This paper considers the problem of generating a flight trajectory for a single fixed-wing unmanned combat aerial vehicle (UCAV) performing an air-to-surface multi-target attack (A/SMTA) mission using satellite-gu...This paper considers the problem of generating a flight trajectory for a single fixed-wing unmanned combat aerial vehicle (UCAV) performing an air-to-surface multi-target attack (A/SMTA) mission using satellite-guided bombs. First, this problem is formulated as a variant of the traveling salesman problem (TSP), called the dynamic-constrained TSP with neighborhoods (DCT- SPN). Then, a hierarchical hybrid approach, which partitions the planning algorithm into a roadmap planning layer and an optimal control layer, is proposed to solve the DCTSPN. In the roadmap planning layer, a novel algorithm based on an updatable proba- bilistic roadmap (PRM) is presented, which operates by randomly sampling a finite set of vehicle states from continuous state space in order to reduce the complicated trajectory planning problem to planning on a finite directed graph. In the optimal control layer, a collision-free state-to-state trajectory planner based on the Gauss pseudospectral method is developed, which can generate both dynamically feasible and optimal flight trajectories. The entire process of solving a DCTSPN consists of two phases. First, in the offline preprocessing phase, the algorithm constructs a PRM, and then converts the original problem into a standard asymmet- ric TSP (ATSP). Second, in the online querying phase, the costs of directed edges in PRM are updated first, and a fast heuristic searching algorithm is then used to solve the ATSP. Numerical experiments indicate that the algorithm proposed in this paper can generate both feasible and near-optimal solutions quickly for online purposes.展开更多
A flying-body is considered as the reference model, the optimized mathematical model is established. The genetic operators are designed and algorithm parameters are selected reasonably. The scheme control signal in sh...A flying-body is considered as the reference model, the optimized mathematical model is established. The genetic operators are designed and algorithm parameters are selected reasonably. The scheme control signal in short range top attack flight trajectory is optimized by using genetic algorithm. The short range top attack trajectory designed meets the design requirements, with the increase of the falling angle and the decrease of the minimum range. The application of genetic algorithm to top attack trajectory optimization is proved to be feasibly and effectively according to the analyses of results.展开更多
A novel integrated guidance and control (IGC) design method is proposed to solve problems of low control accuracy for a suicide unmanned combat aerial vehicle (UCAV) in the terminal attack stage. First of all, the IGC...A novel integrated guidance and control (IGC) design method is proposed to solve problems of low control accuracy for a suicide unmanned combat aerial vehicle (UCAV) in the terminal attack stage. First of all, the IGC system model of the UCAV is built based on the three-channel independent design idea, which reduces the difficulties of designing the controller. Then, IGC control laws are designed using the trajectory linearization control (TLC). A nonlinear disturbance observer (NDO) is introduced to the IGC controller to reject various uncertainties, such as the aerodynamic parameter perturbation and the measurement error interference. The stability of the closed-loop system is proven by using the Lyapunov theorem. The performance of the proposed IGC design method is verified in a terminal attack mission of the suicide UCAV. Finally, simulation results demonstrate the superiority and effectiveness in the aspects of guidance accuracy and system robustness.展开更多
This paper proposes new methods and strategies for Multi-UAVs cooperative attacks with safety and time constraints in a complex environment.Delaunay triangle is designed to construct a map of the complex flight enviro...This paper proposes new methods and strategies for Multi-UAVs cooperative attacks with safety and time constraints in a complex environment.Delaunay triangle is designed to construct a map of the complex flight environment for aerial vehicles.Delaunay-Map,Safe Flight Corridor(SFC),and Relative Safe Flight Corridor(RSFC)are applied to ensure each UAV flight trajectory's safety.By using such techniques,it is possible to avoid the collision with obstacles and collision between UAVs.Bezier-curve is further developed to ensure that multi-UAVs can simultaneously reach the target at the specified time,and the trajectory is within the flight corridor.The trajectory tracking controller is also designed based on model predictive control to track the planned trajectory accurately.The simulation and experiment results are presented to verifying developed strategies of Multi-UAV cooperative attacks.展开更多
