A prescribed performance neural controller to guarantee tracking quality is addressed for the near space kinetic kill vehicle (NSKKV) to meet the state constraints caused by side window detection. Different from the t...A prescribed performance neural controller to guarantee tracking quality is addressed for the near space kinetic kill vehicle (NSKKV) to meet the state constraints caused by side window detection. Different from the traditional prescribed performance control in which the shape of the performance function is constant, this paper exploits new performance functions which can change the shape of their function according to different symbols of initial errors and can ensure the error convergence with a small overshoot. The neural backstepping control and the minimal learning parameters (MLP) technology are employed for exploring a prescribed performance controller (PPC) that provides robust tracking attitude reference trajectories. The highlight is that the transient performance of tracking errors is satisfactory and the computational load of neural approximation is low. The pseudo rate (PSR) modulator is used to shape the continuous control command to pulse or on-off signals to meet the requirements of the thruster. Numerical simulations show that the proposed method can achieve state constraints, pseudo-linear operation and high accuracy.展开更多
The attitude control problem of the kinetic kill vehicle is studied in this work. A new mathematical model of the kinetic kill vehicle is proposed, the linear quadratic regulator technique is used to design the optima...The attitude control problem of the kinetic kill vehicle is studied in this work. A new mathematical model of the kinetic kill vehicle is proposed, the linear quadratic regulator technique is used to design the optimal attitude controller, and the pulse-width pulse-frequency modulator is used to shape the continuous control command to pulse or on-off signals to meet the requirements of the reaction thrusters. The methods to select the appropriate parameters of pulse-width pulse-frequency are presented in detail. Numerical simulations show that the performance of the LQR/PWPF approach can achieve good control performance such as pseudo-linear operation, high accuracy, and fast enough tracking speed.展开更多
Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a v...Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser.展开更多
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e...The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.展开更多
When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</su...When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</sub>η→ξ such that Dξ = η implies D<sub>1</sub>η = 0. When D is involutive, the procedure provides successive first-order involutive operators D<sub>1</sub>,...,D<sub>n </sub>when the ground manifold has dimension n. Conversely, when D<sub>1</sub> is given, a much more difficult “inverse problem” is to look for an operator D:ξ→η having the generating CC D<sub>1</sub>η = 0. If this is possible, that is when the differential module defined by D<sub>1</sub> is “torsion-free”, that is when there does not exist any observable quantity which is a sum of derivatives of η that could be a solution of an autonomous OD or PD equation for itself, one shall say that the operator D<sub>1</sub> is parametrized by D. The parametrization is said to be “minimum” if the differential module defined by D does not contain a free differential submodule. The systematic use of the adjoint of a differential operator provides a constructive test with five steps using double differential duality. We prove and illustrate through many explicit examples the fact that a control system is controllable if and only if it can be parametrized. Accordingly, the controllability of any OD or PD control system is a “built in” property not depending on the choice of the input and output variables among the system variables. In the OD case and when D<sub>1</sub> is formally surjective, controllability just amounts to the formal injectivity of ad(D<sub>1</sub>), even in the variable coefficients case, a result still not acknowledged by the control community. Among other applications, the parametrization of the Cauchy stress operator in arbitrary dimension n has attracted many famous scientists (G. B. Airy in 1863 for n = 2, J. C. Maxwell in 1870, E. Beltrami in 1892 for n = 3, and A. Einstein in 1915 for n = 4). We prove that all these works are already explicitly using the self-adjoint Einstein operator, which cannot be parametrized and the comparison needs no comment. As a byproduct, they are all based on a confusion between the so-called div operator D<sub>2</sub> induced from the Bianchi operator and the Cauchy operator, adjoint of the Killing operator D which is parametrizing the Riemann operator D<sub>1</sub> for an arbitrary n. This purely mathematical result deeply questions the origin and existence of gravitational waves, both with the mathematical foundations of general relativity. As a matter of fact, this new framework provides a totally open domain of applications for computer algebra as the quoted test can be studied by means of Pommaret bases and related recent packages.展开更多
基金supported by the National Natural Science Foundation of China(61773398 61703421)
文摘A prescribed performance neural controller to guarantee tracking quality is addressed for the near space kinetic kill vehicle (NSKKV) to meet the state constraints caused by side window detection. Different from the traditional prescribed performance control in which the shape of the performance function is constant, this paper exploits new performance functions which can change the shape of their function according to different symbols of initial errors and can ensure the error convergence with a small overshoot. The neural backstepping control and the minimal learning parameters (MLP) technology are employed for exploring a prescribed performance controller (PPC) that provides robust tracking attitude reference trajectories. The highlight is that the transient performance of tracking errors is satisfactory and the computational load of neural approximation is low. The pseudo rate (PSR) modulator is used to shape the continuous control command to pulse or on-off signals to meet the requirements of the thruster. Numerical simulations show that the proposed method can achieve state constraints, pseudo-linear operation and high accuracy.
