您当前的位置:首页?>?期刊摘要?>?中英文摘要

2016年第6期

时间:2016-06-12 13:33:05??来源:??作者:

?dFZag8879环亚手机|首页主页

周恺,王艳,纪志成
(江南大学电气自动化研究所,江苏无锡 214122
摘要:虽然相比较粒子群算法而言,量子粒子群优化算法有着更好的性能,但其仍然面临因过早收敛而陷入局部最优的问题。因此尝试将量子粒子群算法与蝙蝠算法相混合,一方面利用蝙蝠算法中的随机游走策略来避免过早地陷入局部最优,另一方面学习蝙蝠算法中发声速度的变化方式来改变量子粒子群算法中的因子。将所提算法与粒子群优化算法和量子粒子群优化算法经过5个标准测试函数和一个实际模具车间的调度模型的仿真验证,并与粒子群算法和量子粒子群算法进行对比,仿真结果表明了该算法在求解连续型问题和离散型问题的有效性和优越性。
关键词:蝙蝠算法;量子粒子群算法;调度优化;模具车间
中图分类号:TP391.9??? ???文献标识码:A??? ???文章编号:1004-731X (2016) 06-15-1247-09
Hybrid quantum-behaved particle swarm optimization algorithm for solving mould job shop scheduling problem
Zhou Kai, Wang Yan, Ji Zhicheng
(Institute of Electrical Automation, Jiangnan University, Wuxi 214122, China)
Abstract:Quantum-behaved particle swarm optimization has better performance compared with particle swarm optimization, but it still has the problem of getting trapped into local optimum with premature convergence. According to the above problem, a hybrid algorithm included quantum-behaved particle swarm optimization and bat algorithm was proposed. On the one hand, the random walk strategy of bat algorithm was used to avoid getting into local optimum, on the other hand, the speed changing of bats’ sound was learned to transform the factor of quantum-behaved particle swarm optimization. The proposed algorithm was tested on five benchmark functions and a mould job shop scheduling example, compared with PSO (Particle Swarm Optimization) and QPSO (Quantum-Behaved Particle Swarm Optimization). The simulated experimental results indicate the validity and superiority of the hybrid algorithm.
Keywords: bat algorithm; quantum-behaved particle swarm optimization; scheduling optimization; mould job shop
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
基于2D重构特征的模型化视觉伺服方法研究
张国亮,杜吉祥,王展妮,王田
(华侨大学计算机科学与技术学院,厦门 361021
摘要:针对传统基于图像的视觉伺服在处理摄像机退化等方面存在的不足,研究了融合三维特征与二维特征的图像视觉伺服方法。通过在经典IBVS(Image based visual servoing)控制结构基础上,将二维图像特征重构为三维特征,建立了模型化的3D特征机器人视觉伺服控制模型,并通过Simulink等仿真工具,分析比较了2种方法在图像空间和笛卡尔空间的空间运动特性,试验结果证实了方法的可行性和有效性。
关键词:机器人视觉伺服;摄像机退化;IBVS;特征重构
中图分类号:TP242????? 文献标识码:A??? ???文章编号:1004-731X (2016) 06-1255-07
Study on Model-based Visual Servoing with Reconstructed 2D Features
Zhang Guoliang, Du Jixiang, Wang Zhanni, Wang Tian
(Computer Science and Technology Institute, Huaqiao University, Xiamen 361021, China)
Abstract: To overcome the defect of camera retreat in image based visual servoing, a model-based visual servoing incorporated 2D image based visual servoing with 3D features was proposed. The robot visual servoing model was established by altering traditional two dimensional feature to three dimensional features based on traditional IBVS control structure. Furthermore, combined with the Simulink software, simulation model was established and motion characteristics of two methods were analyzed and compared in image space and Cartesian space. The experiment results confirm the feasibility and effectiveness of the proposed method.
Keywords: robot visual servoing; camera retreat; image based visual servoing; feature reconstruction
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
Stochastic Kriging for Random Simulation Metamodeling with Known Uncertainty
Wang Bo1,2, Gea Haechang2, Bai Junqiang3, Zhang Yudong1, Gong Jian1, Zhang Weimin1
(1. Research and Development Center, China Academy of Aerospace Aerodynamics, Beijing 100074, China; dFZag8879环亚手机|首页主页
2. Department of Mechanical and Aerospace Engineering, Rutgers, The State University of New Jersey, Piscataway, NJ 08854, USA; dFZag8879环亚手机|首页主页
3. School of Aeronautics, Northwestern Polytechnical University of China, Xi’an 710072, China)
Abstract: Uncertainty-based design has been widely carried out these years. In order to deal with the problems with large amount of calculation, a stochastic kriging for random simulation metamodeling with known uncertainty was derived, which firstly included intrinsic uncertainty in metamodel initial formulation to fully account for inputs uncertainty, and then incorporated the correlationships of intrinsic uncertainty among all observed points. Several examples with known uncertainty were also conducted, in which the proposed method shows much better variance predictions than other similar methods. Simulation results show the proposed method is a more general form of kriging, which can also widely deal with the uncertainty-based problems with heterogeneous variances as a stochastic metamodel.
Keywords: stochastic problems; uncertainty estimation; metamodeling; kriging method
考虑已知不确定性的随机Kriging建模方法
王波1,2Haechang Gea2,白俊强3,张玉东1,宫建1,张卫民1
(1. 中国航天空气动力技术研究院研发中心,北京 100074;2. 新泽西州立大学机械宇航学院,新泽西,Piscataway 08854;3. 西北工业大学航空学院,西安 710072)
摘要:近年来考虑不确定性的设计引起了各领域越来越多的关注。为了解决不确定性研究中计算量大的问题,构建了针对已知不确定性问题的随机Kriging模型,所建立模型通过将固有不确定性假设引入随机Kriging模型最初问题的构建和固有不确定性相关性的推导,以充分考虑输入变量的随机性因素。三个基础算例被用来测试所构建模型相对于已有随机Kriging建模方法的优势,结果显示本文所构建随机Kriging模型是相比确定性的Kriging理论更具通用性的方法,适用于对各非均等已知不确定性问题的预测,解决了已有模型无法得到可信估计方差的问题。
关键词:随机问题;不确定性估计;代理模型;Kriging方法
中图分类号:TP391.9?? ????文献标识码:A??? ??文章编号:1004-731X (2016) 06-1261-12
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
基于平均跳距和位置优化的改进DV-Hop定位算法
赵芝璞,吴栋,王艳,纪志成
(江南大学电气自动化研究所,江苏 无锡 214122
摘要:针对DV-Hop算法在定位过程中因存在平均每跳距离误差大以及误差累积而导致定位精度不高的问题,提出了基于无线传感器网络的改进DV-Hop定位算法。该算法对接收的多个锚节点的跳距进行加权求和来减少平均每跳距离的误差,并且利用改进的最小二乘方法来解决误差累积的问题。通过MATLAB对改进的DV-Hop算法进行仿真,实验结果表明,相比于传统的DV-Hop算法、加权最小二乘的DV-Hop算法和基于RSSI每跳分级和跳距修正的算法,改进的算法在距离估计和定位精度方面有了很大的提高。
关键词:无线传感器网络;DV-Hop算法;节点定位;距离估计;最小二乘
中图分类号:TP393?? ????文献标识码:A??? ????文章编号:1004-731X (2016) 06-1273-08
improved DV-Hop localization algorithm based on average hopping distance and position optimization
Zhao Zhipu, Wu Dong, Wang Yan, Ji Zhicheng
(Institute of Electrical Automation, Jiangnan University, Wuxi 214122, China)
Abstract: To overcome the low positioning accuracy caused by the imprecise estimated distance and the accumulative location error, an improved DV-Hop localization algorithm based on Wireless Sensor Network was proposed. This method, taking the summation of the beacon node average jump distance based on the weighted error correction as its average distance, was used to reduce the average jump distance error. Besides, an improved least square method was used to process the accumulative location error. The simulation results show that the improved localization algorithm performs greatly better, both in distance estimation and positioning accuracy, than the traditional DV-Hop localization algorithm, DV-Hop algorithm of weighted least squares and the improved DV-HOP positioning algorithm based on one-hop subdivision and average hopping distance modification.
