The strap-down inertial navigation system (SINS) error of ballistic missile is generated by the mutual influence of gyroscope and accelerometer, and the recursive model is completely different from that of gimbaled IN...The strap-down inertial navigation system (SINS) error of ballistic missile is generated by the mutual influence of gyroscope and accelerometer, and the recursive model is completely different from that of gimbaled INS. In the paper, a discrete error recursive model was obtained by studying the applied SINS error model of ballistic missile, and the discrete Kalman filtering simulation based on the model was carried out. The simulated results show that the model can depict the SINS error exactly and provide the advantages for research on integrated guidance and improved hit accuracy.展开更多
Kalman filter is commonly used in data filtering and parameters estimation of nonlinear system,such as projectile's trajectory estimation and control.While there is a drawback that the prior error covariance matri...Kalman filter is commonly used in data filtering and parameters estimation of nonlinear system,such as projectile's trajectory estimation and control.While there is a drawback that the prior error covariance matrix and filter parameters are difficult to be determined,which may result in filtering divergence.As to the problem that the accuracy of state estimation for nonlinear ballistic model strongly depends on its mathematical model,we improve the weighted least squares method(WLSM)with minimum model error principle.Invariant embedding method is adopted to solve the cost function including the model error.With the knowledge of measurement data and measurement error covariance matrix,we use gradient descent algorithm to determine the weighting matrix of model error.The uncertainty and linearization error of model are recursively estimated by the proposed method,thus achieving an online filtering estimation of the observations.Simulation results indicate that the proposed recursive estimation algorithm is insensitive to initial conditions and of good robustness.展开更多
In this article, the problem on the estimation of the convolution model parameters is considered. The recursive algorithm for estimating model parameters is introduced from the orthogonal procedure of the data, the co...In this article, the problem on the estimation of the convolution model parameters is considered. The recursive algorithm for estimating model parameters is introduced from the orthogonal procedure of the data, the convergence of this algorithm is theoretically discussed, and a sufficient condition for the convergence criterion of the orthogonal procedure is given. According to this condition, the recursive algorithm is convergent to model wavelet A- = (1, α1,..., αq).展开更多
A polynomial model, time origin shifting model(TOSM, is used to describe the trajectory of a moving target .Based on TOSM, a recursive laeast squares(RLS) algorithm with varied forgetting factor is derived for tracki...A polynomial model, time origin shifting model(TOSM, is used to describe the trajectory of a moving target .Based on TOSM, a recursive laeast squares(RLS) algorithm with varied forgetting factor is derived for tracking of a non-maneuvering target. In order to apply this algorithm to maneuvering targets tracking ,a tracking signal is performed on-line to determine what kind of TOSm will be in effect to track a target with different dynamics. An effective multiple model least squares filtering and forecasting method dadpted to real tracking of a maneuvering target is formulated. The algorithm is computationally more effcient than Kalman filter and the percentage improvement from simulations show both of them are considerably alike to some extent.展开更多
This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level securi...This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level security(MLS) in Xen. The Virt-BLP model is the theoretical basis of this MAC framework,and this MAC framework is the implementation of Virt-BLP model. Our last paper focuses on Virt-BLP model,while this paper concentrates on the design and implementation of MAC framework. For there is no MAC framework applicable to MLS in virtual machine system at present,our MAC framework fills the blank by applying Virt-BLP model to Xen,which is better than current researches to guarantee the security of communication between virtual machines(VMs) . The experimental results show that our MAC framework is effective to manage the communication between VMs.展开更多
In this paper, we made a new breakthrough, which proposes a new recursion–transform(RT) method with potential parameters to evaluate the nodal potential in arbitrary resistor networks. For the first time, we found ...In this paper, we made a new breakthrough, which proposes a new recursion–transform(RT) method with potential parameters to evaluate the nodal potential in arbitrary resistor networks. For the first time, we found the exact potential formulae of arbitrary m × n cobweb and fan networks by the RT method, and the potential formulae of infinite and semi-infinite networks are derived. As applications, a series of interesting corollaries of potential formulae are given by using the general formula, the equivalent resistance formula is deduced by using the potential formula, and we find a new trigonometric identity by comparing two equivalence results with different forms.展开更多
Separation issue is one of the most important problems about cloud computing security. Tenants should be separated from each other based on cloud infrastructure and different users from one tenant should be separated ...Separation issue is one of the most important problems about cloud computing security. Tenants should be separated from each other based on cloud infrastructure and different users from one tenant should be separated from each other with the constraint of security policies. Learning from the notion of trusted cloud computing and trustworthiness in cloud, in this paper, a multi-level authorization separation model is formally described, and a series of rules are proposed to summarize the separation property of this model. The correctness of the rules is proved. Furthermore, based on this model, a tenant separation mechanism is deployed in a real world mixed-critical information system. Performance benchmarks have shown the availability and efficiency of this mechanism.展开更多
针对常见控制策略在大型液压设备控制方面存在控制精度低与算法太复杂的问题,提出了基于线性扩张状态观测器(linear extended state observer,LESO)的线性时变模型预测控制(linear time-varying model predictive control,LTV-MPC)策略...针对常见控制策略在大型液压设备控制方面存在控制精度低与算法太复杂的问题,提出了基于线性扩张状态观测器(linear extended state observer,LESO)的线性时变模型预测控制(linear time-varying model predictive control,LTV-MPC)策略。通过起竖液压系统状态空间方程,设计了LESO实时估计系统当前状态;通过LTV-MPC输出比例阀电压信号的最优解。通过仿真与试验,验证所提方法的有效性。结果表明:无干扰时,相较于其他控制策略,LESO-LTV-MPC控制误差为0.014%,具有较高的控制精度;施加大干扰时,LESO-LTV-MPC控制误差为0.223%,具有较强的鲁棒性。因此,该控制策略能够有效提升起竖液压系统的性能。展开更多
文摘The strap-down inertial navigation system (SINS) error of ballistic missile is generated by the mutual influence of gyroscope and accelerometer, and the recursive model is completely different from that of gimbaled INS. In the paper, a discrete error recursive model was obtained by studying the applied SINS error model of ballistic missile, and the discrete Kalman filtering simulation based on the model was carried out. The simulated results show that the model can depict the SINS error exactly and provide the advantages for research on integrated guidance and improved hit accuracy.
