首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
卫星导航接收机跟踪信号的能力取决于锁相环的跟踪精度,相位鉴别器在锁相环设计中具有重要地位。针对点积鉴相器和二象限反正切鉴相器在输入信号有限字长效应下,对鉴相器性能的影响问题,建立了鉴相器有限字长误差模型。通过理论推导输入信号的统计特性,计算得到鉴相器输入信号均值和方差表达式,并分析了有限字长对鉴相器的均值和方差、收敛区间和鉴别增益的影响情况。由理论和仿真验证,得出了鉴相器在输入信号有效位数3比特以上时,对环路跟踪精度没有影响的结论。  相似文献   

2.
测距精度是评估卫星自主完好性监测接收机在导航信号畸变环境下工作性能的一个重要指标。推导了卫星自主完好性监测接收机在国际民航组织二阶阶跃畸变模型下采用早晚相干跟踪处理时测距精度与畸变模型参数的解析表达式,理论分析和仿真结果表明数字畸变将导致接收机伪码鉴相器输出曲线存在过零点偏差,数字畸变量基本不影响接收机测距方差;模拟畸变将扭曲相关峰函数和鉴相器输出曲线,但鉴相器输出基本上不存在过零点偏差,模拟畸变参数、前端滤波器带宽和早晚码间距共同影响接收机的测距方差。  相似文献   

3.
测距精度是评估卫星自主完好性监测(SAIM)接收机在导航信号畸变环境下工作性能的一个重要指标,论文从数学上推导出了SAIM接收机在国际民航组织(ICAO)二阶阶跃畸变模型下采用早晚相干跟踪处理时测距精度与畸变模型参数的解析表达式,理论分析和仿真结果表明数字畸变将导致接收机伪码鉴相器输出曲线存在过零点偏差,数字畸变量基本不影响接收机测距方差;模拟畸变将扭曲相关峰函数和鉴相器输出曲线,但鉴相器输出基本上不存在过零点偏差,模拟畸变参数、前端滤波器带宽和早晚码间距共同影响接收机的测距方差。  相似文献   

4.
伪码跟踪是卫星导航接收机中的关键环节。码环的跟踪精度直接决定了接收机的定位性能,因此对码环跟踪精度的分析一直以来都是研究的热点,并且已经取得了很多重要成果。目前已有的结论大都从频域的角度表示带限信道的影响,但是频域表达式存在计算复杂,难以应用于实际情况的缺点。本文针对目前存在的不足,从时域相关函数的角度提出了码跟踪精度的解析表达式。该表达式简单直观,可以方便地应用于码环性能的分析,对导航信号接收机的设计具有重要的指导作用。  相似文献   

5.
从GPS接收机内部结构入手,给出了GPS接收机码和载波跟踪环的功能以及多路径信号对码跟踪精度的影响;分析了在多路径干扰下.用窄相关器可以部分修正多路径对码环的跟踪误差,详细介绍了一种以窄相关为基础的新的窄相关器技术--微脉冲相关技术,通过与宽的标准相关器和窄相关器在伪距测量精度上的比较,说明了它是一种性能非常好的抗多路径技术.  相似文献   

6.
针对广义信道下伪码测距偏差与各部分通道测距偏差叠加值的等效性问题,研究星地叠加通道和部分通道特性对伪码测距偏差的影响,并对实际通道中伪距"分层"现象的成因展开分析。通道非理想特性会对导航信号伪码跟踪性能产生影响,综合考虑星地两端通道的非理想特性,通过对导航信号伪码跟踪函数和不同类型通道建模,研究了星地叠加通道和部分通道特性对伪码测距偏差的影响。结合几类典型星地非理想通道,利用软件接收机展开仿真验证。通过分析几类典型通道对伪码测距偏差的影响,解释了零基线双差观测量中伪距"分层"现象的成因。文中模型与相关分析方法可用于解释相关信号质量问题,并指导接收机通道的最优化设计。  相似文献   

7.
针对目前卫星导航接收机码环多径抑制技术在二进制偏移副载波类信号下鉴别曲线可能出现多个稳定跟踪位置,导致接收机存在伪距测量的系统性误差的问题,提出最优鉴别曲线设计技术,采用奇异值优化的最小二乘方法,设计无多余跟踪点的本地码相关参考波形。从多径误差包络和跟踪精度两方面,对基于最优鉴别曲线的二进制偏移副载波信号码相关参考波形的设计性能进行验证评估。仿真结果表明:该方法可实现二进制偏移副载波信号在有限接收带宽下的无模糊鉴别曲线设计。以前端带宽为8.184 MHz时的BOC(1,1)信号为例,设计的码相关参考波形相比W2波形,多径误差包络面积增加了61.8%,而跟踪精度提高了4~5 dB。  相似文献   

8.
Costas环路是导航接收机中常用的载波跟踪环路,目前关于环路性能的分析很多,传统的分析方法以及结论均是基于信号功率归一化的乘法鉴别器,且一般认为环路带宽在输入信号信噪比变化过程中是不变的。本文通过对目前数字跟踪环路实现中常用的两种鉴别器(基于总功率归一化的乘法鉴别器和反正切鉴别器)进行精确建模和分析,据此得到了两种鉴别器精确的热噪声跟踪误差表达式,并进行了仿真验证。通过比较可知,在输入信噪比小于4dB时,反正切鉴别器和归一化的乘法鉴别器的性能基本相同,两种鉴别器所能达到的跟踪门限信噪比基本相同。本文的结论可用于精确指导导航接收机的设计。  相似文献   

9.
针对高动态应用环境,研究了两种基于延迟锁定环结构的码环鉴相器算法.首先采用理论分析的方法对两种鉴相器的性能进行了对比,然后利用模拟中频数据和真实中频数据,分别对两种算法在低动态和高动态环境下的鉴相性能进行了实验对比研究.结果表明,两种鉴相器都能对码相位进行准确鉴相和牵引.同时,在对两种方法进行对比分析的基础上,给出了两种鉴相器算法各自适用的条件,对高动态GPS跟踪环路的设计实现有一定的理论指导意义.  相似文献   

10.
为精确分析部分频带干扰下伪码跟踪误差,需要考虑伪码的非理想随机特性。引入伪码的精细功率谱模型,对比分析了不同带宽干扰下基于简化谱和精细谱的码跟踪误差。定义了相对误差系数,用以定量描述伪码非理想随机特性对码跟踪误差的影响。当干扰带宽增大时,相对误差系数逐渐减小,伪码非理想随机特性对码跟踪误差的影响逐渐减小,基于简化谱的分析趋近于基于精细谱的分析。结合GPS L1 C/A码,给出了相对误差小于0.2的最小干扰带宽,并将其作为基于简化谱分析的适用条件。研究表明当干扰带宽大于伪码周期的频率的300倍时,伪码非理想随机特性导致的码跟踪精度变化可忽略,反之,则需要基于精细的功率谱模型进行码跟踪精度分析。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

16.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
19.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号