Keywords: wireless sensor networks; DV-Hop algorithm; node localization; distance estimation; least square method
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
基于粒子滤波节点选择的协同跟踪
陈莹,程雪雪
(江南大学物联网工程学院,江苏 无锡 214000)
摘要:针对视频传感网中的目标协同跟踪问题,基于粒子滤波提出一种新的节点选择协同目标跟踪方法。采用粒子滤波解决目标跟踪问题获到目标的后验概率密度分布,并得到节点的信息熵估计,以此评价节点对目标状态估计的不确定性;通过背景建模和相除法完成目标斑点的有效提取,计算斑点所占像素数用来目衡量节点捕捉目标信息的能力;基于以上这两个因素确定节点的置信度,比较置信度大小来实现优化节点选择并进行粒子滤波目标协同跟踪。实验结果表明,与同类方法相比,该算法能够有效提高目标跟踪精度,实现相机节点的选择分配,完成节点间协同跟踪。
关键词:节点选择;协同跟踪;斑点提取;粒子滤波;置信度;信息熵
中图分类号:TP391??? ???文献标识码:A?????? 文章编号:1004-731X (2016) 06-1281-08
Node Selection of Collaborative Tracking Based on Particle Filter
Chen Ying, Cheng Xuexue
(School of IoT Engineering, Jiangnan University, Wuxi 214000, China)
Abstract: Due to the problem of target tracking in video sensor networks, a new algorithm was proposed for cooperative monitoring and tracking of node selection based on particle filter. The method obtained posterior distribution through particle filtering in tracking problem and got the information entropy to evaluate the estimate uncertainty. Background modeling and the phase division were applied to extract target blob, and pixels number of the target blob was calculated to measure detection information. Confidence measure of nodes was determined based on the two factors to realize the optimization of the selected node and then track by particle filter. Experiment results show that the proposed method can effectively improve the tracking accuracy in comparison with the similar method, which selects camera nodes to achieve.
Keywords: node selection; cooperative tracking; blob extraction; particle filter; confidence measure; information entropy
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
主次用户传输冲突下认知系统感知时间优化
陈松,郑娜娥,王盛
(解放军信息工程大学导航与空天目标工程学院,河南 郑州 450001
摘要:考虑在认知无线电系统中,次用户正确检测的情况下,主用户与次用户发生传输冲突的情况。引入排队论思想,以M/M/1模型描述主用户的出现模式,在此基础上,综合考虑传输时长、检测概率以及传输冲突等情况,构建频谱利用率与传输时间长度的函数关系式,并通过理论推导证明了,满足一定条件下,传输时间的定义域内频谱利用率的最大值点存在。通过仿真对最大值的存在情况进行了验证,并通过分析发现,仿真所设条件下,传输冲突所带来的频谱利用率损失大于20%,应在系统设计过程中予以充分考虑。
关键词:认知无线电;频谱感知;感知时间;传输冲突
中图分类号:TN929.5????? 文献标识码:A?????? 文章编号:1004-731X (2016) 06-1289-07
Optimization Sensing Slot under Transmission Collision of Primary User and Secondary User in Cognitive Radio System
Chen Song, Zheng Nae, Wang Sheng
(School of Navigation and Aerospace Object Engineering, Information Engineering University, Zhengzhou 450001, China)
Abstract:In the cognitive radio system, that the primary user (PU) has collision with the secondary user (SU) when the secondary user (SU) was detected properly was considered. The queuing theory was introduced and the PU’s appearance pattern was described by M/M/1 model. Considering the length of the transmitting slot, detection probability and transmitting collision, the function of spectrum usage and transmitting time were established based on the PU’s appearance pattern. The existence of the maximum value of spectrum usage in the definition domain of the transmitting time was proved by theoretical derivation in some condition. The simulation results provide support to the existence of the maximum value. Furthermore, the loss of spectrum usage caused by transmitting collision is more than 20%, which should be considered during the system design procedure.
Keywords: cognitive radio; spectrum sensing; sensing period; transmission collision
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
基于禁忌混沌萤火虫算法的感应电机参数辨识
徐晓杨,王艳,纪志成
(江南大学电气自动化研究所,江苏 无锡 214122
摘要:针对传统感应电机参数辨识方法中存在的可辨识参数少、辨识精度低等缺陷,提出了一种禁忌混沌萤火虫算法对感应电机参数进行辨识。该方法能够同时辨识定子电阻、定子电感、转子时间常数和漏感,且对辨识参数没有严苛的先验要求。为了提高参数的辨识精度,改进了算法吸引度公式并融入混沌理论和禁忌搜索的思想以克服萤火虫算法收敛精度低、易于陷入局部最优的不足。仿真表明,相较于其他3种算法,该算法具有较强的稳定性和较好的收敛精度,并能在不同转速和负载的情况下,以较短时间将辨识参数收敛到真实值附近,具有实用性。
关键词:感应电机;多参数辨识;萤火虫算法;混沌;禁忌搜索
中图分类号:TM346??? ???文献标识码:A??? ???文章编号:1004-731X (2016) 06-1296-10
Parameter Identification of Induction Motor Based on Tabu-chaotic Firefly Algorithm
Xu Xiaoyang, Wang Yan, Ji Zhicheng
(Institute of Electrical Automation, Jiangnan University, Wuxi 214122, China)
Abstract: In order to overcome the defects of traditional induction motor parameter identification methods such as identifying less parameters simultaneously and Low identification accuracy. A multi-parameters identification method based on Tabu-chaoticFireflyAlgorithm was proposed. The proposed method can simultaneously identify the stator resistance, stator inductance, rotor time constant and mutual inductance without prior knowledge about the parameters. For the sake of improving the identification accuracy, the formula of attractiveness in original FireflyAlgorithm was adjusted, furthermore chaos theory and the idea of Tabu Search was integrated into the algorithm. Simulatied experimental results demonstrate that compared to the other three algorithms, the proposed algorithm has good stability and convergence in the process of parameter identification and can identify the parameters accurately at different speeds and loads for a short time.
Keywords: induction motor; multi-parameters identification; firefly algorithm; chaos; tabu search
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
基于最小熵聚类的多模型在线辨识及仿真
赵小鹏1,章永春2
(1.华北电力大学,北京 102206;2.中国信息通信研究院,北京 100191)
摘要:针对存在随机噪声干扰的多变量非线性系统,提出一种基于最小熵聚类的多模型在线辨识算法。通过最小熵模糊减聚类算法在线确定多模型中子模型个数及其相应隶属度权值,达到了在聚类过程中同时考虑系统规则程度的目的。给出了求取子模型参数的加权最小二乘递推表达,实现了子模型参数的在线辨识。以烟气余热利用有机朗肯循环(ORC)系统为例进行了仿真研究,结果表明该方法不仅能够获得精确可靠的辨识结果,而且对环境的不确定干扰有较强的自适应能力。
关键词:多模型;非线性;最小熵;在线辨识
中图分类号:TP27?? ????文献标识码:A??? ???文章编号:1004-731X (2016) 06-1306-07
Online Identification and Simulation of Multiple Model Based on Minimum Entropy Clustering
Zhao Xiaopeng1, Zhang Yongchun2
(1. School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China;dFZag8879环亚手机|首页主页
2. China Academy of Information and Communications Technology, Beijing 100191, China)
Abstract: An online identification algorithm for multiple model based on minimum entropy clustering was investigated. The number of local models and corresponding weights was calculated by the entropy based fuzzy subtractive clustering approach, and the regularity degree of the local system was considered along with the clustering process. Parameters of local models could be estimated online by the weighted recursive least square method. The waste heat recovery Organic Rankine Cycles system was used to demonstrate the algorithm. The result shows the identified multi-model not only can reach an accuracy and reliability identification result, but also has a stronger self-adaptability for uncertain external disturbances.
