Redirigiendo al acceso original de articulo en 19 segundos...
Inicio  /  Applied Sciences  /  Vol: 9 Par: 15 (2019)  /  Artículo
ARTÍCULO
TITULO

Pursuer?s Control Strategy for Orbital Pursuit-Evasion-Defense Game with Continuous Low Thrust Propulsion

Junfeng Zhou    
Lin Zhao    
Jianhua Cheng    
Shuo Wang and Yipeng Wang    

Resumen

This paper studies the orbital pursuit-evasion-defense problem with the continuous low thrust propulsion. A control strategy for the pursuer is proposed based on the fuzzy comprehensive evaluation and the differential game. First, the system is described by the Lawden?s equations, and simplified by introducing the relative state variables and the zero effort miss (ZEM) variables. Then, the objective function of the pursuer is designed based on the fuzzy comprehensive evaluation, and the analytical necessary conditions for the optimal control strategy are presented. Finally, a hybrid method combining the multi-objective genetic algorithm and the multiple shooting method is proposed to obtain the solution of the orbital pursuit-evasion-defense problem. The simulation results show that the proposed control strategy can handle the orbital pursuit-evasion-defense problem effectively.

 Artículos similares

       
 
Ziqi Zhou, Pan Geng, Wei Cao and Xiaoyan Xu    
In the navigation of rudderless dual-motor propulsion ships, it is often necessary for the dual motor to run stably at different given speeds. However, the existing coupling strategies cannot achieve precise cooperative control of the dual motor under di... ver más

 
Xuguo Jiao, Guozhong Wang, Xin Wang, Zhenyong Zhang, Yanbing Tian and Xiwen Fan    
Due to physical limitations and safety requirements, the rate and amplitude of change in wind turbines? pitch angle are limited, which will bring integral saturation problems to the control system. This leads to the deterioration of the pitch control sys... ver más

 
Abner Perez-Haro and Arturo Diaz-Perez    
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ... ver más
Revista: Information

 
Zhao Wang, Hongjian Wang, Jianya Yuan, Dan Yu, Kai Zhang and Jingfei Ren    
The complex underwater environment poses significant challenges for unmanned underwater vehicles (UUVs), particularly in terms of communication constraints and the need for precise cooperative obstacle avoidance and trajectory tracking. Addressing these ... ver más

 
Chenglou Liu, Fangfang Xie and Tingwei Ji    
Formation path planning is a significant cornerstone for unmanned aerial vehicle (UAV) swarm intelligence. Previous methods were not suitable for large-scale UAV formation, which suffered from poor formation maintenance and low planning efficiency. To th... ver más
Revista: Aerospace