首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 328 毫秒
1.
为掌握带内双频电磁辐射对雷达的虚警干扰规律,以频率步进连续波雷达为研究对象,基于理论分析与效应试验,研究了虚警目标的电平变化规律、波形特征以及出现位置规律。结果表明:受试雷达在带内双频电磁辐射作用下,不考虑互调干扰时,至多产生两个位置随机的“山丘型”虚警目标,两者距离差与双频干扰频差有关。双频干扰中两分量互相压制,即当任一干扰分量强度恒定时,随着另一个分量的增强,前者形成的虚警目标电平缓慢下降,最终降速基本恒定,而后者形成虚警目标电平逐渐升高,直至电平恒定;若双频干扰信号两分量同比例增强,则两个虚警目标电平均在初期近似线性上升,而后增速逐渐降低至零。  相似文献   

2.
杨勇  冯德军  肖顺平 《现代防御技术》2013,41(1):126-130,153
分析了密集多假目标干扰对雷达CFAR检测的影响.首先介绍了密集多假目标产生机理,给出了3种不同功率调制方式的密集多假目标干扰产生方法,在此基础上,以雷达一次搜索周期内虚警、漏警造成的检测代价作为检测性能指标,分别分析了单元平均恒虚警检测器、有序恒虚警检测器、剔除和平均恒虚警检测器在3种密集多假目标干扰方式下的检测代价.仿真结果表明:密集多假目标干扰环境下,检测代价受假目标间距影响明显,受假目标干扰功率影响较小,雷达采用单元平均恒虚警检测器付出的检测代价较采用有序恒虚警检测器、剔除和平均恒虚警检测器付出的检测代价小.  相似文献   

3.
箔条云在扩散过程中随着时间变化会稀释和扩大,其回波特性会发生改变,被检测目标与箔条的相互位置关系也会影响雷达恒虚警检测。针对作战对抗过程中箔条干扰易造成雷达接收机阻塞干扰目标检测,检测概率迅速降低且易丢失目标贻误战机,通过详细分析箔条的扩散过程及信号频谱特性及其箔条云和目标的两种位置关系,利用恒虚警处理算法在噪声基底为10 dB和20 dB情况下对目标进行恒定虚警率检测研究。研究结果对改善飞机检测性能和抗虚警能力以及提高战场生存率具有积极作用。  相似文献   

4.
间歇采样转发假目标对CFAR检测影响分析   总被引:1,自引:0,他引:1       下载免费PDF全文
分析间歇采样转发形成的假目标干扰对雷达CFAR检测的影响和间歇采样转发假目标生成机理,给出间歇采样转发假目标产生方法。在此基础上,以雷达一次搜索周期内虚警、漏警造成的检测代价作为检测性能指标,分别分析单元平均恒虚警检测器、有序恒虚警检测器、剔除和平均恒虚警检测器在间歇采样转发假目标干扰下的检测代价。着重分析间歇采样转发干扰关键参数对检测代价的影响。仿真结果表明,间歇采样转发产生的多个假目标显著提高了雷达的检测代价,检测代价受转发占空比、转发功率的影响较大,而受转发频率影响较小。在三种恒虚警检测器的对比中,剔除和平均恒虚警检测器相对于另两种检测器的检测代价更大些。  相似文献   

5.
证明了形状参数已知条件下有序统计平均恒虚警检测器在韦布尔分布杂波背景下具有恒虚警性能,推导了该背景下OSCA-CFAR检测器对非起伏目标的检测概率Pd和平均判决阈值的解析表达式,用数值方法讨论了尺度参数和序值变化对检测性能的影响,最后分析了多目标情况下该检测器的性能,并于有序统计进行了比较,分析结果表明OSCA在多目标环境下具有较好的检测性能.  相似文献   

6.
为了提高PD雷达杂波环境下的目标检测性能,研究了机载PD雷达恒虚警检测问题。重点分析了频域均值恒虚警处理的基本原理与处理方法,采用不同方法对雷达面临的典型杂波分布信号模型进行了性能仿真分析。仿真结果表明,最大选择恒虚警处理方法能够达到预期效果。  相似文献   

7.
为增强复杂电磁环境中同时收发认知抗干扰通信系统的性能,研究了基于该系统的改进能量检测算法,推导出瑞利衰落信道中系统的检测概率、虚警概率及中断概率的理论表达式。该改进方法思想是将自干扰信道容量与接收机所需传输速率进行比较,通过比较结果确定能量检测门限值。仿真结果表明,改进能量检测算法能够有效地降低自干扰信号对同时收发认知抗干扰接收机的不利影响,提升系统的中断性能。  相似文献   

8.
基于数字射频存储(digital radio frequency memory,DRFM)技术的转发式欺骗干扰与真实雷达回波高度相干,这导致雷达难以分辨真假目标。针对该问题,提出一种基于Hough变换的DRFM欺骗干扰检测方法。建立基于线性调频的干扰信号模型,分析其谐波分量的频谱特性,采用短时傅里叶变换和二维恒虚警率检测器对干扰信号进行特征提取,并利用Hough变换完成欺骗干扰检测。所提方法是基于DRFM欺骗干扰本身的特征,不依赖于先验信息与应用场景,计算复杂度低,且在低信噪比条件下具有良好的检测性能。计算机仿真实验验证了方法的有效性。  相似文献   

9.
针对传统CFAR(Constant False Alarm Rate)检测器不能同时适应于均匀和非均匀杂波背景的问题,提出了一种改进的CFAR检测器,即IEGOS(Iterative Excision Greatest of Switching)-CFAR检测器。在迭代删除的基础上,采用Switching方法,利用检测单元幅度自适应选择参考单元,得到前后滑窗的局部杂波功率估计,然后取二者中的最大值作为总的杂波功率估计,实现恒虚警检测。在SwerlingⅡ型目标和瑞利包络杂波分布的假设下,推导证明了IEGOS的恒虚警性,与CA、GO、SO、OS和EXS算法的对比分析表明IEGOS在均匀杂波、多目标干扰和杂波边缘中均拥有较好的性能,且该算法无需排序,便于工程实现。  相似文献   

10.
车载UWB SAR干扰自适应抑制新方法   总被引:1,自引:1,他引:0       下载免费PDF全文
在分析车载超宽带合成孔径雷达(UWB SAR)探测系统中干扰类型及其产生机理的基础上,针对Tsaipei Wang等提出的批处理方法的局限性,提出一种基于迭代运算的图像域自适应干扰抑制方法.该方法利用基于韦布尔分布的恒虚警率(CFAR)检测器提高干扰信号估计的准确性;采用迭代方法在线估计和更新参数,实现干扰的自适应抑制.实测数据处理结果表明:该方法可有效抑制自信号干扰,且结构上适于实时处理,可满足车载UWB SAR探测系统对图像预处理的要求.  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号