首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
为了满足远距离海底探测对发射信号大功率的需求,选用了一种大功率可控硅开关功率放大器。在临界换流状态、自然换流状态和强迫换流状态三种工作状态下,分析了该功率放大器的工作原理,并建立了等效电路模型。运用OrCAD仿真了临界换流状态时的等效电路模型;在自然换流状态和强迫换流状态下,为获得功放电流值和负载电流值,对其等效电路模型分别建立了非线性数学模型,并通过MATLAB和VC 采用四阶Runge-Kutta法对非线性数学模型进行求解。以上方法能够求得该功率放大器电路在任意时刻、任意点处的电流电压值,能较客观、真实地反映电路的工作状况,对工程应用具有一定的参考价值。  相似文献   

2.
由于滤波器带宽的限制和高功率放大器(HPA)的非线性效应,使恒包络导航信号产生失真,这将引起导航信号载波跟踪时锁相环(PLL)跟踪性能的恶化。针对这个问题,建立了星上高功率放大器非线性失真的一般模型,并推导了HPA的非线性效应引起PLL跟踪抖动的表达式,然后仿真分析了不同信号体制、不同滤波器带宽和不同功率放大器模型下的PLL跟踪抖动性能。  相似文献   

3.
为解决临界导通模式(CRM)LCL谐振结构后接整流桥引入的等效电感计算较为困难的问题,提出了一种交流侧接临界导通模式LCL谐振变换器的整流电路功率因数计算方法。首先,在分析CRM LCL谐振变换器下整流桥的工作状态的基础上,采用微分方程建立了LCL谐振变换器的输入电压、电流的数学模型,并利用LCL谐振变换器并联谐振电容的基波电压值对其实际电压值进行了近似处理;然后,对所提出的方法进行了实验验证。实验结果表明:所提方法可以较为准确地计算交流侧接临界导通模式LCL谐振变换器时整流电路的功率因数。  相似文献   

4.
悬浮系统控制技术是EMS型磁浮列车的关键技术之一。针对悬浮系统的非线性特征,设计了一种非线性悬浮控制器。在合理假设的基础上,建立了EMS型磁浮列车悬浮系统的非线性数学模型;通过反馈线性化将该非线性模型精确线性化,得到等价的线性模型,采用状态反馈的方法设计了非线性控制器。仿真结果表明,该非线性控制器的控制性能明显优于传统的局部近似线性化方法设计的控制器,对间隙干扰和负载干扰具有鲁棒性。  相似文献   

5.
为了解决单相大功率变流器和非线性负载给舰船电力系统带来的三相不平衡问题,首先分析了一种基于船用新型平衡变压器接线的谐波抑制系统,采用两个背靠背式运行的单相变流器实现实时谐波和无功补偿;然后,分析了谐波抑制系统的主电路结构,阐述了谐波抑制系统有功功率交换、无功功率补偿及谐波抑制原理;最后,利用Matlab建立了谐波抑制系统的仿真模型,对阻性负载和非线性负载两种工况下谐波及无功电流的补偿能力进行了仿真。仿真结果验证了该系统的正确性和有效性。  相似文献   

6.
为了建立电子管FU-100F的仿真模型,首先在选取合适的经验公式的基础上,结合该电子管的测试曲线,采用数值拟合的方法确定了经验公式中的参数;然后,按射频电源对于功率放大器的要求,使用电子管FU-100F设计了一个电子管功率放大器;最后,对功率放大器电路进行了仿真验证。结果表明:该功率放大器输出功率约为1kW,符合设计指标要求。  相似文献   

7.
提出以双六边形环为单元结构的电路模拟吸波材料。根据单元的双频特性建立等效电路模型,根据六边形环周期分布规律提出等效周期概念,给出等效分布电参数的计算方法。利用该模型对双六边形环电路模拟吸波材料的结构进行参数分析,并与HFSS全波分析结果进行对比,验证该方法的准确性。加工样品和实测,结果发现所设计吸波材料在1.9~8.9 GHz频段内对正入射波具有良好的吸波特性,实测结果与等效电路模型仿真结果吻合较好,进一步验证了该方法的有效性。  相似文献   

8.
文中运用传热学理论,用电模拟法建立了FECL100K24线陶瓷扁平封装组件在强迫风冷条件下的等效热路,并在此基础上推算出其热传递数学模型,为电子计算机辅助热设计提供了基础。文中还运用所建立的等效热路和数学模型,对该组件在电子设备中安装形式的合理性进行了论证。  相似文献   

9.
为研究满足水下观测节点用电需求的电能转换电路,区别于以往采用电感作为储能与能量传递模块的电能转换电路,以库克电路为基础,提出了一种采用电容作为储能与能量转换介质的恒流/恒流转换电路,其负载的能量完全由电容进行供给.基于状态空间法对该电路的工作原理进行了分析,运用saber软件建立了仿真模型,并搭建实际电路进行了实验验证...  相似文献   

10.
铅酸蓄电池等效电路模型研究   总被引:4,自引:0,他引:4  
随着电动汽车等技术不断发展,铅酸蓄电池的应用领域不断扩大。数学模型是铅酸蓄电池 研制和应用中重要的研究工具。概括总结了铅酸蓄电池建模方面所取得的一些成果,并着重讨论了等效 电路模型。同时,也在铅酸蓄电池等效电路模型的研究方向和研究方法上作了一些探索。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号