基金This work is supported by Postgraduate Research&Practice Innovation Program of Jiangsu Province(KYCX18_0467)Jiangsu Province,China.During the revision of this paper,the author is supported by China Scholarship Council(No.201906840021)China to continue some research related to data processing.
文摘Kalman filter is commonly used in data filtering and parameters estimation of nonlinear system,such as projectile's trajectory estimation and control.While there is a drawback that the prior error covariance matrix and filter parameters are difficult to be determined,which may result in filtering divergence.As to the problem that the accuracy of state estimation for nonlinear ballistic model strongly depends on its mathematical model,we improve the weighted least squares method(WLSM)with minimum model error principle.Invariant embedding method is adopted to solve the cost function including the model error.With the knowledge of measurement data and measurement error covariance matrix,we use gradient descent algorithm to determine the weighting matrix of model error.The uncertainty and linearization error of model are recursively estimated by the proposed method,thus achieving an online filtering estimation of the observations.Simulation results indicate that the proposed recursive estimation algorithm is insensitive to initial conditions and of good robustness.
基金Project supported by Scientific Research Fund of Chongqing Municipal Education Commission (kj0604-16)
文摘In this article, the problem on the estimation of the convolution model parameters is considered. The recursive algorithm for estimating model parameters is introduced from the orthogonal procedure of the data, the convergence of this algorithm is theoretically discussed, and a sufficient condition for the convergence criterion of the orthogonal procedure is given. According to this condition, the recursive algorithm is convergent to model wavelet A- = (1, α1,..., αq).
文摘A polynomial model, time origin shifting model(TOSM, is used to describe the trajectory of a moving target .Based on TOSM, a recursive laeast squares(RLS) algorithm with varied forgetting factor is derived for tracking of a non-maneuvering target. In order to apply this algorithm to maneuvering targets tracking ,a tracking signal is performed on-line to determine what kind of TOSm will be in effect to track a target with different dynamics. An effective multiple model least squares filtering and forecasting method dadpted to real tracking of a maneuvering target is formulated. The algorithm is computationally more effcient than Kalman filter and the percentage improvement from simulations show both of them are considerably alike to some extent.
基金supported by National Key Basic Research and Development Plan (973 Plan) of China (No. 2007CB310900)National Natural Science Foundation of China (No. 90612018, 90715030 and 60970008)
文摘This paper is a continuation of our last paper [1] which describes the theory of Virt-BLP model. Based on Virt-BLP model,this paper implements a mandatory access control(MAC) framework applicable to multi-level security(MLS) in Xen. The Virt-BLP model is the theoretical basis of this MAC framework,and this MAC framework is the implementation of Virt-BLP model. Our last paper focuses on Virt-BLP model,while this paper concentrates on the design and implementation of MAC framework. For there is no MAC framework applicable to MLS in virtual machine system at present,our MAC framework fills the blank by applying Virt-BLP model to Xen,which is better than current researches to guarantee the security of communication between virtual machines(VMs) . The experimental results show that our MAC framework is effective to manage the communication between VMs.
基金Project supported by the Natural Science Foundation of Jiangsu Province,China(Grant No.BK20161278)
文摘In this paper, we made a new breakthrough, which proposes a new recursion–transform(RT) method with potential parameters to evaluate the nodal potential in arbitrary resistor networks. For the first time, we found the exact potential formulae of arbitrary m × n cobweb and fan networks by the RT method, and the potential formulae of infinite and semi-infinite networks are derived. As applications, a series of interesting corollaries of potential formulae are given by using the general formula, the equivalent resistance formula is deduced by using the potential formula, and we find a new trigonometric identity by comparing two equivalence results with different forms.
基金supported by the Fundamental Research funds for the central Universities of China (No. K15JB00190)the Ph.D. Programs Foundation of Ministry of Education of China (No. 20120009120010)the Program for Innovative Research Team in University of Ministry of Education of China (IRT201206)
文摘Separation issue is one of the most important problems about cloud computing security. Tenants should be separated from each other based on cloud infrastructure and different users from one tenant should be separated from each other with the constraint of security policies. Learning from the notion of trusted cloud computing and trustworthiness in cloud, in this paper, a multi-level authorization separation model is formally described, and a series of rules are proposed to summarize the separation property of this model. The correctness of the rules is proved. Furthermore, based on this model, a tenant separation mechanism is deployed in a real world mixed-critical information system. Performance benchmarks have shown the availability and efficiency of this mechanism.
文摘针对常见控制策略在大型液压设备控制方面存在控制精度低与算法太复杂的问题,提出了基于线性扩张状态观测器(linear extended state observer,LESO)的线性时变模型预测控制(linear time-varying model predictive control,LTV-MPC)策略。通过起竖液压系统状态空间方程,设计了LESO实时估计系统当前状态;通过LTV-MPC输出比例阀电压信号的最优解。通过仿真与试验,验证所提方法的有效性。结果表明:无干扰时,相较于其他控制策略,LESO-LTV-MPC控制误差为0.014%,具有较高的控制精度;施加大干扰时,LESO-LTV-MPC控制误差为0.223%,具有较强的鲁棒性。因此,该控制策略能够有效提升起竖液压系统的性能。