲车炮控系统采用模型参考自适应控制的大功率晶体管直流脉冲宽度调制系统.采用速度负反馈和电流负反馈的双环负反馈系统,外包一个自适应控制环.采用自适应控制环,降低系统对内部参数的变化和外部扰动的敏感性,因而大大提高系统低速运行的刚度,使火炮具有优良的低速瞄准性能.着重研究增加自适应控制环后对炮塔电力传动系统的动态影响.  相似文献   

10.
目前工程上普遍采用经典PID控制方法对位标器进行控制,其要求响应快、超调小、稳态精度高.但这些性能指标之间是矛盾的,经典控制方法往往采取折中的方案,尤其是死区等非线性因素严重影响位标器系统的性能.提出采用自抗扰控制器对位标器系统的死区进行补偿.仿真结果表明,采用自抗扰控制器的位标器控制系统响应速度快,超调小,对死区有很好的抑制能力.  相似文献   

11.
摘要是从论文中提炼出来的语义完整的概括文章主旨的紧缩性短语的短文;关键词是从报告、论文中选取出来的,用以表示全文主题内容信息的词或词组。摘要、关键词是文献检索的重要标识,具有窥一斑而见全豹的作用。读者只要浏览摘要及关键词,便可了解文章大意,决定是否阅读全文。二者都是为文献检索提供信息或直接为某些文章所转摘。所以,应按照规范要求,把握摘要四要素,认真撰写摘要,准确选取关键词。将文献信息全面、准确、清晰地提供给读者,提高文献转摘率和被引用率。  相似文献   

12.
电感储能高功率微波系统的数值模拟   总被引:1,自引:1,他引:0       下载免费PDF全文
介绍了REFORM程序,使用等效电路模型,研究了电感储能驱动高功率微波系统的性能问题。电路中考虑了初级能源,脉冲变压器,电爆炸丝切断开关,同轴传输线,火花隙陡化开关,以及微波二极管负载等。由模拟结果得到了一些有用的结论,即通过电路参数优化可以提高整个系统的效率,进而验证电感储能高功率微波系统方案的可行性。  相似文献   

13.
由于隧道的半封闭性,空间有限,当长度很长时空气流通不畅,一旦发生火灾,烟气就会迅速填充隧道,而且CO等危险气体也会随烟气向隧道扩散,这对隧道内车辆和人员造成极大的危险。因此,需要保证隧道内空气流通状态的良好以及发生火灾时对烟气的良好控制。模拟了隧道口附近发生一定功率火灾的情况下,控制烟气层流动所需要的临界风速。  相似文献   

14.
Deterioration in security relations as between NATO and Russia reached boiling point in the aftermath of Russia’s annexation of Crimea in 2014 and its subsequent destabilization of Eastern Ukraine. As a result, some voices in the West look forward to the departure of Vladimir Putin from power, and others to the possible disintegration of Russia as a unitary state. However, both the departure of Putin and the collapse of Russia have a nuclear dimension. Putin has issued pointed reminders of Russia’s status as a nuclear great power, and Russian military doctrine allows for nuclear first use in the event of a conventional war with extremely high stakes. Beyond Putin, a breakup of Russia would leave political chaos in Eastern Europe, Central Asia and elsewhere, inviting ambiguous command and control over formerly Russian nuclear forces.  相似文献   

15.
青少年的健康是国家的财富,更是每一个人健康成长和实现幸福生活的根基。有了健康的体魄,就能为祖国和人民作出更大贡献,拥有更加幸福的生活。当前,我国正处于全面建设小康社会和构建社会主义和谐社会的新阶段,教育和体育事业面临一系列新的历史性课题。怎样培养学生对体育的终身兴趣以及学校体育教育过程、怎样帮助他们养成终身锻炼的习惯,这是现代体育工作者要深入思考和探讨的问题。  相似文献   