文摘The attitude control problem of the kinetic kill vehicle is studied in this work. A new mathematical model of the kinetic kill vehicle is proposed, the linear quadratic regulator technique is used to design the optimal attitude controller, and the pulse-width pulse-frequency modulator is used to shape the continuous control command to pulse or on-off signals to meet the requirements of the reaction thrusters. The methods to select the appropriate parameters of pulse-width pulse-frequency are presented in detail. Numerical simulations show that the performance of the LQR/PWPF approach can achieve good control performance such as pseudo-linear operation, high accuracy, and fast enough tracking speed.
基金National Natural Science Foundation of China(Grant Nos.62005276,62175234)the Scientific and Technological Development Program of Jilin,China(Grant No.20230508111RC)to provide fund for this research。
文摘Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser.
基金supported by the Natural Science Foundation Research Plan of Shanxi Province (2023JCQN0728)。
文摘The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
文摘When D:ξ→η is a linear ordinary differential (OD) or partial differential (PD) operator, a “direct problem” is to find the generating compatibility conditions (CC) in the form of an operator D<sub>1:</sub>η→ξ such that Dξ = η implies D<sub>1</sub>η = 0. When D is involutive, the procedure provides successive first-order involutive operators D<sub>1</sub>,...,D<sub>n </sub>when the ground manifold has dimension n. Conversely, when D<sub>1</sub> is given, a much more difficult “inverse problem” is to look for an operator D:ξ→η having the generating CC D<sub>1</sub>η = 0. If this is possible, that is when the differential module defined by D<sub>1</sub> is “torsion-free”, that is when there does not exist any observable quantity which is a sum of derivatives of η that could be a solution of an autonomous OD or PD equation for itself, one shall say that the operator D<sub>1</sub> is parametrized by D. The parametrization is said to be “minimum” if the differential module defined by D does not contain a free differential submodule. The systematic use of the adjoint of a differential operator provides a constructive test with five steps using double differential duality. We prove and illustrate through many explicit examples the fact that a control system is controllable if and only if it can be parametrized. Accordingly, the controllability of any OD or PD control system is a “built in” property not depending on the choice of the input and output variables among the system variables. In the OD case and when D<sub>1</sub> is formally surjective, controllability just amounts to the formal injectivity of ad(D<sub>1</sub>), even in the variable coefficients case, a result still not acknowledged by the control community. Among other applications, the parametrization of the Cauchy stress operator in arbitrary dimension n has attracted many famous scientists (G. B. Airy in 1863 for n = 2, J. C. Maxwell in 1870, E. Beltrami in 1892 for n = 3, and A. Einstein in 1915 for n = 4). We prove that all these works are already explicitly using the self-adjoint Einstein operator, which cannot be parametrized and the comparison needs no comment. As a byproduct, they are all based on a confusion between the so-called div operator D<sub>2</sub> induced from the Bianchi operator and the Cauchy operator, adjoint of the Killing operator D which is parametrizing the Riemann operator D<sub>1</sub> for an arbitrary n. This purely mathematical result deeply questions the origin and existence of gravitational waves, both with the mathematical foundations of general relativity. As a matter of fact, this new framework provides a totally open domain of applications for computer algebra as the quoted test can be studied by means of Pommaret bases and related recent packages.