期刊文献+

ARMA模型在光纤陀螺惯导系统寻北中的应用 被引量:3

Applications of ARMA Model in the FOG Inertial Navigation System North Seeker
下载PDF
导出
摘要 在光纤陀螺捷联惯导系统寻北过程中,光纤陀螺的随机漂移是影响其精度的重要因素。论文提出了一种建立三阶自回归模型AR(3)方法,实现了高精度FOG捷联惯导系统静态输出信号的在线建模,并采用强跟踪卡尔曼滤波技术进行误差的实时滤波。寻北试验结果表明,寻北精度有了明显的提高,从而验证了方法的可行性,具有工程实用性。 The optical fiber gyro random drift is the important factor of influence aiming accuracy in the north seeker of the inertial navigation system.A third-order model is established and an algorithm is given to achieve high-precision of output.The on-line modeling is realized and the strong tracking filter is used to achieve the Real-time filtering.By the north seeker test,the north seeker accuracy has been significantly improved.It is feasibility and practicality for the engineering practicality.
机构地区 西北工业大学 航天
出处 《计算机与数字工程》 2012年第8期42-44,共3页 Computer & Digital Engineering
基金 航天支撑基金(编号:NAXW0006)资助
关键词 光纤陀螺捷联惯导系统 在线建模 实时滤波 寻北 FOG inertial navigation system on-line modeling real-time filtering north seeker
  • 相关文献

参考文献8

  • 1朱奎宝,张春熹,张小跃.光纤陀螺随机漂移ARMA模型研究[J].宇航学报,2006,27(5):1118-1121. 被引量:21
  • 2秦永元,张洪钺,汪淑华.卡尔曼滤波与组合导航原理[M].西安:西北工业大学出版社,2004.
  • 3王新龙,杜宇,丁杨斌.光纤陀螺随机误差模型分析[J].北京航空航天大学学报,2006,32(7):769-772. 被引量:20
  • 4谭联群,吴俊.光纤通信防窃听技术现状与展望[J].舰船电子工程,2011,31(4):87-90. 被引量:4
  • 5衣昌明,刘璟,黎莉.光纤陀螺信号的采集与处理[J].舰船电子工程,2009,29(8):69-71. 被引量:4
  • 6IEEE standard specification format guide and test procedure for single-axis interferometric fiber optic gyros. IEEE STD 952 1997. Sponsor by Gyro and Acceler Panel of the IEEE Aero space and Electronic Systems Society.
  • 7MiaoLinjuan, ZhangFangsheng, ShengJun. Data analysis and modeling of fiber optieGyroscope drift[J]. Joumal of Beijing institute of teehnology, 2002,11 (1).
  • 8Broersen PMT,Waele SD. Automatic identification of time-se ries models from long autoregressive models [J ]//IEEE Transactions on Instrumentation and Measurement, 2005,54 (5) : 1862-1868.

二级参考文献48

  • 1王海,陈家斌,黄威,张延顺,汤继强.光纤陀螺随机漂移测试及分析[J].光学技术,2004,30(5):623-624. 被引量:11
  • 2J. Mullins. Making unbreakable code[J]. IEEE Spectrum, 2002,5.
  • 3C. H. Bennett, G. Brassard. Quantum cryptography: public-key distribution and coin tossing[C]//Proc. IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984 : 175-179.
  • 4O. Hirota, K. Kato, M. Shoma, et al. Quantum key Distribution with unconditional security for all optical fibre networks[J]. Quant. Physics,2003,1.
  • 5G. A. Barbosa, E. Corndorf, P. Kumar, H. P. Yuen. Secure Communication using Coherent States [J]. Phys. Rev. Letters,2003,90(22).
  • 6V. S. Grigoryan, G. S. Kanter, E. Corndorf, et al. Long-haul 10Gb/s encrypted data transmission protec- ted by quantum noise[C]//Proc. ECOC 2004, Stockholm, paper We4. P. 121,2004,9.
  • 7C. Liang, G. S. Kanter, E. Corndorf, et al. Quantum Noise Protected Data Encryption in a WDM Network[J]. IEEE Photonies Tech. Letters, 2005,17 (7) :1573 -1575.
  • 8S. R. Das. Breaking quantum cryptography's 150-kilometer limit[J]. IEEE Spectrum, 2008,9 :15.
  • 9S. V. Kartalopoulos. Quantum cryptography for se- cure optical networks[C]//Proc. ICC, 2007:1311-1316.
  • 10H. Rohde, S. Smolorz, A. Poppe, et al. Quantum key distribution integrated into commercial WDM sys- tems[C]//Proc. OFC/NFOEC 2008, paper OTuP1.

共引文献117

同被引文献26

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部