Keywords: multiple model; nonlinear; minimum entropy; online identification
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
炮射子母弹毁伤概率近似计算数学模型研究
王兆胜
(南京炮兵学院自行火炮系,江苏 南京 211132)
摘要:炮射子母弹子弹散布幅员远大于单个目标毁伤幅员。为提高计算效率及便于子弹的最佳散布范围和子母弹最有利火力分配方法研究,用概率分析的方法建立了单发射击和以相同诸元发射若干发弹时相关射击炮射子母弹对小尺寸矩形目标和圆形目标毁伤概率近似计算数学模型;讨论了仿真计算的方法;推导了对小尺寸矩形目标和圆形目标射击炮射子母弹最佳散布范围。给出了对矩形目标和圆形目标毁伤概率的算例。子母弹毁伤概率近似计算数学模型便于理论研究,便于计算,与精确模型相比两者毁伤概率的计算结果相差很小。
关键词:炮射子母弹;单发射击;相关射击;毁伤概率;仿真计算
中图分类号:TJ015?? ????文献标识码:A?????? 文章编号:1004-731X (2016) 06-1312-09
Research on Mathematical Models of Damage Probability Approximate Computation of Cargo Projectile
Wang Zhaosheng
(Department of Self-Propelled Gun, Nanjing Artillery Academy, Nanjing 211132, China)
Abstract: The scatter size of the bomblet of cargo projectile is large by comparison with the casualty producing area of single target. In order to promote computational efficiency, and to study optimum spread area of cargo projectile and the most advantageous fire distribution conveniently, mathematical models of damage probability approximate computation of cargo projectile on small rectangular target and circular target with single-shot fire, and correlation fire that firing is on identical data were established by probability analysis. The simulation method was discussed. The optimal dispersion areas were put out according the approximate computation model of single-shot fire. Examples to calculate the damage probability of on rectangular target and circular target were shown. The mathematical models of approximate computation is convenient for theoretical study, and it can be easily calculated, compared with the accuracy model, the difference of both model on damage probability calculation is small.
Keywords: cargo projectile; single-shot fire; correlation fire; damage probability; simulation calculation
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
复杂外形导弹出水过程空化流数值计算研究
张重先,李向林,刘玉秋
(中国航天科工二院,北京 100854)
摘要:提出了一种基于Zwart-Gerber-Belamri空化模型的复杂外形潜射导弹空化流数值计算方法。分析了出水速度及攻角对弹体各部件空泡的影响。结果表明,出水过程初期空化数降低使附体空泡迅速扩大,随后空泡脱落与振荡的影响将更为显着;零攻角出水时,随出水速度上升,肩空泡长度及厚度呈线性增长,突起物诱导临近弹体空化能力增强,舵空化变化不显着。5°攻角以下,攻角对肩空化非对称性及舵空化的影响较小;10°攻角时肩空化不对称性显现,舵空化面积迅速增大;20°攻角以内,攻角变化对突起物空化的影响不显着。
关键词:潜射导弹;空化流;出水过程;空泡动力学
中图分类号:TJ762.4??? ???文献标识码:A?????? 文章编号:1004-731X (2016) 06-1321-08
Numerical Investigation of Water-exit Cavity Flow of Missile with Complex Configuration
Zhang Chongxian, Li Xianglin, Liu Yuqiu
(The Second Academy of CASIC, Beijing 100854)
Abstract: Based on Zwart-Gerber-Belamri cavitation model, a numerical calculation method of cavitating flow of water-exit missile with complex configuration was proposed. The influence of velocity of water-exit and angle of attack to cavitation of parts of missile was analyzed. The simulation results showed that in the beginning of water-exit course, body-attached bubble quickly grew due to reduction of cavitation number. After that, the effect of bubble break-off and oscillation became more obvious. In water-exit course of zero angle of attack, the length and thickness of bubble of shoulder increased linearly with velocity. The ability of the protrusion to induce the cavitation of nearby missile body was enhanced with the increase of velocity. The influence of the cavitation of the rudder by velocity was not significant. On the other hand, the influence of angle of attack on the asymmetry of the bubble of shoulder and the cavitation of the rudder was small when attack angle is less than 5°. The asymmetry of the bubble of shoulder was notable when attack angle increased to 10°. As well as the cavitation area of rudder was increasing rapidly. The influence of the angle of attack on the cavitation of the protrusion was not significant when attack angle was less than 20°.
Keywords: submarine-launched missile; cavitation flow; water-exit course; bubble dynamics
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
方位连续旋转垂直发射飞行器仿真方法研究
刘成生1,张卿2
(1. 92941部队93分队,辽宁 葫芦岛 125001;2. 北京机电工程研究所,北京 100074)
摘要:在分析三轴仿真转台模拟方位可连续旋转的垂直发射飞行器姿态运动缺陷的基础上,提出一种能够模拟飞行器俯仰、滚动姿态不小于±180°变化范围并且航向姿态变化无限大的四轴仿真转台方案,进行四轴转台结构布局分析和控制建模,并设计基于切换运动机制的四轴协调运行控制规律,完成转台控制过程中的平滑切换措施设计及仿真验证。证明了四轴仿真转台及其协调运行控制方案,为方位连续旋转的垂直发射飞行器全程飞行姿态运动的模拟提供了一种连续、实时、高效的仿真方法。
关键词:垂直发射;四轴仿真转台;切换运动机制;协调运行控制规律
中图分类号:V448.22????? 文献标识码:A?????? 文章编号:1004-731X (2016) 06-1329-08
Method of Hardware-in-the-Loop (HWIL) Simulation for Pose Movement of Vertical Launching Aerocraft With Continuous Rotation in Yaw
Liu Chengsheng1, Zhang Qing2
(1.Unit 92941 of PLA, Huludao 125001, China; 2.Beijing Electro-Mechanical Engineering Institute, Beijing 100074, China)
Abstract: There are defects in the pose movement simulation of vertical launching aerocraft which can circumrotate continuously in yaw with three -axis flight motion simulator. Based on analysis of these defects, a four-axis project which could be applied to the situation of the changing range of vehicle pitch pose and vehicle roll attitude more than ±180° and the changing range of vehicle course pose towards infinite greatness was proposed. The structure of the four-axis flight motion simulator was analyzed and the control model was made. Above all, a four-axis concerted control law was designed with" switching movement mechanism", and a smooth switch measure in the control process of flight motion simulator was designed too, then the result was validated with simulation. A continuous, real-time and high-efficient simulation method for the pose movement of vertical launching aerocraft which could circumrotate continuously in yaw was confirmed.
Keywords: vertical launching; four-axis flight motion simulator; switching movement mechanism; concerted control law
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
基于空间和时间密度的入侵报警聚合研究
张靖,王衡军,李俊全,郁滨
(解放军信息工程大学,河南 郑州 450004)
摘要:针对分布式入侵检测系统在实际应用中存在大量重复报警和高误报率的问题,在研究DBSCAN算法的基础上,引入时间密度,提出一种基于空间和时间密度的抗噪声聚合算法(DBS&TCAN)。基于空间密度聚合局部报警信息和时间密度对局部聚合结果进行合并,可以有效减少重复报警并降低误报率。实验采用数据集测试的方法对算法进行了测试,并与相关研究工作进行比较和分析。结果表明,该算法具有较好的聚合效果,并在实时性方面体现出优势
关键词:入侵检测系统;报警聚合;时间密度;DBSCAN;DBS&TCAN;实时性
中图分类号:TP393.08??? ???文献标识码:A?????? 文章编号:1004-731X (2016) 06-1336-08
Research of Intrusion Alert Aggregation Based on Spatial and Temporal Density
Zhang Jing, Wang Hengjun, Li Junquan, Yu Bin
(PLA Information Engineering University, Zhengzhou 450004, China)
Abstract: Distributed Intrusion Detection System has created the problem to investigate a mass of duplicate alerts and high false positive rate in practical applications. Based on DBSCAN, density based spatial and temporal clustering of applications with noise (DBS&TCAN) algorithm was proposed by introducing temporal density. The approach aggregated partial alerts based on spatial density, and merges partial aggregation on the basis of temporal density. The effectiveness of the algorithm was demonstrated by the intrusion detection evaluation dataset. The comparative experiments and analysis show that the algorithm is effective in alert aggregation and gives better results in terms of real time.