The objective of this research is mainly focused on environment-friendly and moderately slow flapping wind turbine which can easily operate in or near urban areas or rooftops owing to scale merit with low-frequency tu...The objective of this research is mainly focused on environment-friendly and moderately slow flapping wind turbine which can easily operate in or near urban areas or rooftops owing to scale merit with low-frequency turbine noise, installation cost, avian mortality rate and safety consideration etc. The authors are focusing on lift based (LB) slow flapping wind turbine operated within a small attack angle amplitude whereas the previous research treated a lift and drag based (LDB) flapping turbine. Here, a unique trajectory for the wing motion was yet designed by using the Chebyshev dyad linkage mechanism as well as the previous report. The wind energy transferred to the mechanical rotation, adopting a single symmetric wing NACA0012. To obtain a smooth flapping motion for the blade, we optimize all fundamental parameters with our simulation model for optimum performance of the turbine. Both static and dynamic analysis has been conducted to confirm the feasibility of the present design. In addition, wind turbine performance was studied for a suitable range of free stream wind velocities. This report confirms that the developed flapping wind turbine can drive at slow speed with suitable energy extraction rate at different wind velocities. Moreover, we made a simple comparative study of the outcomes obtained from our previous lift and drag based flapping wind turbine with present one, i.e., lift based flapping turbine.展开更多
This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is ...This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location kdiversity is achieved by dis tributing fake sources around the base station. To reduce the time delay, tree rooted at the base sta tion is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the ana lytical analysis and the simulation results prove that proved energy overhead and time delay. our scheme provides perfect anonymity with improved energy overhead and time delay.展开更多
针对常规车辆轨迹预测数据集中较少包含极端交通场景信息的问题,本文提出一种新型对抗性攻击框架来模拟此类场景。首先,为了判定不同场景中对抗性攻击是否有效提出了一种阈值判定的方式;然后,针对攻击目的的不同分别设计了两种对抗性轨...针对常规车辆轨迹预测数据集中较少包含极端交通场景信息的问题,本文提出一种新型对抗性攻击框架来模拟此类场景。首先,为了判定不同场景中对抗性攻击是否有效提出了一种阈值判定的方式;然后,针对攻击目的的不同分别设计了两种对抗性轨迹生成算法,在遵守物理约束和隐蔽性前提下,生成更具对抗性的轨迹样本;此外,提出3个新的评价指标全面评估攻击效果;最后,探究了不同的防御策略来减轻对抗攻击影响。实验结果显示,基于扰动阈值的快速攻击算法(attack algorithm based on perturbation threshold for fast attack,PTFA)和基于动态学习率调整的攻击算法(attack algorithm based on dynamic learning rate adjustment,DLRA)在NGSIM数据集上的攻击时间和扰动效果均优于现有算法,更高效发现模型弱点。本研究通过模拟极端情况丰富了轨迹样本,深入评估了模型鲁棒性,为后续优化奠定了基础。展开更多
文摘This paper considers the problem of generating a flight trajectory for a single fixed-wing unmanned combat aerial vehicle (UCAV) performing an air-to-surface multi-target attack (A/SMTA) mission using satellite-guided bombs. First, this problem is formulated as a variant of the traveling salesman problem (TSP), called the dynamic-constrained TSP with neighborhoods (DCT- SPN). Then, a hierarchical hybrid approach, which partitions the planning algorithm into a roadmap planning layer and an optimal control layer, is proposed to solve the DCTSPN. In the roadmap planning layer, a novel algorithm based on an updatable proba- bilistic roadmap (PRM) is presented, which operates by randomly sampling a finite set of vehicle states from continuous state space in order to reduce the complicated trajectory planning problem to planning on a finite directed graph. In the optimal control layer, a collision-free state-to-state trajectory planner based on the Gauss pseudospectral method is developed, which can generate both dynamically feasible and optimal flight trajectories. The entire process of solving a DCTSPN consists of two phases. First, in the offline preprocessing phase, the algorithm constructs a PRM, and then converts the original problem into a standard asymmet- ric TSP (ATSP). Second, in the online querying phase, the costs of directed edges in PRM are updated first, and a fast heuristic searching algorithm is then used to solve the ATSP. Numerical experiments indicate that the algorithm proposed in this paper can generate both feasible and near-optimal solutions quickly for online purposes.
文摘A flying-body is considered as the reference model, the optimized mathematical model is established. The genetic operators are designed and algorithm parameters are selected reasonably. The scheme control signal in short range top attack flight trajectory is optimized by using genetic algorithm. The short range top attack trajectory designed meets the design requirements, with the increase of the falling angle and the decrease of the minimum range. The application of genetic algorithm to top attack trajectory optimization is proved to be feasibly and effectively according to the analyses of results.
