共查询到20条相似文献,搜索用时 62 毫秒
1.
2.
3.
4.
使用遗传算法和B平面参数进行月球探测器地月转移轨道设计 总被引:3,自引:0,他引:3
通过遗传算法和B平面参数对月球探测器地月转移轨道进行了设计和计算,计算结果表明,结合遗传算法和B平面参数可以很好地解决探月轨道搜索的全局性和快速收敛性问题。 相似文献
5.
6.
均匀试验设计在参数设计中应用初探 总被引:6,自引:0,他引:6
简述了均匀试验设计用于参数设计的步骤及方法.详细介绍了均匀试验设计法用于电感电路设计和气动装置的参数设计.通过实例,比较了均匀设计与正交设计的参数设计结果. 相似文献
7.
8.
针对测量图像的非均匀增强计算量大、增强效果差的问题,基于遗传算法提出了一种测量图像增强方法,将灰度范围作为染色体,搜索图像清晰度达到最优的灰度非线性变换关系,从而达到图像最佳增强效果,为了提高遗传算法的进化能力,本文根据测量图像的具体特性,对进化参数进行了合理优化,取得了理想的执行效率和增强效果。 相似文献
9.
提出了一种基于遗传算法优化整定PID控制器的新方法,该方法首先将PID参数整定转化为求解一优化问题,进而应用遗传算法求出优化问题的解。给出了设计实例,并应用所提出的方法对导弹控制系统进行优化设计。 相似文献
10.
11.
Tetraacetyldibenzylhitane (TADBIW) was subjected to debenzylation by nitrosating with inorganic materials available commercially to synthesize tetraacetyldinitrosohexaazaisowurtzitane (TADNSIW). TADNSIW was purified, and its structure was determined by FTIR, 1H NMR, MS and element analysis. The debenzylation reaction of TADBIW gave quantitative benzaldehyde as a by-product. This indicates that the reaction produces an imine cation as an intermediate. Hexanitrohexaazaisowurtzitane (HNIW) was prepared from unpurified TADNSIW with the yield over 96.0 % and the purity more than 98.0 %. And the mechanism of the reaction from TADNSIW to HNIW is proposed to be oxidation of nitroso and nitration of acetyl on the molecule of TADNSIW, This reaction system involved is simple, and the reaction can complete within a short time and under mild conditions. The product can be easily to separate and the waste disposed readily. 相似文献
12.
For measuring velocity and impacting position of single fragment of warhead, a non-contact measuring method is proposed, in which a six-light-screen array, a position indicator, a multi-channel chronograph and a computer are used.The principle of measurement is described. The key device of the system is a light screen array sensor which consists of six light screens allocated with certain geometrical parameters. When the fragment flies through the light screen array, the time of passing through each of the screens is recorded by the multi-channel chronograph. According to the time data and the geometrical parameters of the array, the velocity vector and the location of the fragment can be calculated immediately. The presented method can be used to locate the fragment and to measure the real velocity on its flying direction. It can also be used to measure the velocity of a fragment swarm after the system is engineered further. 相似文献
13.
The technique of watermarking has been introduced into 2D vector maps for many potential applications such as protecting the copyright of important GIS (geographical information system) data and tracing the data source of military maps. In most previous works, although the validity of the map data could be preserved during the embedding procedure, the shape-distortions of the map elements are usually neglected which would tend to degrade the invisibility of the watermarking schemes. A shape-preserving algorithm for watermarking 2D vector maps is presented in this paper. A 1D distance sequence extracted from the original map is adopted as the cover data instead of 2D coordinates. A watermark bit is represented by changing the distributions of the cover data. The embedding procedure induces lower shape-distortions than in former works. Experimental results indicate better invisibility of the proposed scheme, as well as its robustness to certain attacks such as map simplification, interpolation, additive noise and most geometric transforms. 相似文献
14.