Keywords: Intrusion detection system; alert aggregation; temporal density; DBSCAN; DBS&TCAN; real time
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
基于动态卫星云图的机载气象雷达视觉仿真方法
张军
(江南大学数字媒体学院,江苏 无锡 214122)
摘要:针对飞行模拟器中机内航电设备显示画面仿真需求,提出一种基于动态卫星云图的大范围航空气象条件实时仿真算法,并进一步构建出基于虚拟气象数据的快速气象雷达回波显示画面的仿真方法。该方法利用二维简化纳维-斯托克斯方程及云微物理方程作为气象条件仿真核心数值计算模型,将复杂的大范围三维云场演化、风场重建和雷达波后向散射等物理过程仿真计算简化为二维图像处理问题。实际应用表明,方法可在普通PC平台上实时向飞行模拟器输出视觉逼真的机载气象雷达设备的动态显示画面。
关键词:机载气象雷达;航空气象;飞行模拟器;视觉仿真;风场重建
中图分类号:TP391.9??????文献标识码:A?????? 文章编号:1004-731X (2016) 06-1344-07
Airborne Weather Radar Visual Simulation Based-on Dynamic Satellite Cloud Image
Zhang Jun
(School of Digital Media, Jiangnan University, Wuxi 214122, China)
Abstract: A real-time simulation algorithm was proposed to generate a wide range of the common aviation weather condition for the flight simulator based-on a set of dynamic satellite cloud images. With this efficient weather simulation algorithm, a fast radar echo visual simulating method was proposed. The proposed method used the 2D simplified Navier-Stokes and microphysics equations to implement the essential numerical simulation of the aviation weather condition. By this way, the complex problem of large-scale cloud resolving and particle-backscattering computing could be viewed as a simple 2D multi-resolution image processing. Real application on the flight simulator shows that the proposed method can provide a vividly visual airborne weather radar display in real-time on a normal PC platform.
Keywords: airborne weather radar; aviation weather; flight simulation; visual emulation; wind field reconstruction
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
临近空间非弹道式目标跟踪滤波算法研究
曹亚杰1,2,李君龙2,秦雷2
(1.95899部队,北京 100085;2.航天科工集团二院二部,北京 100854)
摘要:近些年来各国在临近空间高超声速飞行器领域有了迅猛发展,其中以X-51A和HTV-2高超声速飞行器飞行试验相继成功为代表,它们多采用非弹道式机动飞行方式,其运动轨迹往往呈现出“跳跃”特征,因此存在非弹道式目标加速度估计与轨迹跟踪预报难的问题。分析了临近空间目标4种典型的非弹道式机动模式,对目标弹道方程及跟踪滤波器设计进行了深入讨论,应用4种跟踪滤波方法对高超声速目标加速度进行估计并仿真。仿真结果得出针对以上4种非弹道式机动模式粒子滤波算法的优势明显该算法保证了目标跟踪精度在允许范围之内,并验证了该算法的有效性。
关键词:非弹道式;临近空间;机动模式;跟踪滤波
中图分类号:TJ765.1?? ????文献标识码:A??? ???文章编号:1004-731X (2016) 06-1351-08
Study on Tracking Filter Algorithms for Nonballistic Targets in Near Space
Cao Yajie1,2, Li Junlong2, Qin Lei2
(1. Unit 95899 PLA, Beijing 100085, China;dFZag8879环亚手机|首页主页
2. The Second System Design Department of the Second Research Academy of CASIC, Beijing 100854, China)
Abstract: Recently, different countries made rapid developments in the field of hypersonic aircraft in near space. The successful flight tests of hypersonic aircraft X-51A and HTV-2 were representative.They adopted the way of nonballistic maneuver flight whose motion trajectory was characterized by “hopping”, which existed the problems of difficulties of nonballistic target acceleration estimation, trajectory tracking and prediction. Four typical nonballistic maneuver models of near space targets of tracking filter are introducedand then target ballistic equation and design of tracking filter are introduced. At last, an estimation of four tracking filter ways is maken towards target acceleration. The effect of particle filter algorithm is the best which compares four nonballistic maneuver models with Matlab simulation results. The algorithms guarantees the target tracking accuracy within the allowable range, validity of the algorithm is verified with Matlab simulation results. This is important to the research of tracking nonballistic near space targers.
Keywords: nonballistic; near space; maneuver mode; tracking filter
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
装备体系对抗仿真本体元建模方法研究
张申,徐豪华,王精业
(装甲兵工程学院装备指挥与管理系,北京 100072)
摘要:针对装备体系对抗仿真模型要求高、建模难度大的问题,提出了本体元建模方法。通过抽象分析装备体系对抗的特征,得到其基本概念集合:功能单元、作战单位、作战行动、作战事件和作战环境,自然映射为由UOPEE(unit 单元、organization组织、proceeding行动、event事件和environment环境)构成、具有完备性和可组合性的装备体系对抗元模型集,采用UML的形式描述方法建立UOPEE形式化描述模型体系框架,采用基于组件方法的设计和实现了UOPEE的计算机模型框架。该方法通过本体映射和元模型集,使装备体系对抗模型易于映射和有效集成,经实践检验,可有效降低建模难度和减少建模工作量。
关键词:装备体系对抗;本体;元模型;建模方法
中图分类号:TP391.9??? ????文献标识码:A?????? 文章编号:1004-731X (2016) 06-1359-07
Research on Ontology-meta Modeling Method for Equipments SOS (System of System) Combat Simulation
Zhang Shen, Xu Haohua, Wang Jingye
(Simulation Center of The Academy of Armored Forces Engineering, Beijing 100072, China)
Abstract: Aiming at the strict standard and difficulties of equipments SOS combat simulation modeling, anontology-meta modeling method was put forward. Based on the analysis of equipments SOS combat, the basic notional units were abstracted:function unit, combat organize, combat maneuver, combat event, and combat environment, and the units mapping into UOPEE (unit, organization, proceeding, event and environment) which was a maturity and combined models collect, then constituted the descriptive UOPEE architecture with the UML method, obtaining the cyber-model architecture based on component designing and realizing method. This method makes the equipments SOS combat model easy to mapping and integration with the help of the units mapping and modeling unit. According to the practice, this method can reduce the difficulties and work in modeling.
Keywords: equipments SOS combat; ontology; meta model; modeling method
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
一种低功耗蓝牙DoS攻击检测方案
王启林,黄一才,郁滨
(解放军信息工程大学,河南 郑州 450000)
摘要:针对低功耗蓝牙面临DoS攻击威胁的问题,结合熵理论,建立了活跃度模型,依据此模型设计了低功耗蓝牙DoS攻击检测方案,该方案选取多因素构造活跃量,活跃量在正常通信中会呈现稳定的分布规律,当受到DoS攻击时,这种分布规律遭到破坏。用活跃度反映活跃量的分布规律,并通过分析活跃度的变化实现对DoS攻击行为的检测。理论分析与实验结果表明,该方案能有效检测通信中的DoS攻击,同时具有较小的存储和计算开销,适合应用于低功耗蓝牙中。
关键词:低功耗蓝牙;DoS攻击检测;活跃量;活跃度
中图分类号:TP309.1????? 文献标识码:A?????? 文章编号:1004-731X (2016) 06-1365-07
Scheme for Detecting DoS Attack in Bluetooth Low Energy
Wang Qilin, Huang Yicai, Yu Bin
(PLA Information Engineering University, Zhengzhou 450000, China)
Abstract: Aiming at the problem that Bluetooth Low Energy is vulnerable to DoS Attack, an alive degree model combining entropy theory was established. Bluetooth Low Energy DoS Attack detecting scheme based on this model was designed. The scheme chose some elements to construct alive volume, which showed the stable distribution in normal communications, and the distribution was destroyed when subjected to DoS attacks. Using alive degree to reflect the distribution of alive volume, the DoS Attack was detected via the variation of alive degree. The theory analysis and experiment results show that, the scheme can effectively detect the DoS Attack in the communication with low storage and calculation overhead, which is suited for Bluetooth Low Energy.
