首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
波达方向(DOA)估计是阵列信号处理领域的热点问题,但经典的DOA估计方法通常要求阵元数大于源信号个数,即满足超定条件。而在实际中往往面临的是源信号个数大于阵元数目的欠定条件。提出了一种基于空间时频分布的MUSIC扩展算法,该算法通过将空间时频分布矩阵进行拓展,实现了欠定条件下的DOA估计。相比时频MUSIC算法,该算法能同时适应超定和欠定条件;相比已有的欠定DOA估计方法,该算法在保证DOA估计精度的情况下,放宽对源信号稀疏性的要求,同时降低对快拍数的要求。仿真实验结果表明了本文算法的有效性。  相似文献   

2.
针对欠定混合信号的源个数估计问题,提出了一种基于空间时频分布与奇异值分解的估计算法,把所有自源时频点对应的空间时频分布矩阵组成三阶张量,把欠定混合问题转化为超定问题,通过对三阶张量对应的矩阵进行奇异值分解估计出源信号的数目,该方法不需要假设源信号是稀疏的或独立的,理论分析和仿真结果验证了算法的有效性.  相似文献   

3.
提出一种基于内插阵列变换的非圆信号MUSIC实值算法(VIA-NC-MUSIC实值算法).首先利用真实阵列流型与虚拟阵列流型之间的变换矩阵,将真实阵列输出转换为虚拟阵列输出,再根据信号源为实数的特点,分别求取虚拟阵列输出的实部和虚部,将其串联组合,扩展阵列输出的维数,进而得到一种多重信号分类(MUSIC)的波达方向(DOA)估计算法.还分析了VIA-NC-MU-SIC实值算法的计算复杂度,并与复运算的复杂度进行了比较,新算法的复杂度相对较低.仿真实验表明:存在阵元位置误差的情况下,新算法通过对阵元位置校准数据进行内插阵列变换(VIA),取得与阵元位置校准的非圆信号MUSIC算法(NC-MUSIC算法)相当的估计性能,保持了高估计精度、高分辨力,并且在二维阵元位置误差情况下,新算法的估计性能明显优于阵元位置未校准的NC-MUSIC算法.  相似文献   

4.
提出一种相干信号二维波达方向(Direction of Arrival,DOA)估计算法——模式空间波达方向矩阵(Mode-Space DOA Matrix,MS-DOAM)法。算法基于双圆阵,利用模式空间转换将圆阵转换为虚拟双平行线阵,计算虚拟线阵阵元间的互相关信息,构造两个等效协方差矩阵,进而构造波达方向矩阵,对该波达方向矩阵特征分解,利用得到的特征值与特征矢量求得入射信号的仰角和方位角。算法无需二维搜索,实现估计参数自动配对。仿真结果表明,算法在低信噪比和短快拍条件下,估计误差低于虚拟空间平移算法。  相似文献   

5.
提出了一种基于四阶累积量稀疏表示的估计方法,解决信号数多于阵元数时的DOA估计问题。该方法首先构造了包含所有DOA信息的最小冗余矢量,利用扩展阵列的最小冗余导向矢量构造完备字典减小完备字典的复杂度;然后利用L1范数作为稀疏约束条件建立稀疏模型进行DOA估计。理论分析和仿真实验,验证了该方法能够估计出的信号个数大于阵元数目,可直接应用于相干信号,比MUSIC-like算法具有更好的性能。  相似文献   

6.
针对嵌套阵列DOA估计实时性不好的问题,提出了一种基于单快拍数据的估计算法。该算法将嵌套阵分为阵元间距等于信号半波长和阵元间距大于信号半波长的两个均匀子阵。利用两子阵接收的单快拍数据分别构造Toeplitz矩阵,然后进行特征值分解结合MUSIC算法得到低精度无模糊的DOA估计和高精度有模糊的DOA估计,最后结合解模糊算法得到高精度无模糊DOA估计。在阵列孔径相同的条件下,相比于阵元间距等于信号半波长的均匀线阵,算法需要的阵元个数较少,节约了硬件成本。该算法具有较好的实时性,并且拥有较高的测向精度。仿真结果证明了算法的有效性。  相似文献   

7.
利用直接数据域自适应算法的稳态权值代替噪声子空间构建空间谱,构造了一种超分辨波达方向(DOA)估计方法.为了解决谱峰搜索时的伪峰问题,采用参考阵元轮换得到多组线性无关稳态权值,逼近噪声子空间,能有效去除伪峰.针对相干信号的DOA估计,进一步提出了直接数据域取对称共轭向量的解相干方法.相比子空间分解类算法,本文算法不需估计信号源数目和协方差矩阵、不需特征分解,复杂度仅为O(MP),同时能有效完成解相干处理.  相似文献   

8.
针对衰减-延迟欠定混合通信信号的盲分离问题,提出了一种基于子空间最小距离的源信号估计算法,通过计算观测信号到混合矩阵列矢量张成子空间的距离,估计任意时频点同时存在的源信号数目以及当前源信号对应的混合矩阵列矢量,把欠定混合问题转化为超定问题,然后通过计算Moore-Penrose逆矩阵求解源信号,理论分析和仿真结果验证了算法的有效性。  相似文献   

9.
针对欠定混合盲辨识问题,提出了一种基于时频单源点检测及聚类验证的盲辨识算法。检测各个源信号的时频单源点,利用奇异值分解的方法求解不同单源点集合对应的混合矢量,利用基于k均值的聚类验证技术完成源信号数目和混合矩阵的联合估计。算法放宽了已有方法对时频单源区域的假设,不需要假设信号存在时频单源区域,可以完成仅存在离散的时频单源点条件下的欠定混合盲辨识;同时克服了传统算法需要假设源信号个数已知的不足,可以有效地估计源信号数目。仿真结果验证了算法的有效性。  相似文献   

10.
针对欠定混合盲辨识问题,提出了一种基于时频单源点检测及聚类验证的盲辨识算法。检测各个源信号的时频单源点,利用奇异值分解的方法求解不同单源点集合对应的混合矢量,利用基于k均值的聚类验证技术完成源信号数目和混合矩阵的联合估计。算法放宽了已有方法对时频单源区域的假设,不需要假设信号存在时频单源区域,可以完成仅存在离散的时频单源点条件下的欠定混合盲辨识;同时克服了传统算法需要假设源信号个数已知的不足,可以有效地估计源信号数目。仿真结果验证了算法的有效性。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号