首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 953 毫秒
1.
针对自主水下航行器协同导航系统水声通信延迟导致的定位误差增大问题,在因子图协同导航算法框架下提出一种基于量测信息重建的通信延迟补偿算法。首先,基于主从式协同导航系统状态方程、量测方程构建因子图模型。由于多个自主水下航行器距离量测信息导致因子图模型存在环结构,故通过两次消息传递迭代求解各节点变量概率密度分布。随后,在广播式水声通信延迟机理分析基础上进行量测信息重建,并将其接入因子图代替原始量测信息进行消息传递与解算,从而补偿水声通信延迟。仿真实验结果表明,所提算法可以有效提高从自主水下航行器定位精度,没有通信延迟补偿的协同导航算法定位精度与水声通信固定延迟呈反比,在水声通信固定延迟为10 s的条件下,所提算法相比没有通信延迟补偿的协同导航算法,定位精度可以提高82.57%。  相似文献   

2.
多AUV(Autonomous Underwater Vehicles)协同定位是多AUV协作系统研究的关键问题.通常在主从式协同定位中,主AUV内部装备高精度导航设备,从AUV内部装备低精度导航设备,主从AUV均装备水声通信装置.为了改善从AUV的导航定位精度,提出了利用主从AUV水声通信时间延迟测量二者之间的相对距...  相似文献   

3.
导航与定位技术是自主水下航行器(AUV)预设任务并安全返航的前提,由于水下环境的限制,目前广泛采用多系统组合导航的方式来实现AUV的准确定位。面向AUV的工况特点,详细介绍了水声测速系统、水声定位系统以及地球物理场辅助导航技术的特征与技术难点,分析了用于水下自主导航时多源组合导航方法的最新进展,随着相关测量仪器领域的研究进展,基于精确测量地球物理场特征的辅助导航技术成为具有极强竞争力的方案之一。多AUV协同导航方案同样适用于复杂的水下环境,被视为未来AUV导航技术重要发展方向。  相似文献   

4.
为了解决多个自主式水下无人航行器(AUV)在作曲线轨迹的航行时常规协同导航算法精度较低的难题,提出了一种基于极坐标的多AUV协同导航与定位算法.首先,将本算法的模型、可观测性与常规的直角坐标系算法进行了分析与对比.接着,进行了基于实航数据的数值仿真.针对解决各种传感器受异常噪声干扰导致多AUV协同定位误差变大的问题,本...  相似文献   

5.
针对自主式水下无人航行器(AUV)长时间潜航时的精确导航定位需求,以多波束测深系统为水下地形测量设备,提出一种基于贝叶斯估计的AUV水下地形匹配导航模型。针对贝叶斯滤波后验概率密度函数的求解问题,用高斯混合密度函数近似状态的后验概率密度函数,提出了基于高斯和粒子滤波的水下地形匹配导航方法。基于多波束测深数据的回放式仿真试验表明,提出的方法可以有效近似地形匹配的贝叶斯滤波模型,具有良好的实用性。  相似文献   

6.
针对多鱼雷协同导航存在的水声通信时滞问题,基于同步钟测距信息和时滞的通信信息,设计了状态无偏协方差一致最优准则下的估计滤波算法,可准确估算通信时滞下的测距新息方差,有效抑制通信时滞情况下鱼雷的位置误差增长,得到较精确的鱼雷位置信息。仿真结果证明,该算法在通信短时滞情况下可有效提高多鱼雷战术群的导航精度。  相似文献   

7.
水下航行器经常采用航位推算方式进行定位.由于存在传感器误差,航位推算的定位误差是随着时间发散的,而直接准确检测这类误差非常困难.对航位推算导航系统误差源进行分析与辨识,在此基础上推导出一种新的辨识AUV (Autonomous Underwater Vehicles)导航误差参数的方法,经实航试验结果表明,该算法能够准确辨识AUV导航误差参数向量,简单有效.  相似文献   

8.
针对水下载体在航行过程中由于旋转引起导航定位误差问题,对旋转航位推算导航系统进行误差分析,采用姿态四元数法推导了姿态误差方程,并提出将加速度计信号周期性变化提取的姿态角作为量测的姿态误差补偿方法,利用Sage-Husa自适应滤波器估计姿态误差并进行补偿,从而抑制陀螺漂移的影响.通过不同路径下的仿真研究,表明该算法能够提高单轴旋转航位推算系统姿态解算精度,在400 s时,姿态角精度可提高40%以上,定位精度提高49%.  相似文献   

9.
为了提高自主水下航行器组合导航系统的精度,选择了捷联式惯性导航系统(SINS)和多普勒速度声纳(DVL)导航为主、GPS卫星导航系统为辅的组合导航方法.通过Kalman滤波技术对组合导航的误差状态进行了估计,并采用反馈校正的方法修正SINS的导航误差.仿真结果表明SINS/DVL/GPS的组合导航可以有效地提高水下航行器SINS/DVL组合导航系统的导航精度,满足AUV远距离航行的精度需求.  相似文献   

10.
用最近邻理论研究了基于移动长基线的多AUV协同导航.移动长基线多AUV协同导航结构中,主AUV内部装备高精度导航设备,从AUV内部装备低精度导航设备,外部均装备水声装置测量相对位置关系,利用协同导航融合内部和外部传感器信息,实现从AUV进行实时导航定位.基于最近邻理论,建立了双伪测量的数学模型,设计了协同导航算法,进行了数学仿真研究.研究结果表明,在双领航者结构下,通过构建双伪测量可以显著提高群体的导航定位精度.  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号