Full Digital Smart Fuze on Air Target

来源 :北京理工大学学报(英文版) | 被引量 : 0次 | 上传用户:hanyan0503
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
The intelligent fuzing is a kind of perfect way to optimize detonation location. The fuze can autonomously configure the warhead detonation mode to optimize the desired effects against the target. For the air target, the fuze can sense the impact in the impact mode then detonate the warhead on impact, otherwise, it will operate in the proximity mode and detonate at a closest approach to the target. The anti-jamming ability is also added on fuzes full digital signal processing platform. The method for burst points controlling is analyzed and the digital intelligent fuze system based on system on programmable chip (SOPC) is designed.
其他文献
本文通过对荣华二采区10
The new technology of welding with impacting rotation is put forward to decrease the wave-like deformation of the TC4 thin plate weldment.The thermal stress and
The Al25Cu6. 5Si0. 09RE (RE = La and Ce) and Al25Cu10.5Si2Ni filler metals were prepared by common metal mold casting, copper plate chilling and rapid solidific
This paper presents an algorithm that combines the chaos optimization algorithm with the maximum entropy(COA-ME)by using entropy model based on chaos algorithm,
An experimental study of an active body-weight support (BWS) system for improving treadmill-based locomotion training is performed. The dynamical foundation of
This paper aims to establish a 3D evaluation method for cutting surface topography of C/C composites. The cutting surface is measured by Talyscan 150, using 3D
To minimize the errors of the reconstructed values and improve the quality of decoded image,an efficient reconstruction scheme for transform domain Wyner-Ziv (W
Laser beam measurement using point diffraction interferometer (PDI) is studied by modeling and the factors that influence the measurement accuracy are investiga
In this paper, a process modeling and related optimizing control for nonuniformly sampled (NUS) systems are addressed. By using a proposed nonuniform integratio
This article is focused on analyzing the key technologies of new malicious code and corresponding defensive measures in the large-scale communication networks.B