16.
《Arms and Armour》2013,10(2):75-97
The restoration of Westminster Hall in the 1830s revealed a number of eleventh-century carved capitals, one depicting, as then described, ‘an armed man assailing a castle’. Aided by archaeological evidence from Abinger (Surrey), the ‘castle’ can be convincingly interpreted as a motte-top tower, carried by earth-fast posts, open-sided below and faced above with boards painted to resemble masonry. It is the only known depiction in elevation of a type of tower that is likely, given its simplicity, to have been widely used in the eleventh and twelfth centuries. The assailant, armed with an axe, carrying a round shield and wearing a helmet with nasal, is shown climbing the tower’s external stair at the moment of being despatched or wounded by the defender’s spear. The incident, an individual action rather than a ‘siege’ as such, has many oddities, and may represent a topical event or scene from history or mythology. The story of the Trojan War is suggested as a possible source.  相似文献   

17.
We study a stochastic outpatient appointment scheduling problem (SOASP) in which we need to design a schedule and an adaptive rescheduling (i.e., resequencing or declining) policy for a set of patients. Each patient has a known type and associated probability distributions of random service duration and random arrival time. Finding a provably optimal solution to this problem requires solving a multistage stochastic mixed‐integer program (MSMIP) with a schedule optimization problem solved at each stage, determining the optimal rescheduling policy over the various random service durations and arrival times. In recognition that this MSMIP is intractable, we first consider a two‐stage model (TSM) that relaxes the nonanticipativity constraints of MSMIP and so yields a lower bound. Second, we derive a set of valid inequalities to strengthen and improve the solvability of the TSM formulation. Third, we obtain an upper bound for the MSMIP by solving the TSM under the feasible (and easily implementable) appointment order (AO) policy, which requires that patients are served in the order of their scheduled appointments, independent of their actual arrival times. Fourth, we propose a Monte Carlo approach to evaluate the relative gap between the MSMIP upper and lower bounds. Finally, in a series of numerical experiments, we show that these two bounds are very close in a wide range of SOASP instances, demonstrating the near‐optimality of the AO policy. We also identify parameter settings that result in a large gap in between these two bounds. Accordingly, we propose an alternative policy based on neighbor‐swapping. We demonstrate that this alternative policy leads to a much tighter upper bound and significantly shrinks the gap.  相似文献   

18.
Chapter 15 of the Xunzi stands as the most comprehensive account of the early Confucian analysis of warfare. Unlike a range of other early, non-Confucian discussions on warfare, particular strategies and tactics are taken to be of secondary importance. Thus, Xunzi refuses to discuss practical military strategy without framing it within a much broader ethical, social, and political context. On his account, a well-ordered, flourishing state necessarily rests upon a particular set of rituals and social norms in which people can cultivate themselves morally. Such a state has nothing to fear from any enemy, no matter how tactically sophisticated or militarily skilled. To many, such a view seems overly optimistic. However, given that Xunzi is anything but Pollyannaish in other parts of the text and is quite pessimistic about human nature in general, it behooves us to dig a bit more deeply into his ideas about military affairs and examine whether they can be understood in a more plausible light. This article provides a reading of Xunzi’s views on military affairs that is internally consistent and corresponds with Xunzi’s broader ethical and political views, while also showing why someone of Xunzi’s obvious intellectual acumen might hold such a view.  相似文献   

19.
Nuclear proliferation, lax security standards in the storage of fissile materials, and international apathy in the prosecution of terrorists make nuclear terror a serious threat to the United States and its allies, yet no doctrine of retaliation has been established. To decrease the probability of terrorist use of nuclear weapons, a doctrine of retaliation—a negligence doctrine—should be considered. If the United States can distinguish whose fissile material was used for a nuclear terror event, a negligence doctrine would prescribe retaliation against that state. Where the proximate cause—terrorists—is unavailable for deterrent retaliation, deterring an accessible mediate cause—a state that has failed to adequately secure its fissile material—is one of a few effective alternatives. In the absence of such a negligence doctrine, the United States and its allies are increasingly vulnerable to a nuclear terror attack and the ensuing negative consequences.  相似文献   

20.
利用插入节点的算法,本文研究了B—样条曲线的形状,得到了B—样条曲线拐点的一个定理。该定理描述了当控制多边形只有一个拐向点时B—样条曲线的拐点、尖点和二重点的关系。此项研究对于工程应用中的CAD有较实际的指导作用。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号