首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对惯性导航系统(INS)存在积累误差的缺陷,运用GPS姿态测量辅助修正方法对INS误差进行补偿来进一步提高INS的定位精度.通过对INS系统可观测性进行分析,得出增加不同种类的外部导航信息观测量将有效提高INS误差修正能力的结论.研究了船用INS与GPS姿态测量系统组合的组合导航系统,并对GPS姿态测量系统信息对惯性导航系统的误差修正能力进行了仿真.仿真结果证实上述方法可有效提高INS的定位精度.  相似文献   

2.
巡航导弹仅依靠惯性导航系统进行导航时,其导航误差将随着时间的累积不断变大。INS/GPS是最常用的组合导航方式,但存在战时不可用的缺陷。为此提出了一种基于EKF的巡航导弹INS/视觉组合导航方法。利用巡航导弹相对于单个已知点地标的视觉信息(方位角和高度角)和高度信息,巡航导弹INS的位置和速度误差能够同时被估计出来。最后,仿真验证了该方法的有效性。  相似文献   

3.
无全球定位系统下高精度定位与导航是飞行器实现自主侦查、巡航与打击的关键。视觉导航具有被动、低成本、能避免累积误差等优点。视觉导航与惯性导航融合更能够发挥出各自的优势,达到高精度定位的目的。总结了异源图像匹配辅助惯性导航的飞行器定位技术的发展历程; 从相机-惯导标定技术、异源图像匹配、姿态解算、数据融合和后端优化五个方面详细阐述了异源图像匹配辅助惯性导航的飞行器定位的关键技术; 指出了基于深度学习的异源图像匹配与惯性导航两种无源定位组合导航系统融合技术等四个未来可能的发展方向,可为实现异源图像匹配辅助惯性导航飞行器定位技术提供参考。  相似文献   

4.
自旋载体是全球导航卫星系统接收机的一种典型应用。当全球导航卫星系统载体自旋时,旋转产生的高阶动态将导致传统跟踪环路失锁;全球导航卫星系统与惯性导航系统组合可以有效补偿信号的高阶动态。因此,提出了一种利用惯性导航信息辅助卫星导航信号跟踪的超紧组合导航接收机环路设计方法,并分析了惯性导航信息辅助速率、自旋载体转速和信号载波相位误差之间的关系。通过仿真验证了所提接收机环路结构可以有效解决自旋载体接收机的信号跟踪问题,且相比于卫星导航单系统三阶环路而言,所提超紧组合环路结构可以显著提升自旋载体接收机的定位精度。  相似文献   

5.
简要论述了车载定位定向系统现有技术及对其未来发展的展望,包括各大卫星导航系统和惯性导航系统。描述了定位定向导航系统相关的三个关键技术。  相似文献   

6.
图像含有丰富的目标信息,被获取并处理后用于一种新型的智能终端定位手段。对图像定位的相关概念进行介绍,对关键技术的研究情况进行评述,并分别从图像定位作为独立的定位系统和图像定位与全球导航卫星系统(Global Navigation Satellite System,GNSS)及惯性导航系统(Inertial Navigation System,INS)等其他定位方法融合的定位系统2个方面阐述其研究进展,在此基础上提出图像辅助智能终端定位研究中存在的问题及发展方向。  相似文献   

7.
<正>军用机载导航领域对导航系统有高精度、自主性和抗干扰的要求,特别是在复杂电子战环境下,要求导航系统必须具备不依赖卫星、无线电导航的高精度自主导航能力,持续输出位置、速度、姿态等导航信息。机载惯性导航系统作为主要的自主导航手段,近年来不断取得技术上的突破和进展。1军用机载惯性导航技术的发展历程机载惯性导航系统最早起始于20世纪50年代,最先以平台式惯导的形式出现,1950年5月美国北美航空公司奥拓奈蒂克斯分公司在C-47军用运输机上装备XN1纯惯性导航系统,揭开了机载惯性导航的帷幕,随后于1961年,美国在F-104战斗机配装了首个战斗机机载平台式液浮陀螺惯性导航系统LN3。  相似文献   

8.
在船舶操纵模拟器中,视景系统的立体显示为场景中物体的空间关系提供重要的视觉信息,并大大地增强了三维场景的真实感。分析了立体显示方法的原理,介绍了多通道立体显示系统所需的设备及环境,提出了基于Vega的船舶操纵模拟器的立体显示视景系统结构框架,阐述了Vega中场景初始化的方法及立体显示参数的设置,并实现了基于Vega的船舶操纵模拟器视景系统的立体显示,提高了船舶操纵模拟器视景系统的逼真度。  相似文献   

9.
视觉系统是自主无人系统的重要组成部分,附着在相机镜头表面的雨滴会在图像中产生伪影,造成图像质量退化,进而显著影响视觉系统的性能。为此全面深入地调研了近年来附着雨滴的检测和去除方法,凝练了附着雨滴检测和去除问题的本质,并总结了现有方法中使用的雨滴成像模型;从基于模型、基于数据驱动和基于摄像系统三个方向分类梳理了不同的技术方法;从网络架构和损失函数两个方面详细概述了深度网络模型的发展;汇总了现有文献中公开的附着雨滴数据集,并通过实验结果对部分算法的性能进行比较;讨论了检测和去除附着雨滴任务中存在的主要问题,并对该领域未来可能的发展方向进行了展望。  相似文献   

10.
体系结构开发方法研究是当前C4ISR系统体系结构技术研究的一个热点,在总结现有相关问题的基础上,提出了以数据为中心的C4ISR系统体系结构开发方法的定义,并提出了该方法的开发过程.将体系结构开发分为初始化、数据分析、数据设计和数据验证四个阶段,并详细说明了各个阶段主要完成的任务及其常用的方法.最后对以数据为中心的体系结构开发方法的发展进行了总结和展望.  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

16.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

17.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

18.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

19.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号