首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对现有贪婪迭代类压缩感知重构算法对非高斯量测噪声抵抗性差的问题,提出一种盲稀疏度下基于粒子滤波的稀疏信号重构算法。该算法首先将鲁棒性更高的Huber损失函数替代常规的二次损失函数,用来增加对非高斯噪声的抵抗能力;并且引入粒子滤波实现对原始信号的最优估计,以削弱量测噪声的影响;最后在信号稀疏度未知的条件下,结合稀疏度自适应匹配追踪算法实现盲稀疏度下的原信号重构。理论分析和仿真结果表明,所提算法可以有效抵抗因非高斯噪声干扰或稀疏度未知导致的重构精度降低,且重构性能优于现有典型贪婪迭代类算法。  相似文献   

2.
为解决变换域通信系统(Transform Domain Communication System,TDCS)低信噪比环境下宽带压缩感知重建算法在盲稀疏度下无法精确恢复信号的问题,利用频带占用率对稀疏度进行估计,同时结合残差比阈值迭代终止条件,对压缩感知匹配追踪算法(Compressive Sampling Matching Pursuit,CoSaMP)进行改进,提出了一种盲稀疏度的ICoSaMP(Improved Compressive Sampling Matching Pursuit)算法。仿真结果表明,相比于CoSaMP算法,ICoSaMP算法在相同信噪比环境和相同稀疏度条件下的重建概率提高约10%,在盲稀疏度条件下均方误差降低约1.2%。  相似文献   

3.
针对目标跟踪系统下量测噪声统计特性不准确甚至难以获取的问题,提出一种量测噪声统计特性自适应的高斯混合势均衡多目标多伯努利(Cardinality Balanced Multi-Target Multi-Bernoulli,GM-CBMe MBer)滤波算法。该算法引入Sage-Husa自适应滤波器的思想,利用遗忘因子对量测噪声协方差误差进行修正;建立检验统计量,判断算法敛散性;若滤波发散,则采用有偏估计方法来保证算法收敛性。仿真结果表明在非时变、时变量测噪声方差未知情况下,改进算法的跟踪性能优于传统的GM-CBMe MBer滤波算法,对量测噪声的变化具有较强的适应能力。  相似文献   

4.
针对贪婪算法需要以信号稀疏度作为先验信息的问题,基于指数试探思想提出了一种稀疏度自适应重构算法。利用指数函数特性分段试探信号稀疏度,使其快速逼近真实值,通过筛选回退锁定信号的有效支撑集,再采取弱匹配剪枝精确重构出原始信号。能够摆脱对稀疏度的依赖,以高概率自适应重构信号。实验表明,该算法的试探结果更加准确和稳定,重构成功率提高,特别是当稀疏比小于0.25时,算法最少只需3次试探,便可快速估计出信号稀疏度,且成功重构成功率不低于97%。  相似文献   

5.
针对目标跟踪过程中量测噪声概率分布等先验知识无法准确获取的问题,提出一种基于风险评估的势均衡多目标多伯努利(RE-CBMeMBer)滤波算法。采用CBMeMBer算法的序贯蒙特卡洛实现,在粒子预测后利用风险函数和评估函数计算粒子风险值,并用评估结果更新粒子权值。避免了计算似然函数且不依赖量测噪声的概率分布。仿真表明:与SMC-CBMeMBer算法相比,RE-CBMeMBer算法具有更好的实时性,特别是当量测噪声分布未知时,具有更高的跟踪精度和稳定性。  相似文献   

6.
针对基于对称量测方程的多目标跟踪,传统的滤波手段无法解决因对称变换带来的非高斯问题,提出一种新的遗传粒子滤波方法。新的滤波算法利用粒子的噪声含量与权值的负相关,改进了更新过程中权值计算所依赖的概率密度函数,避免了新量测噪声的求解。同时利用遗传算法的优势,保障了粒子的多样性,提高了粒子的使用效率,防止了滤波发散及局部最优。仿真结果表明,基于对称量测方程的多目标跟踪中,改进的遗传粒子滤波算法较扩展卡尔曼滤波算法、不敏卡尔曼滤波算法和联合概率数据关联滤波算法跟踪效果更好。  相似文献   

7.
针对压制干扰环境下传统粒子滤波算法跟踪效果不佳的问题,在传统粒子滤波算法的基础之上,融合压制干扰条件下的有用量测信息,构造了一种新的粒子滤波算法。在算法的实现过程中,通过采用伯努利(Bernoulli)分布重新构造了压制干扰环境下发生量测数据丢失的传感器模型,在此基础上通过充分考虑有效量测值以及量测丢失时的一些有用量测信息,推导出了闪烁噪声条件下的似然函数,直接用于粒子权重更新的计算,并且通过纯方位跟踪以及协同转弯机动模型,仿真验证了该算法极大改善了标准粒子滤波算法的稳定性和提升了粒子滤波算法的估计精度。  相似文献   

8.
针对实际甚低频和超低频接收机不仅受非高斯噪声的影响,同时受到接收机内部和外部环境中高斯噪声影响的问题,对噪声采用高斯尺度混合分布和高斯分布的混合模型建模,根据混合模型的性质,设计了一种基于马尔可夫链蒙特卡罗方法的信号盲检测算法。盲检测算法在贝叶斯层次模型下,采用Gibbs抽样和M-H抽样更新参数,同步检测信道衰落系数、噪声模型参数和信号。算法迭代效率快、精度高。通过与最优检测性能比较,盲检测算法性能优异,对甚低频和超低频信号接收具有重要的现实意义。  相似文献   

9.
由于无人机相对导航系统具有非线性强、噪声非高斯的特点,传统的基于卡尔曼滤波算法设计的相对导航滤波器存在估计失准甚至发散的问题。考虑到高阶容积卡尔曼滤波和最大熵滤波算法分别在解决非线性问题和非高斯问题时的优势,利用最大熵滤波的量测更新方法对高阶容积卡尔曼滤波的测量更新方程进行了改进,将传统的量测更新问题转换成了线性衰退的求解问题,避免了对测量噪声进行高斯假设,同时解决了系统非线性和量测噪声非高斯的问题。进行了相应的数学仿真,仿真结果表明:所提算法的估计精度超过了高阶容积卡尔曼滤波和最大熵滤波算法的,验证了算法的有效性。  相似文献   

10.
基于贝叶斯滤波原理,介绍了粒子滤波(Particle Filter,PF)的基本思想和具体算法实现步骤。针对非高斯噪声对水下信号目标跟踪的影响,分别对符合高斯分布、韦伯分布和伽马分布的随机噪声序列,在噪声均值和方差相同的条件下,对比分析了扩展卡尔曼滤波(Extended Kaman Filter,EKF)算法和PF算法的估计精度。仿真结果表明,在非线性非高斯环境下EKF算法跟踪性能严重下降,而PF算法能继续保持较好的跟踪精度,证明PF算法在非线性非高斯系统中的有效性。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号