首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
为了解决强干扰背景下常规空间谱估计算法对弱信号不能正确测向的问题,基于均匀圆形阵列(UCA),提出了一种扩展噪声子空间弱信号波达方向(DOA)估计算法。首先将强干扰方向向量并入噪声子空间形成扩展噪声子空间,然后构造波束函数和新的方向向量进行谱峰搜索。本算法能有效抑制强干扰的影响,对弱信号方向进行正确估计。最后计算机仿真实验验证了本算法的有效性和正确性。  相似文献   

2.
为实现对强度弱、波达方向比较接近以及信号相干等干扰信号波达方向的准确估计,提出了基于空时滤波的弱干扰信号波达方向估计方法,并在低干噪比条件下分别对一般非相关、波达方向接近非相关以及相干干扰进行了仿真分析。结果表明:所提出方法能够准确估计一般非相关弱干扰信号的波达方向,估计角度偏差不超过0.5°;能够较准确估计角度偏差不低于10°的非相关和弱相干干扰的波达方向,估计角度偏差分别不超过1.4°和1.3°;该方法还具有对干扰信号波达方向角度偏差和干噪比敏感度较低的优点,可为复杂电磁环境下干扰源的准确测向定位提供技术支撑。  相似文献   

3.
MUSIC算法能对独立信号的波达方向(DOA)进行有效估计,但该算法对相干信号或强相关信号进行DOA估计时,算法性能会随着相关系数的增加而急剧恶化甚至失效.针对该问题,利用前后向空间平滑技术与修正MU—SIC算法进行去相关,研究了它们去相关的基本原理及优缺点;利用MUSIC算法通过实验仿真对相关信号的波达方向估计性能进行了研究,分析了信号间相关系数对前后向空间平滑算法与修正MUSIC算法的测向性能的影响,并验证了算法去相关的有效性.  相似文献   

4.
针对空间非平稳高斯噪声背景下混合信号的DOA估计问题,提出了基于四阶累积量对混合波源的DOA估计算法。该算法首先构造四阶累积量矩阵,利用类似ESPR IT方法估计出所有非相关信源的DOA,然后对四阶累积量进行修正空间差分平滑去相干,消除非相关源和空间非平稳高斯噪声的影响,从而实现了对相干源的DOA估计。此方法通过分别估计非相关和相关或者相干信号的DOA,能够以较少的阵元实现对多个信号DOA估计,最后仿真实验也验证该算法的有效性。  相似文献   

5.
针对传统测向方法的实际应用性能较差,提出一种基于压缩感知(CS)的卫星干扰源定位方法。根据干扰信号方位角的空间稀疏性,建立了压缩感知波达方向(DOA)估计模型。通过协方差矩阵的高阶幂逼近信号子空间和矩阵的共轭对称特征,利用高阶幂矩阵的主对角线下左下角列向量进行波达方向估计。仿真实验验证,该方法不需要已知干扰源数,具有较高的精度和较好的分辨力,且能满足对相干干扰信号的估计。对压缩感知DOA估计在卫星干扰源定位中的应用具有一定参考意义。  相似文献   

6.
从独立分量分析的角度探讨了共址干扰抑制问题,并提出了基于互信息最小准则的干扰抑制算法。该算法利用了信号的高阶统计信息,兼顾了复杂度和精度,并且能够有效地抑制非高斯性干扰。为使算法稳定,对权值迭代公式进行了归一化处理;给出了新的共址干扰抑制滤波器结构;分析了算法稳定收敛的充分条件。仿真实验表明:该算法能够很好地将弱有用信号从强干扰信号中分离。  相似文献   

7.
针对基于l1范数约束的稀疏表示DOA(Direction Of Arrival)估计算法对初始参数较为敏感的问题,提出了一种基于稀疏贝叶斯学习的DOA估计算法。首先通过信号来波方向的空间采样构造冗余字典,将阵列信号处理中的DOA估计信号模型转化为压缩感知中的稀疏重构信号模型。然后基于经验贝叶斯推理的方法,将待估计的稀疏系数值用方差未知的联合高斯分布描述,而未知的方差值决定了待估计系数的稀疏性。通过观测数据估计得到未知的方差,进而得到信号的DOA估计值。仿真结果表明,提出的算法有较高估计精度,并且对非相干信源和相干信源都具有较好的估计性能。  相似文献   

8.
传统的DOA估计方法不能有效分辨相干源目标;稀疏重构方法能够处理相干源的DOA估计问题,但现有稀疏重构方法大都是针对无噪声或仅存在观测噪声系统提出的,估计性能有待提高。对于同时存在观测噪声和模型噪声的多观测量模型,提出了一种基于FOCUSS稀疏重构的改进算法,可鲁棒地处理相干源、非相干源的DOA估计问题,有效提高分辨力和估计精度等估计性能。给出了DOA估计的稀疏信号模型以及新算法的推导过程,仿真实验证明了新算法在与其他算法对比时的优越性。  相似文献   

9.
提出了一种基于修正的旋转信号子空间(rotational signal subspace,RSS)算法的跳频信号和跟踪干扰信号波达方向(direction of arrival,DOA)估计方法。首先,将接收到的跳频信号和跟踪干扰信号进行离散傅里叶变换;然后,利用修正RSS算法,得到聚焦后协方差矩阵的估计值;最后,利用MUSIC算法,实现跳频信号和相关干扰信号的DOA估计。仿真结果验证了该方法的有效性。  相似文献   

10.
提出了一种基于四阶累积量稀疏表示的估计方法,解决信号数多于阵元数时的DOA估计问题。该方法首先构造了包含所有DOA信息的最小冗余矢量,利用扩展阵列的最小冗余导向矢量构造完备字典减小完备字典的复杂度;然后利用L1范数作为稀疏约束条件建立稀疏模型进行DOA估计。理论分析和仿真实验,验证了该方法能够估计出的信号个数大于阵元数目,可直接应用于相干信号,比MUSIC-like算法具有更好的性能。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号