Font Size: a A A

Algorithm Research And Circuit Design Of Void Identification For Penetration Fuze

Posted on:2015-01-07Degree:MasterType:Thesis
Country:ChinaCandidate:H LiuFull Text:PDF
GTID:2252330428458885Subject:Weapons project
Abstract/Summary:PDF Full Text Request
With the continuous improvement of the precision guided weapon accuracy, precisionstrike to enemy important goals has become the first choice of the war. Especially in such asudden current local war,"surgical operation" strike has become one of the most effectiveattack means at the present stage. In order to protect important military facilities, in-depthresearch has been made on defense technology, mainly taking measures such as deeplyembedded underground and increasing solid protective layer, which proposes a biggerchallenge for penetration weapons. As the soul of penetration weapons, hard targetpenetration fuze technology is the object with priority to be developed. Nowadays, there arefour main detonating ways of hard target penetration fuze to achieve its functions. Accordingto different penetration targets, we should choose corresponding initiation control way. Butthe concealment of important goals, the complexity, diversity and sturdiness of protectivemeasures has given rise to the fact that hard target penetration fuze using single detonationcontrol way has already cannot realized precision strike and efficient damage. It is extremelyurgent to develop adaptive, multi-functional hard target penetration fuze with more initiatingcontrol modes.This paper is essentially the research about void identification technology in the layercounting detonating control mode. The working principle of the this technology is like this:under the circumstance that the target adopts multiple hard layer of protection, fuze circuitdeals with deceleration and acceleration signal which were collected by the accelerationsensor, and identifies cavity target and counts, assisting layer counting circuit to realizeaccurate control of the burst point, in order to achieve maximum damage effect.First, this paper analysis the penetration process in detail based on the penetration theoryand experiments, penetration model simulation which can intuitively reflecting the penetrationprocess was conducted by using LS-DYNA in the paper. On this basis, the interferences that may exist in the penetration process obtain the key analysis. The interference is primarily a"Pseudo-Void" and "Double-Void" interference. The anti-jamming theory using the timer asthe core components is put forward according to the cause of the two kinds of interferenceand the characteristics of the acceleration signal. Then on the basis of the theory it designs theVoid recognition algorithm using MATLAB/SIMULINK, and adopts the standard waveformand measured data to test algorithm, confirming theoretical feasibility of the algorithm.Finally, in order to overcome the time delay in traditional use the control core as DSP andMCU for the process of signal acquisition, this paper has designed a set of pure hardwarecircuit to implement the Void detonating control technique, and it is proved that the circuit canprecisely control the burst point through the measured signal detection.
Keywords/Search Tags:Penetration Fuze, Acceleration, Void Identification, Anti-interference, Timer
PDF Full Text Request
Related items