Keywords: Bluetooth Low Energy; DoS Attack detecting; alive volume; alive degree
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
基于分层模型的图像快速融合方法研究
魏利胜,张平改
(安徽工程大学电气工程学院,芜湖 241000
摘要:针对多聚焦图像融合时间较长、融合效果较差的问题,提出一种分层模型的图像融合方法。首先,根据源图像模糊区域分布情况选取恰当的网格数以得出融合模型,并计算源图像所对应模块的灰度方差值,以决定区域子模块的层次划分,从而得到最佳融合区域;在此基础上,利用加权平均法解决不同模块边缘区域的不连续性,实现多聚焦图像的快速融合。最后,仿真结果验证了所提出方法的有效性与可行性。
关键词:分层模型;多聚焦图像;快速融合;方差值
中图分类号:TH85+5??????文献标识码:A??? ???文章编号:1004-731X (2016) 06-1372-08
Fast Fusion Method for Multi-focus Image Based on Hierarchical Model
Wei Lisheng, Zhang Pinggai
(School of Electrical Engineering, Anhui Polytechnic University, Wuhu 241000, China)
Abstract: The issue of hierarchical model for multi-focus image fusion was proposed to improve the visual effect and real-time performance. According to the ambiguous zones of source image, the appropriate grid value was selected and the fusion model was proposed. By using fuzzy logic method and threshold segmentation, the gray variance values of the corresponding block were calculated and the hierarchical classification of sub-block was given to achieve the best fusion zones. Based on these, the weighted mean method was proposed to smooth the discontinuity of different block marginal area. These guaranteed the real-time performance of image fusion. The simulation verifies the feasibility and effectiveness of the proposed theoretical results.
Keywords: hierarchical model; multi-focus image; fast fusion; variance values
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
仿生眼注视转移运动控制策略研究
王晓慧1,2,马昕1,秦斌1,李贻斌1
(1.山东大学控制科学与工程学院,济南 250061;2.青岛大学应用技术学院,青岛 266101)
摘要:对目标在双目水平平面上深度非对称的注视点转移任务,提出了一种基于注视点水平方向转移幅度的分段式头眼协调控制策略,并建立了注视转移运动控制模型。水平方向注视转移幅度小于头部运动阈值,眼球做扫视-异向运动;水平方向注视转移幅度大于头部运动阈值且小于眼球转动的饱和阈值时头眼协调运动;当水平方向注视转移幅度大于眼球转动饱和阈值时,头部先运动使目标处于眼球运动可达范围,再进行头眼协调运动完成注视转移。仿真实验证实了方案可行性和有效性,适用于仿生眼双目水平平面上视线切换。
关键词:仿生眼;注视点转移;头眼协调;运动控制模型
中图分类号:TP391.9?? ????文献标识码:A?????? 文章编号:1004-731X (2016) 06-1380-07
Control Strategy of Bionic Eyes Movement in Gaze Shifts
Wang Xiaohui1,2, Ma Xin1, Qin Bin1, Li Yibin1
(1. School of Control Science and Engineering, Shandong University, Jinan 250061, China;dFZag8879环亚手机|首页主页
2. School of Applied technology, Qingdao University, Qingdao 266101, China)
Abstract: For the gaze shifts with asymmetrical depth in the horizontal plane of bionic eyes, a piecewise control strategy of eye-head coordinative motion was proposed according to the amplitude of gaze shifts, and the motion model of bionic eyes was developed. When the amplitude of gaze shifts is smaller than the head movement threshold, the eyes move only by saccade-vergence. When the amplitude is larger than the head movement threshold and smaller than the saturation threshold of eye movement with head at rest, gaze shifts are accomplished with eye-head coordinative movements. When the amplitude is larger than the saturation threshold, the head first moves to the saturation threshold of eye movement with head at rest, then eyes and head movement are controlled by eye-head coordinative control method. The simulation results show that control strategy proposed can accurately and effectively control gaze shifts in the horizontal plane of bionic eyes.
Keywords: bionic eye; gaze shifts; head-eye coordination; motion-control model
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
基于多特征组合与优化BoW模型的影像分类技术研究
李科1,游雄1,杜琳1,2
(1. 信息工程大学,郑州 450052;2. 72515部队,济南 250014)
摘要:提出一种基于多特征组合与优化BoW模型的影像地物分类新方法。提取影像的SIFTGIST、颜色、CensusGabor等多种类型特征,通过实验分析确定最佳特征组合。针对一般K-Means算法没有考虑各个特征值的权重,提出利用自动加权k-Means算法计算不同特征分量的权值,分别对SIFTGISTGabor特征构建了基于权重的影像特征词汇表,采用基于Soft的词汇编码算法进行影像编码,使用SVM算法完成影像分类。通过实验表明方法能有效提高遥感影像分类准确性,并且具有较好的稳定性和鲁棒性。
关键词:特征组合;K-means;视觉词袋;支持向量机
中图分类号:P237.3?? ????文献标识码:A?????? 文章编号:1004-731X (2016) 06-1386-08
Research of Remote Sensing Image Classification Technology Based on Multi-feature Combining and BoW Model
Li Ke1, You Xiong1, Du Lin1,2
(1. The Information Engineering University, Zhengzhou 450052, China; 2. Troop 72515, PLA, Jinan 250014, China)
Abstract: A new algorithm of image classification of multi feature combination and BoW model was proposed. SIFT, GIST, Census and Gabor color, and many other types of features were extracted from the images, and then through the experimental analysis to determine the best feature combination. According to the general K-means algorithm which did not consider the weight of each features, different feature component was put forward by using automatic weighted k-means algorithm, respectively SIFT, GIST, Gabor feature construct weights based on image features of vocabulary, using the soft coding algorithm for image coding, and using the SVM algorithm to complete the image classification. Experiments show that this method can effectively improve the classification accuracy of images.
Keywords: multi-feature combining; k-means; bag of words; SVM
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
直升机飞行模拟器视景显示系统的研究
刘长发,张俊杰
(北京蓝天航空科技有限责任公司,北京 100085)
摘要:为提高视景显示系统在直升机模拟器中的显示效果,增强设备的可安装性和维护性,此系统以某型并座式座舱直升机有研究对象,从光路设计、球幕设计、投影器支持和遮挡结构设计、几何校正和边缘融合设计进行深入分析。研究论述了从理论上分析论证的光路设计方法,充分考虑到结构的实用性和通用性的球幕设计方法,一体化设计的投影器支撑和遮挡结构,以及具有独特几何参考系统的几何校正实现方法。此研究方法经过实际项目应用验证,在满足各项技术指标的前提下,视场设计合理,结构便于安装运输,设备便于维护,是一套侧重于实际应用的视景解决方案。
关键词:直升机飞行模拟器;光路设计;投影器支持和遮挡结构;几何参考系统
中图分类号:TP391.9?? ????文献标识码:A??? ???文章编号:1004-731X (2016) 06-1394-06
Research on Visual Display System of Helicopter Flight Simulator
Liu Zhangfa, Zhang Junjie
(Beijing Bluesky Aviation Technology Co., Ltd, Beijing 100085, China)
Abstract: In order to improve the effect of visual display system in helicopter simulator system, and to enhanc the installation and maintenance of equipment, the method is based on x-type side-cabin helicopter, studying from optical design, dome design, projection support and shelter design, geometry correction and edge blending design. Research was discussed from a theoretical analysis of optical design method, taking fully into account the practicality and versatility of the structure of the dome design, integrated projectors support and shade structures, as well as the unique geometric correction method of geometric reference system. This method was validated by actual project application, on the premise of meeting the various technical indicators, depending on the design, transport of structure is easy to install and easy to maintain, focusing on practical application of visual solution.
