首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
导航卫星广播星历参数拟合算法研究   总被引:5,自引:2,他引:3       下载免费PDF全文
基于GPS广播星历参数,研究了导航卫星广播星历参数的非线性最小二乘拟合算法,并推导了相应的计算公式.针对静止轨道卫星轨道倾角近似为0,致使卫星轨道的升交点定义模糊,在数据拟合过程中会导致法矩阵(HTH)奇异的问题,提出对卫星轨道进行轨道倾角变换拟合广播星历参数的方法,并获得较高的拟合精度.最后利用实际算例验证了所推公式和算法的合理性.  相似文献   

2.
针对北斗GEO用户算法需要进行5°倾角的坐标旋转处理这一过程,提出了采用经典广播星历参数用户算法直接解算北斗GEO卫星位置的改进方法,并同时给出了相应的基于第二类无奇点根数的广播星历拟合算法。该算法采用第二类无奇点轨道根数代替经典轨道根数,解决了由GEO轨道的小倾角特性引起的经典广播星历参数拟合过程中法化矩阵奇异的问题。从而避免了北斗GEO用户算法中坐标旋转处理过程,减少了GEO用户算法的计算步骤。仿真表明,提出的改进方法在卫星轨道拟合过程中与原算法精度相当;在卫星轨道外推过程中与原算法相比略有精度损失,但仍满足用户导航定位精度的需求。采用实际北斗GEO星历解算的轨道数据验证了改进算法的有效性。  相似文献   

3.
针对北斗GEO用户算法需要进行5?倾角的坐标旋转处理这一过程,本文提出了采用经典广播星历参数用户算法直接解算北斗GEO卫星位置的改进方法,并同时给出了相应的基于第二类无奇点根数的广播星历拟合算法。该算法采用第二类无奇点轨道根数代替经典轨道根数,解决了由GEO轨道的小倾角特性引起的经典广播星历参数拟合过程中法化矩阵奇异的问题。从而避免了北斗GEO用户算法中坐标旋转处理过程,减少了GEO用户算法的计算步骤。经过仿真验证,本文提出的改进方法在卫星轨道拟合过程中与原算法精度相当;在卫星轨道外推过程中与原算法相比略有精度损失,但仍满足用户导航定位精度的需求。最后,采用实际北斗GEO星历解算的轨道数据验证了改进算法的有效性。  相似文献   

4.
针对GNSS导航信号模拟源中卫星轨道计算的高精度实时性要求,提出了一种基于Powell最优化理论的卫星轨道拟合算法。该算法将有限点卫星位置拟合问题转化为无约束极小值问题,使用最优化理论求解卫星轨道模型参数,从而可以方便计算任意时刻的卫星速度、加速度等高阶量。算例结果表明计算卫星星历时,位置误差小于1×10-4m,速度误差小于1×10-6m/s,计算量为广播星历直接计算的1/3;计算精密星历时,位置精度在2cm左右,拟合精度较拉格朗日插值算法提高了大约1倍。通过实际应用,充分验证了算法的有效性。  相似文献   

5.
GEO导航星广播星历拟合改进算法设计   总被引:5,自引:1,他引:4       下载免费PDF全文
设计了倾角较小的GEO导航星的广播星历拟合算法。该方法的核心思想是在常规拟合算法的基础上对位置观测量进行合理的坐标系参考平面旋转,特别是提出针对拟合迭代初值进行相应的坐标变换,从而既可以解决轨道参数拟合的相关性问题,使轨道参数拟合快速收敛,同时又兼顾了用户接收机的计算简便化。通过仿真验证,该方法简洁有效,拟合中误差RMS在厘米量级,能够保证拟合精度。  相似文献   

