首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 703 毫秒
1.
微小型飞行器姿态快速机动控制方法   总被引:1,自引:0,他引:1       下载免费PDF全文
针对某弹道导弹释放的微小型飞行器的姿态控制任务需求,提出一种基于Gauss伪谱法的姿态快速机动控制方法。建立精确的姿态控制模型,并考虑反作用飞轮的耦合力矩项;采用Gauss伪谱法获取最优姿态轨迹,设计准滑模跟踪控制器以跟踪该最优轨迹。数字仿真结果表明,Gauss伪谱法计算得到的轨迹是最优的,准滑模跟踪控制器能实现对最优轨迹的良好跟踪,且对干扰力矩有较好的抑制作用。  相似文献   

2.
再入飞行器采用变质心控制不但可以保持较好的气动外形,还町以增大机动能力,但变质心控制较强的非线性和耦合性大大增加了控制系统设计难度,使控制器设计和实施的代价较高。针对这一问题,基于自抗扰控制技术,设计了变质心再入飞行器双通道解耦控制器。通过构造连续光滑扩张状态观测器,不加区分飞行器的各类干扰与耦合,对其统一进行估计:利用非线性状态反馈控制律,并自适应调节控制参数对其进行补偿,实现对飞行器姿态的解耦控制。仿真结果表明:该方法大大降低了对系统模型精度的要求与控制器设计实施代价,对变质心再入飞行器非线性、耦合性以及参数摄动具有较强的鲁棒性。  相似文献   

3.
高超声速滑翔式飞行器再入轨迹多目标多约束优化   总被引:3,自引:1,他引:2       下载免费PDF全文
轨迹优化是高超声速滑翔式飞行器关键技术之一.为避免间接法求解轨迹优化问题时对初值敏感以及伪谱法求解轨迹优化问题中难以处理航路点和禁飞区等问题,提出采用基于Akima插值多项式的直接法求解高超声速滑翔式飞行器再入轨迹优化问题.以驻点热流密度最小和到达目标点时间最小为优化目标,考虑了终端约束、航路点约束、禁飞区约束、动压约束、过载约束等约束条件.仿真结果表明:采用的插值方法可以减少插值过程中的控制变量越界问题;得到的Pareto前沿具有良好的分布性,在初步设计时能够给设计者较大的选择余地;和文献中的单目标优化结果相比,本文所采用的算法也具有较好的寻优能力.  相似文献   

4.
针对多约束条件下高超声速飞行器再入制导问题,提出一种基于微分变换法求解最优反馈控制的全状态标准轨迹跟踪制导律。利用滚动时域控制方法设计易于在线执行的闭环跟踪制导策略,在每个制导周期内将标准轨迹跟踪问题转化为线性时变系统状态调节器问题,并通过最优控制理论进一步转化为两点边值问题,采用微分变换法进行求解获得最优反馈控制律。数值仿真表明微分变换法的引入有效解决了传统两点边值问题求解的数值不稳定性与耗时问题,所设计的闭环制导律对状态偏差与模型不确定性具有较强的鲁棒性,可为工程设计提供有益参考。  相似文献   

5.
为实现四旋翼飞行器对给定轨迹的精确跟踪,提出了一种四旋翼飞行器的迭代学习轨迹控制算法。首先,建立了四旋翼飞行器的动力学模型,并基于小扰动方法对模型进行了线性化处理;其次,提出基于飞行器模型反演推导的轨迹跟踪外环控制以及基于迭代学习控制算法的高度与姿态内环控制,通过在迭代对控制输入的迭代优化,使得四旋翼飞行器不断逼近期望的轨迹,从而达到高精度的控制目标。最后,通过理论分析以及计算机仿真实验,验证了所提算法的有效性。  相似文献   

6.
针对只有两个舵的欠驱动再入飞行器,设计了具有抗饱和功能的姿态跟踪控制器。控制器的设计过程中,首先将姿态运动学与动力学模型分解成慢回路和欠驱动的快回路,然后分别针对快回路和慢回路设计了超扭曲滑模控制器和分层滑模控制器,最后通过仿真验证了该方法的有效性。  相似文献   

7.
欠驱动再入飞行器的抗饱和姿态控制器设计   总被引:1,自引:0,他引:1  
针对只有两个舵的欠驱动再入飞行器,设计了具有抗饱和功能的姿态跟踪控制器.控制器的设计过程中,首先将姿态运动学与动力学模型分解成慢回路和欠驱动的快回路,然后分别针对快回路和慢回路设计了超扭曲滑模控制器和分层滑模控制器,最后通过仿真验证了该方法的有效性.  相似文献   

8.
为了使高超声速飞行器在再入过程中完成姿态控制,在反步法的基础上将模糊自适应和终端滑模控制相结合设计控制器。对于姿态角动态,使用反步法和模糊自适应设计虚拟控制律;而对于角速率动态,利用终端滑模方法设计控制器,能够有效提高系统鲁棒性。稳定性分析说明所提方法可以保证系统状态的一致渐进有界性。  相似文献   

9.
介绍了基于熵的改进粒子群算法在再入高超声速滑翔飞行器轨迹快速优化问题中的应用。首先给出再入轨迹优化问题模型,选取三自由度的再入运动模型,性能指标为航程最远,约束条件包括过载、动压、热流密度、攻角等过程约束以及速度、高度等终端约束,控制变量为攻角。其次,设计了用于求解再入轨迹优化问题的改进粒子群算法,引入编码熵和系统熵的概念,在种群产生和进化的过程中,通过不断调整编码熵和系统熵的关系,防止种群陷入局部最优解。最后通过仿真对算法进行了验证。仿真结果表明算法对初值不敏感,并且能很好的满足攻防两端在轨迹优化时对算法时效性的要求。  相似文献   

10.
为实现无人翼伞飞行器的直线航迹跟踪控制,提出了一种基于模拟对象的可变增益反步跟踪控制方法。基于模拟对象方法得到翼伞飞行器的航迹跟踪误差模型,并针对该模型设计了可变增益反步跟踪控制律,在保证稳定性的同时提高了系统的跟踪精度。将控制器应用于无人翼伞飞行器平面航迹跟踪控制中,仿真实验表明,所设计的控制器可以实现航迹的精确跟踪,且具有很好的鲁棒性。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号