Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

103 results about "Attack time" patented technology

In telecommunication, attack time is the time between the instant that a signal at the input of a device or circuit exceeds the activation threshold of the device or circuit and the instant that the device or circuit reacts in a specified manner, or to a specified degree, to the input. Attack time occurs in devices such as clippers, peak limiters, compressors, and voxes.

Method for controlling attack angle and attack time of multiple missiles

ActiveCN102706217AEasy to controlGood cooperative combat effectAiming meansMissileAttack time
The invention provides a method for controlling the attack angle and the attack time of multiple missiles. With the adoption of the method, the attack angle and the attack time of the multiple missiles can be accurately controlled. The method comprises the following steps: arbitrarily selecting one missile from multiple missiles to serve as a master missile; constructing a virtual sphere by taking a target as a sphere center and taking distance between the master missile and the target as a radius; defining the residual missiles as slave missiles; selecting virtual points for each slave missile on the surface of the virtual sphere, wherein direction of a connection line of each virtual point and the target is a preset ideal attack angle corresponding to the slave missile; and by controlling a slave missile movement locus, approaching and tracking a virtual point locus, so that control of the attack angle and the attack time of multiple missiles is realized. The method for controlling the attack angle and the attack time of the multiple missiles is realized by approaching and tracking the virtual point corresponding to the slave missile by the slave missile, so that the attack angle and the attack time of the slave missiles can be controlled without appointing ideal attack time for each slave missile in advance.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Attack time and attach angle constrained guidance strategy

The invention discloses an attack time and attach angle constrained guidance strategy. The attack time and attach angle constrained guidance strategy comprises the following steps of using a two-dimensional horizontal plane where a missile and a target are located as an attack plane, establishing a missile and target mathematical model and acquiring a missile sight angle second-order dynamic equation; designing the guidance strategy based on a virtual collision point, dividing the guidance process into two stages, designing an attack angle constrained guidance law based on the virtual collision point for the first stage and designing a proportional guidance law for the second stage; designing a switching strategy of the attack angle constrained guidance law and the proportional guidance law based on the virtual collision point; and adjusting the location of the virtual collision point. By means of the guidance strategy based on the virtual collision point, there is no need to conduct linearization and differential equation conversion based on the cross-range on the model and depend on estimation on remaining time information; the attack time and attach angle constrained guidance strategy is applicable to target moving tasks under multiple constraint conditions and has the characteristics that the design method is simple, and the applicability is high.
Owner:BEIHANG UNIV

Multiple missile collaborative ballistic planning method to deal with penetration

ActiveCN107818219ARadar threat is smallLow detection threatDirection controllersDesign optimisation/simulationNonlinear optimal controlRadar equation
The invention provides a multiple missile collaborative ballistic planning method to deal with penetration. The method comprises the specific steps that step 1, based on the radar equation, a radar threat quantification model is established to describe the threat of a radar detection area to a missile; step 2, a collaborative control model is established, the collaborative control model comprisesa collaborative time control model and a collaborative angle control model; step 3, a collaborative attack problem is converted into a nonlinear optimal control problem which is solved based on a hp-self adaptive Radau pseudospectral method, which means at one moment of the flight, the remaining flight time of each missile is determined, whether or not a collaboration is necessary, if necessary, the time for the collaborative attack is calculated and the missile to be adjusted is determined, and the collaborative ballistic planning is conducted on the missile needs to be adjusted. According tothe multiple missile collaborative ballistic planning method, multiple missiles attacking a target on the same attacking time and with the same attacking angle is ensured; meanwhile, the radar detection threat is smallest during the flight, and the comprehensive combat effectiveness is effectively improved.
Owner:NAT UNIV OF DEFENSE TECH

