首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 231 毫秒
1.
接收机在进行窄带干扰抑制后,其输出信号的相关峰会发生分裂。使用传统的基于信号到达时间的抗转发欺骗干扰算法,会使得捕获锁定的相关值为真实信号的旁瓣。针对该问题提出一种基于局部相关值最大的时延检测方法,在真实信号相关峰分裂所产生的旁瓣与欺骗信号不重合前提下,通过对主瓣三个码片范围内最大值的搜索,保证捕获不会锁定在旁瓣,再选择局部最大值中的最早码相位点从而避免锁定到转发欺骗干扰。与传统的基于信号到达时间的抗转发欺骗干扰算法相比,在无窄带干扰情况下,所提算法性能相当;在存在窄带干扰情况下,其性能明显优于传统算法。通过数值仿真验证了方法的有效性。  相似文献   

2.
GPS天线信号到射频前端变换后的中频信号,再经模拟数字转换,便可得捕获与跟踪的原始信号.采用专用集成电路设计的GPS接收机极大地限制了用户对这原始信号的性能分析和新算法的自由开发.先对GPS信号的形成和接收机的结构作扼要介绍,再对GPS信号的捕获与跟踪进行算法研究与仿真实现.结论表明通过仿真技术能有效地复现出捕获和跟踪的GPS信号.  相似文献   

3.
改进的GPS弱信号差分捕获方法研究   总被引:1,自引:0,他引:1  
捕获是GPS接收机信号处理中的关键部分,在微弱信号情况下,传统的弱信号捕获方法不能很好地捕获到卫星信号,采用一种改进的GPS弱信号差分捕获方法来进行捕获研究.并对一组GPS的数据信息,分别采用以上2种方法对其进行捕获仿真.结果显示,新方法可以捕获到较微弱的GPS信号,提高了接收机的灵敏度.  相似文献   

4.
存在窄带干扰情况下,接收机在进行干扰抑制后,其输出信号的相关峰会发生分裂,使用传统的基于信号传输时延的抗转发欺骗干扰方法,会使得捕获锁定的相关值在真实信号的旁瓣。针对该问题提出了一种基于局部相关值最大的信号时延检测方法,在真实信号相关峰分裂产生的旁瓣与欺骗信号不重合前提下,通过对两个码片范围内最大值的搜索,保证捕获不会锁定在旁瓣,再通过选择局部最大值中最早码相位点来避免锁定到转发欺骗干扰。与传统的方法相比,在无窄带干扰情况下,其与基于信号传输时延的抗转发欺骗干扰方法性能相当,在存在窄带干扰情况下其性能明显优于传统的基于信号传输时延的抗转发欺骗干扰方法。通过数值仿真验证了本文方法的有效性。  相似文献   

5.
GPS欺骗式干扰具有发射功率小,抗干扰难度大的特点,分为转发式干扰与产生式干扰。利用卫星信号模拟器产生包含错误导航信息的GPS民用C/A码欺骗信号,通过直接侵入和压制式干扰辅助两种方式进入接收机的捕获跟踪环路,对已定位的某款GPS接收机实施欺骗干扰。试验结果表明,直接侵入方式下,通过合理控制欺骗信号功率,接收机定位被扰乱,但定位结果并未被成功欺骗至预设位置;压制式干扰辅助方式下,接收机成功误定位于预设位置,验证了对GPS接收机进行欺骗式干扰的可行性。  相似文献   

6.
针对GPS接收机设计中,接收机信号跟踪精度同信号处理的实时性不能兼顾的特点,设计了一种基于DSP+FPGA的数字GPS接收机实时高精度基带环路.阐述了基带信号处理原理及原有方法的不足,提出了一种改进的GPS信号快速、高精度捕获、跟踪方法.利用信号粗捕后先进行精捕,在提高了信号的捕获精度后再结合二阶锁频环路辅助,最终利用三阶载波科斯塔斯锁相环完成GPS载波信号的高精度稳定闭环跟踪,同时使用载波来实时的辅助码环跟踪,从而完成整个GPS信号的实时高精度跟踪.实验结果表明该基带环路能够实现对GPS信号的快速捕获、实时稳定的高精度跟踪,并具有良好的动态性能.  相似文献   

7.
为提高全球导航卫星系统接收机抑制带内窄带干扰的能力,提出一种采用复系数自适应陷波器的时域滤波干扰抑制方法。在数字基带通过自适应算法调整复数滤波器的频率参数,以实时检测和跟踪窄带干扰的中心频率。仿真结果表明,该方法可以快速、有效地抑制固定频率的窄带干扰和线性调频干扰,提高接收机在干扰条件下的捕获性能。其干扰抑制性能优于实系数自适应陷波器的干扰抑制方法。  相似文献   

8.
GPS微弱信号捕获算法   总被引:1,自引:0,他引:1  
捕获是GPS接收机信号处理中的关键部分,在微弱信号情况下,FFT快速捕获等传统方法不能很好地捕获到卫星信号,将采用一种改进的方法--相关积分与批式捕获相结合的方法进行捕获研究.并对一组GPS实测数据信息,分别采用以上两种方法对其进行捕获仿真.结果显示,采用改进的方法捕获到了较微弱的GPS 信号,提高了接收机的灵敏度,并能有效避免由导航数据位翻转造成的误捕获.  相似文献   

9.
首先分析了GPS制导巡航导弹的制导方法,针对其制导体制中的弱点,探讨了GPS干扰对巡航导弹制导的影响。然后根据压制干扰下接收机干扰门限以及干扰链路和电波空间传播的特性,给出了宽带压制式干扰下有效干扰距离的计算方法;根据转发式欺骗干扰捕获概率与转发干扰—信号功率比的关系,给出了转发式欺骗干扰下有效干扰距离的计算方法。最后通过仿真,验证了方法的有效性,能够为评估、预测GPS的干扰效果提供依据。  相似文献   

10.
在GPS导航定位系统中,高动态环境下产生的多普勒频移直接影响接收机跟踪性能.为了克服多普勒频移影响,对高速飞行旋转体GPS接收机跟踪环路进行研究.根据高速飞行旋转体GPS接收机载波信号的数学模型,提出在GPS接收机跟踪环路建立包含姿态信息的载波信号卡尔曼滤波模型,并对环路的跟踪性能进行MATLAB仿真.结果表明,此算法的跟踪环路带宽窄,能有效抑制噪声干扰,较好地实现了对旋转信号的跟踪.  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
17.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号