Keywords: helicopter flight simulator; optical design; projection support and shelter structure; geometric reference system
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
USB安全连接方案设计与实现
赵松银,郁滨
(信息工程大学,河南 郑州 450000)
摘要:针对当前安全防护方案在应对USB硬件木马、BadUSB、总线窃听等新型攻击技术方面的不足,设计了一种与设备种类无关的USB安全连接方案。方案通过扩展标准设备请求,在USB连接建立过程中由集线器驱动程序与USB设备框架驱动进行双向认证与密钥协商,在数据传输过程中由USB总线驱动与USB设备框架驱动对I/O请求进行过滤加解密,实现了独立于设备种类的USB接入与传输安全。实验结果表明,方案可为信息系统构建安全封闭的USB连接,解决因USB接口引入的安全隐患
关键词:USB;硬件木马;BadUSB;窃听攻击;集线器;驱动
中图分类号:TP309.1????? 文献标识码:A?????? 文章编号:1004-731X (2016) 06-1400-06
Design and Implementation of Secure USB Connection
Zhao Songyin, Yu Bin
(Information Engineering University, Zhengzhou 450000, China)
Abstract: Aiming at the deficiency of present secure solutions countering USB-based Hardware Trojan Horse, BadUSB, bus wiretapping and other new attack technologies, a secure connection scheme applying to any USB device was proposed. In scheme, mutual authentication and key exchange were implemented by extending the standard device request in the hub driver and USB device framework driver to prevent the creation of malicious USB connection. Meanwhile, all the data transferred of the created USB connection would be filter encrypted by USB bus driver and USB device framework driver to rebel the monitor of bus. The experiment results show that the proposed scheme can be used to build secure sealing USB connection for an information system, solving the secure threats introduced by USB interface.
Keywords: USB; hardware trojan; BadUSB; wiretapping attack; hub; driver
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
基于游戏模式的行人横穿道路技能辅助训练系统研究
王梅亮1,万华根2,顾键萍1
(1. 丽水学院,浙江 丽水 323000;2. 浙江大学,浙江 杭州 310000)
摘要:随着我国家庭汽车拥有量快速增长,道路交通事故也越来越多,行人无疑成为这些事故的最大受害者。因而开发一套可以提高行人处理交通流综合信息的能力,减少行人因危险穿越道路而引发交通事故的训练系统具有十分重要意义。利用虚拟现实和三维游戏技术,在重点研究构建动态虚拟交通场景、人机交互和虚拟物体碰撞检测等关键技术的基础上,设计和开发基于游戏模式的行人横穿道路技能辅助训练系统可以为人们提供一种不仅可以身临其境般地体验复杂交通环境,又可以寓教于乐地学习交通技能的有效方法和训练平台。系统特别适合儿童和少年使用。
关键词:教育游戏;虚拟现实;横穿道路;技能训练;仿真系统
中图分类号:TP.391.9????? 文献标识码:A?????? 文章编号:1004-731X (2016) 06-1406-07
Research on Pedestrian Crossing Road Skills Assist Training System Based on Game Model
Wang Meiliang1, Wan Huagen2, Gu Jianping1
(1. Lishui University, Lishui 323000, China; 2. Zhejiang University, Hangzhou 310000, China)
Abstract: With the rapid growth of number of family cars in China, there are more and more road accidents, so pedestrians will undoubtedly become the biggest victims in the accidents. Thus it is of great significance to develop a road training system that is able to improve the ability of the pedestrians to process the integrated information of the traffic flow, and reduce the risk of pedestrian in accidents when crossing the roads. Based on the key researches on dynamic virtual traffic scene, human-computer interaction and virtual objects collision detection, with the application of technology of virtual reality and 3 d games, a game model training system was designed and developed, in which the player could not only experience the virtual complex traffic environment, but also learn traffic skills effectively on the funny game platform. The system is especially designed for children and teenagers.
Keywords: educational games; virtual reality; cross the roads; skills training; simulation system
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
基于哈希链的BLE密钥协商方案设计
黄艺波,黄一才,郁滨
(解放军信息工程大学,河南 郑州 450004)
摘要:针对低功耗蓝牙安全简单配对协议易受到窃听攻击和中间人攻击的问题,将哈希链引入低功耗蓝牙配对过程,提出了一种基于哈希链的低功耗蓝牙密钥协商方案。该方案利用哈希链的单向性和抗碰撞性实现了设备间的双向认证及链路密钥协商,同时设计哈希链更新机制,防止哈希链节点值的重复使用所带来的安全威胁。BAN逻辑安全性分析和实验结果表明,方案具有较好的安全特性,能够有效抵御窃听、中间人等攻击,同时具有较小的存储和计算开销。
关键词:低功耗蓝牙;哈希链;密钥协商;窃听攻击;中间人攻击
中图分类号:TP309.1??????文献标识码:A?????? 文章编号:1004-731X (2016) 06-1412-08
Design of BLE Key Agreement Scheme Based on Hash Chain
Huang Yibo, Huang Yicai, Yu Bin
(PLA Information Engineering University, Zhengzhou 450004, China)
Abstract: Aiming at the problem that BLE Secure Simple Pairing protocol is vulnerable to eavesdropping and man-in-the-middle attacks, a BLE key agreement scheme based on hash chain was proposed. The scheme realized mutual authentication and link key agreement applying the unidirectivity and crashworthiness of hash chain.Update mechanism of the hash chain was designed to prevent from reuse of hash chain node values. The security analysis of BAN logic and experiment results show that, the scheme can effectively resist eavesdropping and man-in-the-middle attacks. Meanwhile, it has low storage and computation overheads.
Keywords: BLE; hash chain; key agreement; eavesdropping attack; man-in-the-middle attack
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
T型丁坝对90°弯道水力特性影响的大涡模拟研究
魏文礼,李盼盼,邵世鹏,刘玉玲
(西安理工大学水利水电学院,西安 710048)
摘要:为了解决实际河流弯道中水流对凹岸冲刷严重而凸岸泥沙淤积的问题,有必要对弯道中布设了丁坝后的水力特性进行研究。采用气液两相流大涡模型模拟90°弯道明渠增设了丁坝后的水流水力特性。通过比较弯道纵向流速模拟值与试验值,结果吻合较好,得出大涡模型是模拟弯道水流水力特性的有效方法;通过分析弯道处水平面和不同弯转角度横断面的流速和流场分布规律,得出弯道环流的流态特征,即靠近凸岸的近底面处较凹岸近水面处存在较大的二次流强度;在弯道中布设丁坝后可有有效的消除弯道环流T形丁坝无论是在改善弯道水流流态方面还是在自身安全性上都有更大的优越性。,而且
关键词:弯道水流;丁坝;横向环流;大涡模型
中图分类号:TV133????? 文献标识码:A??? ???文章编号:1004-731X (2016) 06-1419-07
Study on Effects of T-Spur-Dikes on Flow Characteristics in 90° Bend Channel by Large Eddy Simulation
Wei Wenli, Li Panpan, Shao Shipeng, Liu Yuling
(Institute of Hydraulic Engineering, Xian University of Technology, Xi’an 710048, China)
Abstract:In order to solve the problems of river erosion at concave bank and of sediment deposition at convex bank in actual bend rivers, the 3D hydraulic characteristics of bend channel with spur-dikes must be studied. The gas-liquid two-phase large eddy model was used to numerically simulate the hydraulic characteristics of flow in a 90° bend channel with a spur-dike. Comparisons of the simulated longitudinal velocity with the experimental data show a good agreement, which indicates that the large eddy model is an effective way to study the hydraulic characteristics of bend channels. The analysis of the distribution of velocity and flow fields on different horizontal plans, and on cross-sections of different bending angles, shows that the intensity of circulation near the concave bank is larger than that near the convex bank as a result of the secondary flow, and also shows that the spur-dike can effectively eliminate the circulation in the bend channel, and that the T-shaped groin has more advantages of improving the flow patterns of bend channels and of its own security.