基金supported by the National Natural Science Foundation of China(6160150571501184)the National Aviation Science Foundation of China(20155196022)
文摘A novel integrated guidance and control (IGC) design method is proposed to solve problems of low control accuracy for a suicide unmanned combat aerial vehicle (UCAV) in the terminal attack stage. First of all, the IGC system model of the UCAV is built based on the three-channel independent design idea, which reduces the difficulties of designing the controller. Then, IGC control laws are designed using the trajectory linearization control (TLC). A nonlinear disturbance observer (NDO) is introduced to the IGC controller to reject various uncertainties, such as the aerodynamic parameter perturbation and the measurement error interference. The stability of the closed-loop system is proven by using the Lyapunov theorem. The performance of the proposed IGC design method is verified in a terminal attack mission of the suicide UCAV. Finally, simulation results demonstrate the superiority and effectiveness in the aspects of guidance accuracy and system robustness.
基金National Natural Science Foundation of China(No.61903350)Beijing Institute of Technology Research Fund Program for Young Scholars。
文摘This paper proposes new methods and strategies for Multi-UAVs cooperative attacks with safety and time constraints in a complex environment.Delaunay triangle is designed to construct a map of the complex flight environment for aerial vehicles.Delaunay-Map,Safe Flight Corridor(SFC),and Relative Safe Flight Corridor(RSFC)are applied to ensure each UAV flight trajectory's safety.By using such techniques,it is possible to avoid the collision with obstacles and collision between UAVs.Bezier-curve is further developed to ensure that multi-UAVs can simultaneously reach the target at the specified time,and the trajectory is within the flight corridor.The trajectory tracking controller is also designed based on model predictive control to track the planned trajectory accurately.The simulation and experiment results are presented to verifying developed strategies of Multi-UAV cooperative attacks.
文摘The objective of this research is mainly focused on environment-friendly and moderately slow flapping wind turbine which can easily operate in or near urban areas or rooftops owing to scale merit with low-frequency turbine noise, installation cost, avian mortality rate and safety consideration etc. The authors are focusing on lift based (LB) slow flapping wind turbine operated within a small attack angle amplitude whereas the previous research treated a lift and drag based (LDB) flapping turbine. Here, a unique trajectory for the wing motion was yet designed by using the Chebyshev dyad linkage mechanism as well as the previous report. The wind energy transferred to the mechanical rotation, adopting a single symmetric wing NACA0012. To obtain a smooth flapping motion for the blade, we optimize all fundamental parameters with our simulation model for optimum performance of the turbine. Both static and dynamic analysis has been conducted to confirm the feasibility of the present design. In addition, wind turbine performance was studied for a suitable range of free stream wind velocities. This report confirms that the developed flapping wind turbine can drive at slow speed with suitable energy extraction rate at different wind velocities. Moreover, we made a simple comparative study of the outcomes obtained from our previous lift and drag based flapping wind turbine with present one, i.e., lift based flapping turbine.
基金Supported by the National Natural Science Foundation of China(No.60903157)the Fundamental Research funds for the Central Universities of China(No.ZYGX2011J066)the Sichuan Science and Technology Support Project(No.2013GZ0022)
文摘This paper proposes a clustered trajectories anonymity scheme (CTA) that enhances the kano nymity scheme to provide the intended level of source location privacy in mobile event monitoring when a global attacker is assumed. CTA applies isomorphic property of rotation to create traces of the fake sources distributions which are similar to those of the real sources. Thus anonymity of each trajectory and that of the clustered is achieved. In addition, location kdiversity is achieved by dis tributing fake sources around the base station. To reduce the time delay, tree rooted at the base sta tion is constructed to overlap part of the beacon interval of the nodes in the hierarchy. Both the ana lytical analysis and the simulation results prove that proved energy overhead and time delay. our scheme provides perfect anonymity with improved energy overhead and time delay.
文摘针对常规车辆轨迹预测数据集中较少包含极端交通场景信息的问题,本文提出一种新型对抗性攻击框架来模拟此类场景。首先,为了判定不同场景中对抗性攻击是否有效提出了一种阈值判定的方式;然后,针对攻击目的的不同分别设计了两种对抗性轨迹生成算法,在遵守物理约束和隐蔽性前提下,生成更具对抗性的轨迹样本;此外,提出3个新的评价指标全面评估攻击效果;最后,探究了不同的防御策略来减轻对抗攻击影响。实验结果显示,基于扰动阈值的快速攻击算法(attack algorithm based on perturbation threshold for fast attack,PTFA)和基于动态学习率调整的攻击算法(attack algorithm based on dynamic learning rate adjustment,DLRA)在NGSIM数据集上的攻击时间和扰动效果均优于现有算法,更高效发现模型弱点。本研究通过模拟极端情况丰富了轨迹样本,深入评估了模型鲁棒性,为后续优化奠定了基础。