共查询到19条相似文献,搜索用时 62 毫秒
1.
2.
提出采用小偏量线性化运动学模型构成制导回路优化广义比例导引中的待定制导参数,同文[1]的准二维小偏量线性化运动学模型不同,采用的线化运动学模型更为真实地反映了导弹-目标间的运动特性。采用这种模型的好处是最优制导参数不仅能保证制导回路的稳定,而且使得回路的响应特性最佳,脱靶量最小。 相似文献
3.
利用自适应动态规划算法,研究了带有扰动的导弹自动驾驶仪系统的鲁棒最优控制问题.首先,设计了非线性扰动观测器估计系统中的未知扰动;接着,考虑一类积分滑模面,根据扰动观测器的输出,设计积分滑模控制器,使得系统沿着滑模面进入滑动模态运动;然后,针对等效滑动模态系统,设计带有新权值更新律的评价网络,利用自适应动态规划技术自适应学习最优控制律,通过Lyapunov方法证明了闭环系统的稳定性和权值估计值的收敛性;最后,运用导弹自动驾驶仪系统验证了算法的可行性和有效性. 相似文献
4.
神经网络在空空导弹自动驾驶仪中的应用 总被引:1,自引:0,他引:1
研究了神经网络模型预测控制在导弹自动驾驶仪中的应用.针对导弹飞行动态的不确定性和非线性,采用了近年发展起来的神经网络控制,在模型未知的情况下,有效地实现了导弹的飞行控制.并应用MATLAB进行论证,显示了神经网络控制方法在空空导弹应用上的广泛性. 相似文献
5.
研究了自适应模糊H∞控制在导弹自动驾驶仪中的应用.针对导弹飞行动态的非线性和不确定性,采用了近年来发展起来的自适应模糊控制,并结合H∞控制技术,在模型未知的情况下,有效地实现了导弹的飞行控制.另外,在状态不可测的情况下,利用高增益观测器,实现了导弹的输出反馈控制.提出的控制器不但对模型不确定具有鲁棒性,而且对具有不同飞行动态的导弹有很强的通用性. 相似文献
6.
7.
8.
预见学习的微分对策导引律研究 总被引:1,自引:0,他引:1
根据日益复杂的空战格局以及基于微分对策理论设计的空空导弹导引律所存在的缺陷与不足,提出了基于预见学习算法的微分对策导引律改进方案.首先讨论了微分对策导引律的缺陷,并针对其不足研究了基于最优控制理论的预见学习方法;其次设计了基于CMAC(小脑关节模型)的预见学习运算过程,将其应用于空空导弹预见逃逸目标的未来逃逸轨迹,并令导弹据此进行最优决策实现预见学习制导;最后根据逃逸目标飞行轨迹的恶意性突防程度,总结专家经验,将预见学习与微分对策相结合实现优势互补,形成了基于预见学习的微分对策导引律.其仿真结果较经典导引律有明显的优势,能以较小的控制量、较短的拦截时间获得很小的脱靶量,尤其适合拦截具有大机动恶意突防行为的目标. 相似文献
9.
10.
11.
12.
介绍并评述了海湾战争使用的精确制导弹药,对三代红外制导、两代红外成像制导、三代反坦克导弹,以及末敏弹和末制导炮弹的发展,作比较详细和系统的综述;最后介绍采用复合制导体制的末制导炮弹。 相似文献
13.
14.
15.
测控设备对飞行目标进行跟踪及测量时,高跟踪精度测控设备捕获目标较为困难,一般采用低跟踪精度设备引导天线接近目标,然后再转入自跟踪模式,因此同站测控设备互引导是目标捕获的一个重要手段。针对低跟踪精度测控设备引导高跟踪精度设备的技术需求,文中提出了一种在两套测控设备共视目标时,利用高精度设备跟踪信息来对低精度设备跟踪数据进行实时修正的算法。该算法实现了跟踪残差的实时估计和外推,提高了同站引导精度。最后采用遥测设备引导光电经纬仪进行实验,验证后发现修正后的遥测设备跟踪数据能够引导光电经纬仪有效的捕获目标。 相似文献
16.
Ya Lin Fanqi Meng Tao Zeng Qinghua Zhang Zhongqiang Wang Yankun Cheng Xiaoning Zhao Lin Gu Haiyang Xu Yichun Liu 《Advanced functional materials》2023,33(35):2302787
Direct observation of oxygen dynamics in an oxide-based second-order memristor can provide the valid evidence to clarify the memristive mechanism, however, which is still limited for now. In this study, the migration and diffusion of oxygen ions in the region of Pt/WO3-x Schottky interface are observed in the WO3-x second-order memristor by using the technique of in situ transmission electron microscopy (TEM) and the electron energy loss spectroscopy. Interestingly, the coexistence of memristive and memcapacitive switching can be implemented in this memristor. Combined with the analysis of depth-profile X-ray photoelectron spectroscopy (XPS), an interface-barrier-modulation second-order memristive model is proposed based on the above results. Notably, temporally correlative oxygen dynamics in the memristor offers the platform to integrate signals from multiple inputs, enabling the realization of the dendritic functions of synchronous and asynchronous integration for the application of logic operations with fault-tolerance capability and associative learning. These findings provide the experimental evidence to in-depth understanding of oxygen dynamics and switching mechanism in second-order memristor, which can support the optimization of memristive performance and the achievement of biorealistic synaptic functions. 相似文献
17.
无线本地环路系统是近年来兴起的接入系统之一,它具有许多脂一系统所没有的优点。本文提出了一种新型的无线本地环路系统,它将一点多址技术和DECT无绳电话技术有地结合在一起,以全无线方式数字化地实现了整个用户环路,它针本地环路的特点,有效地降低系统成本,在我国有很好的应用前景。 相似文献
18.
19.
Wireless local area networks (LANs) are vulnerable to malicious attacks due to their shared medium in unlicensed frequency
spectrum, thus requiring security features for a variety of applications even at the cost of quality of service (QoS). However,
there is very little work on investigating to what extent system performance is affected by security configurations with respect
to mobility scenarios, heterogeneous networks, and different applications. In order to exploit the full potential of existing
security solutions, we present a detailed experimental study to demonstrate the impacts of security features on performance
by integrating cross-layer security protocols in a wireless LAN testbed with IP mobility. We introduce a quality of protection (QoP) model to indicate the benefits of security protocols and then measure the performance cost of security protocols in terms
of authentication time, cryptographic overhead and throughput. Our measurements demonstrate that the effects of security protocols
on QoS parameters span a wide range; for example, authentication time is between 0.11 and 6.28 s, which can potentially affect
packet loss dramatically. We also find that for the same security protocol throughput in non-roaming scenarios can be up to
two times higher than that in roaming scenarios. However, some protocols are robust against mobility with little variation
in system performance; thus, it is possible to provision steady service by choosing security protocols when users’ mobility
pattern is unknown. Furthermore, we provide observations on cross-layer security protocols and suggestions to the design of
future security protocols for real-time services in wireless LANs.
相似文献
Wenye WangEmail: |