Keywords: bend flow;spur dike; transverse circulation; large eddy model
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
航空器穿越低空风切变区仿真研究与实现
苏志刚1,2,陈琦1,郝敬堂1
(1.中国民航大学中欧航空工程师学院,天津 300300;2.中国民航大学智能信号与图像处理天津市重点实验室,天津 300300)
摘要:低空风切变严重影响航空器进离场安全,采用模拟飞行系统方案可以分析低空风切变对航空器起飞与降落的影响,对空器穿越风暴区域的安全规避航策略制定具有重要意义。系统利用Fluent软件进行低空风切变区域的风速场模拟,并以开源飞行模拟器FlightGear作为航空器仿真平台。系统利用FlightGearUDP(User Datagram Protocol)接口引入风场数据,研究风切变区域对航空器飞行状态的影响。模拟系统可以方便地模拟不同航空器在起飞与降落过程中穿越风切变区域的情况,也可以进行比较、分析不同强度风暴核对飞行安全的影响。
关键词:航行安全;风切变;飞行模拟;用户数据报协议接口
中图分类号:V328.1??? ???文献标识码:A??? ???文章编号:1004-731X (2016) 06-1426-06
Research and Implementation of Simulation for Aircraft Crossing the Low-Level Wind Shear Area
Su Zhigang1,2, Chen Qi1, Hao Jingtang1
(1. Sino-European Institute of Aviation Engineering, Civil Aviation University of China, Tianjin 300300, China;dFZag8879环亚手机|首页主页
2. Tianjin Key Laboratory for Advanced Signal Processing, Civil Aviation University of China, Tianjin 300300, China)
Abstract: Low-level wind shear seriously affects the safety of approach and departure of flights, the flight simulation system is utilized for analyzing low-level wind shear influences on aircraft take-off and landing, which is of great significance for seeking the safety circumvention strategy of aircraft crossing the core of the storm. With software, Fluent, the system simulated the regional wind field of low-level wind shear, and utilized the open source flight simulator, FlightGear, as the aircraft simulation platform. The system sent the wind speed data as the input of system via UDP(User Datagram Protocol) interface and the influences on aircraft flight state was analyzed under the wind shear region. The simulation system can easily simulate the different aircrafts taking off and landing process through wind shear zone, and can also compare and analyze the influences of different intensity storms on the flight safety.
Keywords: navigation safety; wind shear; flight simulation; interface of user datagram protocol
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
水力加载器内部汽蚀数值模拟及失效分析
莫丽1,杨琪1,王玉梅2
(1.西南石油大学机电工程学院,成都 610500;2.上海海隆石油钻具有限公司,上海 200949
摘要:采用CFX软件,选用SST κ-ω模型及Rayleigh-Plesset空化模型对水力加载器进行了全流道三维定常汽液两相流的数值模拟,研究了进口流量、转速、叶片倾角对水力加载器内部汽蚀的影响规律。结果表明:在小流量工况、较大的叶片倾角(≥60°)及低转速(≤3 000 r/min)下汽蚀较轻;不同工况下,汽蚀出现在径向方向上的位置一致,主要分布在r/R=0.4~0.8,在r/R=0.6~0.7出现严重汽蚀。数值模拟的结果与水力加载器实际产生失效的情况相符,说明汽蚀破坏是其工作失效的一个主要原因
关键词:水力加载器;两相流;汽蚀;数值模拟;失效分析
中图分类号:TP391.9????? 文献标识码:A??? ???文章编号:1004-731X (2016) 06-1432-07
Numerical Simulation of Cavitation and Failure Analysis in Hydraulic Loader
Mo Li1, Yang Qi1, Wang Yumei2
(1. Departmentof Mechatronic Engineering, Southwest Petroleum University, Chengdu 610500, China;dFZag8879环亚手机|首页主页
2. Shanghai Hi-long Drill Pipe Co., Ltd. shanghai 200949, China)
Abstract: Using software CFX with SST κ-ω model and Rayleigh-Plesset cavitation model, the numerical simulation of 3-D steady flow with water liquid and water vapour two phases in whole flow passage of hydraulic loader was conducted. The influences of different parameters (inlet flow rate, rotational speed and blade angle) on cavitation of hydraulic loader were studied. The results show that, under small flow rate, large blade angle (≥60°) and low speed (≤3 000 r/min), cavitation is light. At different working conditions, where cavitation appears in radial direction of position is the same. The cavitation mainly distributes where the r/R is 0.4 to 0.8 and severe cavitation distributes where the r/R is 0.6~0.7. The results of numerical simulation are consistent with the actual failure of hydraulic loader. So the cavitation damage is a main reason for the failure of hydraulic loader.
Keywords: hydraulic loader; two-phase flow; cavitation; numerical simulation; failure analysis
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
一种完全恢复的(2,n)彩色视觉密码方案
张先环1,付正欣1,欧阳旦2,郁滨1
(1. 信息工程大学,河南 郑州 450000;2. 空军电子技术研究所,北京 100089)
摘要:基于异或运算,结合计算机显示技术的特点,提出了一种完全恢复的(2,n)彩色视觉密码方案。该方案以构造行向量为基础,设计了彩色秘密图像的分享算法,通过共享份异或并对得到的图像进行处理,完成秘密图像的恢复。实验结果表明,在保留视觉密码秘密恢复简单特点的基础上,方案以较低的像素扩展度为代价,能够实现秘密图像的完全恢复,每个参与者只需携带一个共享份,降低了共享份的管理难度。
关键词:视觉密码;彩色视觉密码;(2, n);异或运算;完全恢复
中图分类号:TP309.7?? ????文献标识码:A??? ???文章编号:1004-731X (2016) 06-1439-06
Perfect Recovery (2,n) Color Visual Cryptography Scheme
Zhang Xianhuan1, Fu Zhengxin1, Ouyang Dan2, Yu Bin1
(1. Information Engineering University, Zhengzhou 450000, China; 2. Institute of Electronic Technology, Beijing 100089, China)
Abstract: Based on XOR operation and combining the characteristic of computer display technology, a perfect recovery (2,n) color visual cryptography scheme was proposed. Sharing algorithm of color secret image was designed on the basis of constructing row vectors . Through computing shares by XOR operation and dealing with recovery image, the secret image was recovered. The experimental results show that the scheme on the basis of keeping the simplicity in the reconstruction phase of visual cryptography can realize the secret image perfect recovery with low pixel expansion for price. Each participant only needs to carry a share which reduces the difficulty of share management.
Keywords: visual cryptography; color visual cryptography; (2,n); XOR operation; perfect recovery
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
输流管道振动自适应控制算法鲁棒特性研究
陈兵,黄媛媛,尹忠俊
(北京科技大学机械工程学院,北京 100083
摘要:两端铰支输流管道在脉动内流下可能因参数共振而发生动态失稳。采用压电陶瓷片作为控制驱动器,以梁模型为基础,建立输流管道系统的受控数学模型。针对传统PID控制器对系统参数鲁棒性较差的缺点,由Lyapunov稳定性定理,设计了模型参考自适应(MRAC)控制器和基于PD增益自适应调节的MRAC控制器,不仅使管道振动在短时间内衰减至零,且使控制器对系统参数的鲁棒性较好。数值仿真验证了这2种自适应控制器的控制效果及其对系统参数的鲁棒性。结果表明:2种自适应控制器均能有效抑制管道振动且MRAC控制器效果更佳;2种自适应控制器对系统参数的鲁棒性均较好。
关键词:输流管道;振动控制;模型参考自适应控制;鲁棒性;仿真研究
中图分类号:O35;TE832????? 文献标识码:A??? ???文章编号:1004-731X (2016) 06-1445-08
Robustness Research for Adaptive Control Algorithms of Pipe Conveying Fluid Vibration
Chen Bing, Huang Yuanyuan, Yin Zhongjun
(School of Mechanical Engineering, University of Science & Technology Beijing, Beijing 100083, China)
Abstract: Pipes with supported ends may lose their dynamic stability due to parametric instability when they convey pulsating fluid. the piezoelectric actuators were taken as the control actuators, and built a controlling mathematical model of the pipeline system. Then aiming at the traditional PID controller’s poor robustness on pipeline system parameters, MRAC system and MRAC system based on adaptive gain of the PD were designed on the basis of Lyapunov stability theory, not only the vibration peak values of the pipeline system were suppressed in a short time, but also the controllers had better robustness on pipeline system parameters. Control effects of adaptive controllers were verified and robustness for pipeline system parameters of the controllers was analyzed by numerical simulation methods. Research results show that the vibration peak values of pipeline systems can be suppressed by adaptive controllers, but control effects of the MRAC controller are better than others; both of these two kinds of adaptive controllers have strong robustness on pipeline system parameters.