6.
针对GNSS导航信号模拟源中多星座轨道计算实时性问题,从计算效率、精度等角度分析和对比了牛顿多项式和埃尔米特多项式插值算法的性能,通过对牛顿插值的加“窗”改进,使得卫星位置、速度的插值精度显著提高.算例结果表明,该方法能够在等间距时间点上多个卫星位置已知、速度未知的条件下,高精度实时地内插出卫星的位置和速度,其中卫星位置插值精度为mm级,速度插值精度小于1e-5 m/s,计算量为广播星历直接计算的1/7,位置和速度的拟合精度均优于三阶埃尔米特插值结果.  相似文献   

7.
基于X射线脉冲星的Halo轨道卫星自主导航和控轨   总被引:1,自引:0,他引:1  
讨论x射线脉冲星自主导航(X—raypulsar-basedautonomousnavigation,XNAV)技术应用于halo轨道卫星的可行性。给出halo轨道卫星的6维状态方程和基于x射线脉冲星导航的6维观测方程,对用x射线脉冲星导航和小推力方法控轨后的日地系第一平动点halo轨道卫星进行了数值模拟。结果表明:在现有的测量精度下,可以将卫星保持在标准轨道附近。最后对实验参数数值的选择给出了相应的分析讨论。  相似文献   

8.
分析基于北斗卫星导航系统(BeiDou satellite navigation System, BDS)的低轨卫星编队相对轨道确定问题,但由于缺乏实测数据,通过仿真实验展开研究。结果表明,500 km空域平均可视BDS卫星数约为9.7,由于地球静止轨道(GeoStationary earth Orbit,GEO)卫星和倾斜地球同步轨道(Inclined GeoSynchronous earth Orbit,IGSO)卫星的存在,亚太地区的可视BDS卫星数明显偏多。仅考虑观测噪声的影响时,基于BDS的相对定轨精度可达0.74 mm,加入星历误差的影响,对近距离编队系统的相对定轨而言,GEO卫星数米的星历误差可以忽略,但当星间距离增大到约200 km时,GEO卫星单差后的星历误差可达厘米量级,GEO+IGSO+中圆地球轨道(Medium Earth Orbit,MEO)卫星和IGSO+MEO卫星求解的相对轨道精度分别为1.09 mm和0.96 mm,GEO卫星的加入使得精度下降了13.54%。在其余误差得到有效处理后,BDS的相对定轨精度可达亚毫米量级,且无明显区域差异,GEO卫星和IGSO卫星能提高近距离编队系统的全球相对定轨精度,未来BDS将广泛应用于低轨卫星编队相对轨道确定。  相似文献   

9.
基于武汉大学发布的精密星历,计算2013年1月至2015年9月北斗广播星历的轨道、钟差和空间信号测距误差,并对其进行统计分析评估。结果表明:北斗卫星的径向精度总体上优于0.7 m、法向精度总体上优于1.4 m,且无明显的长期变化趋势;在切向精度上,倾斜地球同步轨道和中轨道优于2.1 m,高轨道的切向精度已从14 m左右提升至8 m左右;北斗高轨道、倾斜地球同步轨道、中轨道的钟差精度分别为6.3 ns, 4.7 ns, 4.3 ns;所有卫星的钟差精度总体上优于6 ns;所有卫星的空间信号误差精度总体上优于2 m,从长期来看,中轨道卫星的空间信号误差精度较为稳定;倾斜地球同步轨道和高轨道卫星的空间信号误差精度存在一定的波动。  相似文献   

10.
全球卫星导航系统在自主导航工作模式下,为了保持星座系统的稳定,保证系统的完好性,需要对故障卫星进行及时可靠的隔离。因此提出一种基于星间链路的全球卫星导航系统(GNSS)自主完好性隔离算法,分析全球卫星导航系统故障判别方式,设计了基于星间链路的故障隔离流程,提出了基于星间测距误差和判别的故障检测及隔离算法。仿真结果表明,基于星间链路的GNSS自主完好性隔离算法,可以有效隔离故障卫星,保持星座自主导航精度,并且算法实现复杂度较小,易于工程实现。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号