Guidance law analysis method with attack time and seeker view field constraint

ActiveCN109614756AGuaranteed Field of View ConstraintsAttack time constraintsDesign optimisation/simulationSelf-propelled projectilesDependabilityAnalysis method
The invention discloses a guidance law analysis method with attack time and seeker view field constraint. The method comprises the following steps: establishing a guidance equation of intercepting a static target in a two-dimensional horizontal plane by a missile; designing an intermediate variable related to the missile preposition angle, and converting the guidance equation into a differential equation based on the intermediate variable to obtain a guidance law expression; designing a quadratic function based on the intermediate variable as an expected relative distance curve; realizing theview field angle constraint of the seeker through the condition that the first derivative of the expected curve is greater than zero; and based on boundary conditions and attack time constraints, unknown parameters of the expected curve are solved, and a guidance law and an attack time reachable domain in an analysis form are obtained. The method adopts an analysis method based on relative distance remodeling, does not need to linearize the model, does not depend on estimation of remaining time, is suitable for guidance tasks with attack time constraint and limited strapdown seeker field of view, and has the characteristics of simple design, high reliability, strong applicability and the like.
Owner:BEIHANG UNIV

Method and device for determining Web application protecting effect

ActiveCN108229176ADetermining the effectiveness of protectionPlatform integrity maintainanceRisk levelEvent type
The embodiment of the invention discloses a method and device for determining the Web application protecting effect. The method comprises the steps of obtaining an attacking log within a set durationof a to-be-evaluated system, and determining all kinds of attacking accidents according to the types and attacking times of the attacking accidents; determining the risk value of each type of attacking accident according to the attacking time, the number of the attacking accidents and the risk level of the attacking accident; then determining the protecting effect value of the to-be-evaluated system according to the risk values of all kinds of attacking accidents. As can be seen, since the risk values of all kinds of attacking accidents can be independently measured according to two factors ofthe attacking times and the number of the attacking accidents, and the risk value of each kind of attacking accident can show the attacked severity degree of the to-be-evaluated system when the accident takes place and show the protecting effect of sites under the to-be-evaluated system, and therefore, the overall protecting effect and the attacked severity degree of the to-be-evaluated system can be accurately and visually determined according to all the risk values.
Owner:NSFOCUS INFORMATION TECHNOLOGY CO LTD +1

Method for preventing beaconing devices from being forged or copied

The invention relates to the technical field of wireless Internet, in particular to a method for preventing beaconing devices from being forged or copied. The method comprises the following steps: selecting main signal IDs to be unchanged by the beaconing devices, and selecting N secondary signal IDs in a pseudorandom manner and changing along with time, wherein the main signal IDs and the secondary signal IDs form beaconing signals; recording the main signal IDs, the attack time T0 of the devices and a group of secret keys K1,..., KN for generating secondary signals by the beaconing devices, recording the main signal IDs of all the beaconing devices and the corresponding secondary signal secret keys by a server, and simultaneously the beaconing devices and the server reaching an agreement on the pseudorandom function SLAVE_ID for calculating the secondary signal IDs and time step delta T; broadcasting the beaconing signals by the beaconing devices, filtering the beaconing signals in a service range by an open platform, and verifying true and false of the beaconing signals by the server. The method has the beneficial effects that forged and copied third-party devices still can be identified under the condition that the open platform is free of a forging and copying preventing mechanism, so that the security of the third-party devices under the open platform is guaranteed.
Owner:杭州微飞胜科技有限公司

Electronic musical instrument

An electronic musical instrument includes: an input device that inputs a sound generation instruction that instructs to start generating a musical sound and a stop instruction that instructs to stop the musical sound being generated by the sound generation instruction; a sound source that starts generation of a musical sound in response to the sound generation instruction, and stops generation of the musical sound in response to the stop instruction; an on-on time timer device that measures a time difference between a first sound generation instruction inputted by the input device and a second sound generation instruction inputted next to the first sound generation instruction; a gate time timer device that measures a time difference between the second sound generation instruction and a stop instruction that instructs to stop a musical sound generated in response to the second sound generation instruction; an attack characteristic setting device that sets an attack characteristic of the musical sound generated in response to the second sound generation instruction to have a shorter attack time as the time difference measured by the on-on time timer device becomes shorter; a release characteristic setting device that sets a release characteristic of the musical sound generated in response to the second sound generation instruction to have a shorter release time as the time difference measured by the gate time timer device becomes shorter; and an instruction device that instructs the sound source to start generation of a musical sound with an attack characteristic set by the attack characteristic setting device in response to an input of the second sound generation instruction by the input device, and instructs the sound source to stop generation of a musical sound with a release characteristic set by the release characteristic setting device in response to an input of the stop instruction by the input device.
Owner:ROLAND CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products