阐述了数码电子雷管中,点火药剂细结晶三硝基间苯二酚铅(LTNR)的制备工艺;从点火药剂的种类、加入黏合剂的质量分数、桥丝直径、点火头的电阻值、防潮漆的蘸涂等方面对点火头性能的影响因素进行了探讨;通过震动试验、并联起爆试验、延期精度检测与考核,试验结果表明:一次性合成的细结晶LTNR是制造数码电子雷管点火头较为理想的点火药剂,按技术要求生产的点火头性能指标能够满足行业标准要求。 相似文献
15.
The stability under illumination of transmission-mode GaAs photocathode sealed in the third generation intensifier is investigated by use of spectral response testing instruments. The variations of spectral response with the illumination times under weak and intense illumination are compared. The variations of photoemission performance parameters are also characterized. The results show that during initial several weak illuminations photocathode behaves no evident decay and a maximum sensitivity is achieved, while under intense illumination the sensitivity of photocathode begin to decrease largely at the first illumination. The calculated performance parameters show that the variation of surface escape probability with illumination times is a direct cause of instability of photocathode. It is also found that under intense illumination peak wavelength is moved towards short-wave and peak response is decreased, which shows that the ability of long-wave response of photocathode is decreased. 相似文献
16.
Open rule-setting method advanced in this paper concentrates on providing designers of engines with a convenient way to express their design innovations and develop the expected prototypes in the early CAD stage, and constitute effective models for the following analysis process of CAE and CAPP. The problems arisen in the process of conceptual design with the traditional experience-based development method are analyzed. Based on those analyses, open rule-setting method is presented and some associated technical problems are discussed. The functional framework of open rule-setting system was built as software engineering methods. The speciality of the engine product as a kind of complex product and the requirement of the engine product based on its structural particularity to rule-setting system are considered carefully. A demonstration is supplied to illustrate how the open rule-setting method enhances the efficiency and quality of the engine conceptual design. 相似文献
17.
The implementation of a missile's visual simulation system is explained that is developed with OpenGL(open graphic library) and the flight path and flight carriage in different stages of the missile are displayed. The establishment problems of the 3D scene are circumstantiated including the construction and redeployment of the model, creation of the virtual scene, setting of the multi-viewports and multi-windows etc. The missile's data driver, system flow, the modules and their mutual relations of the missile visual simulation system are discussed. The missile flight simulation results and effect of the scenes are given. 相似文献
18.
By analyzing the working principle of Linux network device driver, discussing the Linux network driver structure and its key technologies, the general network driver structure and its design methodologies in Linux system are summarized. Through modifying the network device driver of Linux device driver 3rd version snull, c and improving the COW technology, the Zero-Copy technology in Linux (kernel version 2.6.11 ) is implemented. In the end, the success test tells us that the thorough analysis of network device driver is the foundation of many applications, and it also provides a certain improvement to a lot of real applications, even to military application development. 相似文献
19.
By analyzing the influencing factors of part quality making of sheet alloy of titanium by vibra cutter, the shape of upper reamer is set as cylinder and wedge-shaped form, and the lower reamer as plain and hemicycle form, and its main structural parameters are defined as well. Then it is validated further that such improved vibra cutter reamer can be used to process curve-edged parts of titanium alloy sheet. The experimental result shows that the titanium alloy sheet parts processed by above equipment have no sharpen angles for convex parts and evident crevasse of concave-edged part. In summary, such improvement can eliminate the free-waved edge and improve the manufacture quality of titanium alloy sheet parts greatly. 相似文献
20.
A new dynamic encryption application in ad-hoc networks is proposed. The advantages of this method are its being able to use the previous ciphertext as a seed of a new encryption process, rendering the encryption process effective in all communication process by continuous dynamic key generation together with synchronization, and its capability to cut back on system bandages to a greater extent, which is valuable for the ad-hoc circumstance. In addition, the rationality and effectiveness of this novel encryption method have been verified by the test results. 相似文献