首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
供短波单边带通信设备使用的全固态高线性宽带高频功率放大器,最近由通信工程学院电子线路教研室研制成功。这种全固态电路高频功率放大器,电路结构紧凑。它的频带宽,可以覆盖整个短波波段。采用功率合成技术,输出功率(PEP)可达到1kW 以上;三阶以上互调失真产物优于-32dB(采用标准的双音测试方法)。根据某工程的要求,目前已研制成下列几种不同技术指标的宽带高频功率放大器:(1)输出峰包功率:P_o≥50W;频率范围:2~30MHz;三阶互调失真产物 IMD_3≤-36dB。三阶以上互调失真产物优于-36dB。(2)输出峰包功率:P_o≥250W;频率范围:2~30MHz;IMD_3≤-32dB。(3)输出峰包功率:P_o≥460W;频率范围:.2~30MHz;IMD_3≤-32dB。以上几种全固态宽带高频功率放大器也可应用于现代高频通信设备及其它电子设备。  相似文献   

2.
本文从单边带信号互调失真的数学分析出发,导出了互调失真分量的包络重复频率与等幅双音调制信号包络重复频率的关系,从而突破了单边带信号互调失真的传统测试方法,代之以新的测试原理和方法——包络分析法,为单边带信号互调失真测试开辟了新的途径。文中提出了构成单边带信号互调失真测试系统的结构框图,简单介绍了其工作原理,并对系统误差作了分析和估算。最后给出了据此设计的单边带信号失真仪的实际测量精度。  相似文献   

3.
基于升余弦滤波的基带预失真环路延迟补偿   总被引:1,自引:0,他引:1  
传统的基带预失真环路延迟估计和补偿方法估计过程复杂,收敛速度慢,补偿信号存在混迭失真,影响预失真系统的性能。为此,提出了一种新的基带预失真器环路延迟估计和补偿方法,该方法采用黄金分割法完成环路延迟搜索,用升余弦滤波器完成环路延迟补偿。其环路延迟估计搜索速度快,准确度高,环路延迟补偿后信号失真小,应用该方法的基带预失真系统NMSE指标较传统方法优化17 dB。  相似文献   

4.
传统的基于间接学习结构的预失真技术通常仅考虑对单个地面功放或卫星功放进行补偿,线性化性能有限;文中联合地面功放与卫星功放的非线性失真和卫星信道的实际传输特性,提出了一种适合透明卫星功放的星地一体间接学习预失真算法。该算法利用记忆深度为5、非线性阶数为9的奇偶项多项式作为预失真器,同时采用最小均方(LMS)与递归最小二乘(RLS)联合的算法自适应更新预失真器的系数,以兼顾运算量和收敛速度。仿真结果表明,经过星地一体预失真后,卫星高功放输出端APSK星座图误差矢量幅度改善值达到91.52%,带外功率谱抑制平均提升了11.41dB,系统线性化性能非常理想。  相似文献   

5.
在高动态卫星导航信号模拟器中,信号多普勒频移模拟是一项关键技术。结合现场可编程门阵列的特点,建立了分析混合时钟三阶直接数字频率综合(DDS)输出相位的仿真模型,推导了其输出相位表达式,给出了各阶DDS初始累加控制字的计算方法,并指出等时钟三阶DDS仿真模型仅为混合时钟仿真模型的特例。在分析了混合时钟速率对信号相位模拟造成的误差后,讨论了各阶DDS的字长设计方法,并与等时钟三阶DDS进行比较,说明了采用混合时钟三阶DDS可以降低实现资源消耗和功耗。仿真分析表明,所提方法可以实现对信号多普勒特性的高精度模拟。  相似文献   

6.
通信系统中互调干扰的分析   总被引:1,自引:0,他引:1  
互调干扰可以对通信系统产生不良影响。简述了互调产物产生的基本原理,对通信系统中的有源互调和无源互调的产生根源和减小措施进行了分析,为通信系统的分析和设计提供理论依据。  相似文献   

7.
针对正交频分复用(OFDM)系统中高功率放大器(HPA)固有的非线性特性导致频谱再生和邻道干扰等问题,介绍了一种高功率放大器的自适应预失真技术,该技术采用查表法对信号进行预失真。本文用M AT-LAB仿真研究分析了基于查表法自适应基带预失真算法的有效性。仿真实验表明:该预失真算法可以有效地降低放大器所带来的OFDM信号频谱再生等非线性失真,提高了系统的性能。  相似文献   

8.
DDS+PLL Hybrid结构兼顾DDS和PLL的优势,但也兼具DDS和PLL的缺点:宽带信号性能较差;零相位误差跟踪的实现难度大;环路稳定性差;较长的捕获时间;调频斜率受限等。提出了在传统的DDS+PLL Hybrid结构中增加频率扫描电路的方法,能够有效降低环路设计难度,提高了捕获速度。扫频电路使大带宽、短脉冲的调频信号的产生成为可能。同时提出了预失真相位补偿的方法,极大地提升了信号的脉压性能。设计了实验电路,对所提出的电路结构和相位补偿方法进行了验证。试验结果表明,在环路带宽为1MHz和2MHz时,环路的捕获时间分别减小为2.175μs和1.032μs;相位误差小于4°;信号的脉压性能接近理想,主瓣宽度与理想值相同,PLSR优于-38dB,ISLR优于-9.5dB。  相似文献   

9.
分析了当前文献中几种主要的预失真结构,发现这些预失真结构均不适用于多通道宽频带短波通信中高功率放大器的线性化.提出了一种新的数字射频预失真方案,该方案能够完全适应短波宽频通信的高精度、多通道、宽频带的要求,而且不需要使用射频非线性有源器件.仿真结果表明,在短波通信系统采用这种方案,可以在很大程度上改善功率放大器的线性度.  相似文献   

10.
针对调制气流声源存在较强的谐波畸变,将声源系统等效为Hammerstein非线性模型,利用该模型下的预失真技术对声源进行非线性补偿研究。根据辨识的Hammerstein模型中静态非线性部分带有直流分量的特点,给出了考虑直流分量补偿的预失真算法,并用数值仿真验证了算法的准确性和直流分量补偿的必要性。在非线性补偿实验中,根据单频信号辨识得到Hammerstein模型参数,采用NFxPEM算法求得对应的预失真Wiener模型参数和预失真波形。实验结果表明,与直接发射相比,补偿发射后声波的功率谱中谐波能量有所下降,而基频能量有小幅度的上升,说明了研究思路的正确性。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号