Font Size: a A A

Research Of The Key Technology In Uav(unmanned Aerial Vehicle) Network Reconnaissance

Posted on:2016-11-30Degree:MasterType:Thesis
Country:ChinaCandidate:J H TangFull Text:PDF
GTID:2272330473455095Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Due to the capability of concealment, all-weather characteristics and so on, UAV(unmanned aerial vehicle)becomes the darling of the war and can be seen everywhere in the modern battlefield. UAVs play an essential role in reconnoitering pre-war intelligence, perceiving battlefield situation, and evaluating the outcome of the war. The information UAVs reconnoitred is irreplaceable for evaluating the military strength of both sides, adjusting the military plan, improving the accuracy and power of precision guidance weapon, and it is one of the main factors which influence the outcome of the war.This project is done in collaboration with xxx factory, its main idea is to use the redundant information from the UAV network to confront the increasingly complex battlefield environment and various anti reconnaissance means. UAVs which equip various aerospace equipment share information, coordinate, cooperate with each other, and complete reconnaissance mission which single one is hardly competent. The project focus on the key technology of the UAV network reconnaissance, such as time synchronization technology, positioning technology, UAV path planning and reconnaissance information analysis, then validate some algorithm of key technology through hardware.The idea of this paper is described as follows. After time synchronization in the ground, UAVS fly to the designated area of the battlefield with reconnaissance mission, including position the stationary radiation object, suspicious moving radiation source. For radar, reconnaissance information is analyzed and estimated to determine the radar location, radar power figure, scanning cycle, scanning direction and so on, and then radial cheating track is proposed. Finally, the cheating track is implemented and the localization algorithm is verified by hardware.This paper implements the following work:(1) Modify the SCPA algorithm in connection with specific research condition in order to improve the distance measurement to time measurement and derive the formula. In order to achieve the accuracy requirement of the UAV network time synchronization, the carrier phase technology is used to smooth pseudorange and to improve the modify SCPA algorithm to further improve the time accuracy.(2) In battlefield environment, distance and azimuth angle parameter is obtained through a variety of sensors or airborne synthetic aperture radar, then the Newton iteration method, multilateral localization algorithm and the triangulation algorithm is used to position the stationary radiation object, and the relationship between the positioning error of Newton iteration method and the number of iterations is emphasized.(3) For suspicious moving radiation source in the battlefield environment, in order to achieve the purpose of real-time monitoring, threat assessment and attempt to crack the enemy combat intention, the federal filtering technology is use to process the track with the redundant information which after time and space coordinate system conversion from UAVs network reconnaissance.(4) Analyze and estimate the reconnaissance information to determine the radar location, radar power figure, scanning cycle, scanning direction and then detailed formula is given out, the radial cheating track is proposed and the deception parameters is simulated.(5) Implement the radial cheating track with DSP. There is a zigzag cheat track on the radar screen in the process of outdoor fixed-point test. Then analyze and explain the reason of zigzag. Implement the Newton iteration method, multilateral localization algorithm and the triangulation algorithm with ARM, then compare and explain the result data between the MATLAB simulation and the hardware implementation.
Keywords/Search Tags:SCPA algorithm, positioning algorithm, federal filtering, track cheating
PDF Full Text Request
Related items