Keywords: pipe conveying fluid; vibration control; model reference adaptive control; robustness; simulation research
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
ZigBee网络Sybil攻击检测方案设计
黄美根1,郁滨1,孔志印2
(1.解放军信息工程大学,河南 郑州 450004;2.信息保障技术重点实验室,北京 100072)
摘要:针对ZigBee网络中Sybil攻击破坏资源分配、路由发现和数据融合等问题,提出一种Sybil攻击检测方案,该方案通过建立Sybil节点怀疑机制,标记处于相同地理位置的子节点以及通信距离与地理距离不一致的子节点;同时,设计Sybil节点识别流程,父节点联合合法邻居节点分别在不同信道上同时向疑似Sybil节点发送随机数,通过验证随机数的正确性来识别Sybil节点。安全性分析及实验结果表明,方案在有效检测Sybil攻击的同时,具有较小的通信开销和能量消耗。
关键词:ZigBee网络;Sybil攻击;疑似Sybil节点;地理位置;无线射频;父子关系
中图分类号:TP309.1?? ????文献标识码:A??? ???文章编号:1004-731X (2016) 06-1452-09
Sybil Attack Detection Scheme Design in ZigBee Network
Huang Meigen1, Yu Bin1, Kong Zhiyin2
(1. PLA Information Engineering University, Zhengzhou 450004, China;dFZag8879环亚手机|首页主页
2. Science and Technology on Information Assurance Laboratory, Beijing 100072, China)
Abstract: Aiming at the problem of Sybil which attacks and destroys the resource allocation, routing discovery and data aggregation in ZigBee network, a scheme to detect Sybil attacks was proposed. The scheme established a doubt mechanism of Sybil node to mark child nodes in the same location as well as communication distance inconsistent geographical distance. The scheme designed a identified processes of Sybil node via father joint legal neighboring nodes transmitting a random number to the suspected Sybil nodes on different channels simultaneously, identifying Sybil nodes by its correctness. Safety analysis and experiment results show that the proposed scheme has high accuracy detection rate with low communication overhead and energy consumption when confronting Sybil attack in ZigBee network.
Keywords: ZigBee network; Sybil attack; suspected Sybil node; geography position; wireless radio; parent-child relationship
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
集装箱码头机械配置仿真优化研究
段朝辉1,2,宋炳良1
(1. 上海海事大学经济管理学院,上海 201306;2. 上海国际港务(集团)股份有限公司,上海 200080)
摘要:基于Extendsim仿真软件建立了单船装卸作业模型,研究了在双目标(船舶装卸效率和机械使用效率均达到最大化)约束下的机械最优配比和离散状态下的桥吊效率配置优化问题。研究发现:通过实时记录方法研究最优机械配比问题更加直观和方便;双目标约束下的机械最优配比与单目标约束下的机械最优配比存在较大差异,前者得到结果更为合理;由于桥吊作业的离散化特征,仿真过程中对桥吊效率进行平均处理对结果影响较大,影响度随着桥吊效率离散程度的增大而增大。研究结果为集装箱码头机械配置决策提供了参考。
关键词:集装箱码头;机械配置;离散;仿真
中图分类号:U691+.5???? ??文献标识码:A?????? 文章编号:1004-731X (2016) 06-1461-08
Research on Simulation Optimization of Container Terminal’s Machinery Configuration
Duan Zhaohui1,2, Song Bingliang1
(1. School of Economics and Management, Shanghai Maritime University, Shanghai 201306, China;dFZag8879环亚手机|首页主页
2. Shanghai International Port (Group) Co., Ltd., Shanghai 200080, China)
Abstract: The optimization of the machinery allocation under the double constraints of maximized efficiency for loading and unloading processes and optimal machinery usage, and the optimal configuration of bridge cranes under discrete operation modes for a single ship were instigated through modeling with the simulation software Extendsim. It was found that the real-time recording method is a more straightforward and convenient way to investigate the optimal mechanical configuration and double constraints lead to different but more reasonable results than that was obtained under the single constraint on the best mechanical configuration. Due to the discrete characteristics of the bridge crane operation, the averaging treatment has an important influence on the efficiency and such impact becomes stronger with higher discreteness. This simulation work offers valuable references for machinery configuration of container terminals.
Keywords: container terminal; machinery configuration; discrete; simulation
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
基于铭牌数据结合PSO的异步电机参数辨识研究
王兴武1,2,王兵树1,2,张照彦1,2,刘志宾1
(1. 华北电力大学自动化系,河北 保定 071003;2. 保定华仿科技股份有限公司,河北 保定 071051)
摘要:提出基于电机铭牌参数结合粒子群优化算法(PSO)对电机等效电路参数辨识的新方法,有效解决了目前等效电路参数辨识法中存在的问题。在电机等效电路中引入杂散损耗等效电阻、机械损耗、滑环碳刷接触损耗,建立精确的电机等效电路;基于等效电路计算的电机参数和铭牌参数建立等效电路参数辨识优化模型,用PSO对优化模型求解,以较高的概率达到了优化目标。用辨识出的等效电路参数计算电机在不同转速下的电参数,并与实测值比较,验证了基于电机铭牌参数通过PSO优化方法辨识等效电路参数的有效性。
关键词:电机铭牌;粒子群优化算法;杂散损耗;滑环碳刷;优化模型
中图分类号:TM85??????文献标识码:A?????? 文章编号:1004-731X (2016) 06-1469-07
Research on Identification of Induction Motor Parameters Based on Nameplate Data and PSO
Wang Xingwu1,2, Wang Bingshu1,2, Zhang Zhaoyan1,2, Liu Zhibin1
(1. Department of Automation North China Electric Power University, Baoding 071003, China;dFZag8879环亚手机|首页主页
2. Baoding Simosimu Technology Co., Ltd., Baoding 071051, China)
Abstract: A new method was proposed based on motor nameplate and particle swarm optimization (PSO) for identification of motor equivalent circuit parameters. The method effectively solved to present problems of motor equivalent circuit parameters identification method. An accurate motor equivalent circuit was built by introducing an equivalent stray-loss resistance, mechanical loss, and slip loss of ring brushes for wound motor. An identification optimization model of equivalent circuit was established based on motor nameplate parameters and motor equivalent circuit’s calculating parameters. Solving optimization model with PSO was achieved a higher probability optimization goals. The motor electrical parameters were calculatd at different speeds with the equivalent circuit identified parameters and compared with the measured values. Experimental results show that proposed parameter identification method based on motor nameplate parameters and combining PSO optimization method is effective.
Keywords: motor nameplate; PSO; stray loss; slip ring brushes; optimization model
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
移动平台上个性化对联辅助生成
沈伟华1,张世程2,王顺婷2,潘志庚2
(1. 丽水学院,丽水 323000;2. 杭州师范大学数字媒体与人机交互研究中心,杭州 310013
摘要:楹联文化是中国传统文化的结晶,也是中国语言的瑰宝。鉴于移动智能终端用户群体的广泛性,为了继承和发扬中国传统文化,以Android和iOS操作系统为平台,基于对嵌名对联生成算法的研究,将楹联文化和现代科技进行有机的结合,使得用户可以通过移动平台方便快捷地获取属于自己的个性化对联。论文简要概述了对联创作软件的设计理念、软件架构、设计流程,详细讨论了在移动平台上的实现技术和方法等,并对系统的结果进行了展示。
关键词:楹联文化;嵌名对联;个性化对联;移动平台
中图分类号:TP391.9?????文献标识码:A?? ???文章编号:1004-731X (2016) 07-1476-05
Name-embedded Couplet Creation Based on Mobile Platform
Shen Weihua1, Zhang Shicheng2, Wang Shunting2, Pan Zhigeng2
(1.Lishui University, Lishui 323000, China; 2. DMI Center, Hangzhou Normal University, Hangzhou 310013, China)
Abstract: Couplet culture is the crystallization of Chinese traditional culture, and also is the gem of Chinese language. Given the broad mobile intelligent terminal user groups, in order to inherit and carry forward the Chinese traditional culture, Android and iOS system were taken as the design platform, combining the couplet culture and modern science and technology in an organic whole based on the study of name-embedded couplet generation algorithm. The users were allowed to get personalized couplet belong to themselves conveniently and quickly by mobile platform. The name-embedded couplet creation software was expounded in the following areas: design concept, software architecture, design process and system function realization, etc. The result of the system design was shown.
Keywords: couplet culture; name-embedded couplet; individualization couplet; mobile platform
※※※※※※※※※※※※※※※※※※※※※※※※※※※※※※
?
来顶一下
近回首页
返回首页
推荐资讯
相关文章
    无相关信息
栏目更新
栏目热门