首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
针对传统时频方法对多相码信号参数估计计算量比较大的问题,提出一种新的多相码参数估计方法。首先利用积分二次相位函数(IQPF)估计信号的调频率,然后重新构造一个线性调频信号(LFM),通过解线调将多相码信号的调频率消除,最后计算解线调后信号的傅里叶变换(FFT)估计信号脊线间隔和载频,进而估计信号的码元宽度和重复周期。该方法不需要进行直角坐标和极坐标的变换且仅需一维搜索,可以大幅度减小计算量。仿真表明,可以用较小的计算量取得与RAT(Radon-Wigner Transformation)和RWT(Radon-Ambiguity Transformation)相当的估计精度。  相似文献   

2.
针对低信噪比下多相码信号参数估计方法性能不佳的问题,提出了一种低信噪比下基于积分二次相位函数(IQPF)和分数阶傅里叶变换(Fr FT)的联合参数估计方法。首先在理论上推导出IQPF将多相码信号的所有脊线累积为一个峰值,并利用IQPF估计出的调频率将Fr FT的二维搜索变为一维搜索,从而估计出其他参数。仿真实验表明,所提方法在计算量以及估计精度上优于传统方法。  相似文献   

3.
利用多相码雷达信号在某个分数阶域内呈现多个间隔相等的冲击这一特性,提出了一种基于分数阶Fourier变换的多相码雷达信号分离算法,首先将混合信号以特定的旋转角作分数阶Fourier变换,然后通过窄带通滤波器抽取多相码雷达信号,去除大量噪声和其他干扰信号,最后再经过分数阶Fourier反变换,恢复出时域的多相码雷达信号。理论分析和仿真实验表明,该算法计算量小,分离效果好,可实现较低信噪比下的多相码雷达信号分离。  相似文献   

4.
于媛 《现代防御技术》2013,41(1):136-141
提出了一种基于RAT法和RWT法的快速算法,研究噪声环境中线性调频信号的检测以及参数估计问题.该方法对信号的检测通过一维搜索完成,同时对调频率识别比较准确,在此基础上,通过窄带通滤波器对LFM信号去除大部分的噪声能量.和其他基于二维时频分析工具的算法相比,降低了计算的复杂度,其实现更为简便.最后通过计算机仿真验证了该方法的有效性.  相似文献   

5.
目标运动使雷达回波表现为初始频率和调频率参数均为未知的线性调频(LFM)信号,精确且快速地检测和估计出未知参数的LFM信号是雷达信号处理的主要工作。文章利用LFM信号在特定阶数的FRFT域呈现出能量聚集特性,介绍了基于FRFT的二维峰值搜索、模最大值两步搜索和预判法三种LFM信号检测与参数估计算法。通过在高斯白噪声背景下对三种算法的仿真进行分析、比较,结果表明:在低信噪比条件下,基于FRFT模最大值两步搜索算法估计精度高,计算量较小,为工程应用提供可能。  相似文献   

6.
提出了一种利用空间谱估计对干涉测角系统进行解算的方法,该方法在多重信号分类(M USIC)算法的基础上,对协方差矩阵的估计、特征值分解、谱峰搜索等计算量较大的步骤进行了改进,提高了运算速度.并根据入射角连续的特点,提出了空域跟踪搜索的算法,进一步减小了计算量,同时提高了解模糊的正确率.  相似文献   

7.
扩频技术在通信和卫星导航领域得到了广泛应用,传统仿真数据的生成方法存在计算量大、忽略信道影响因素,较难实现高精度生成等问题.结合扩频系统信号和噪声的特点,提出了基于扩频码码片相关的信号生成以及基于AR模型的带限高斯噪声生成两种高效仿真信号生成方式.该方法计算量相对于传统高精度方法可由1GHz的生成速率降低至码片速率级的数据生成速率,同时保证了信号生成的灵活性和可控性.相关结果可用于现代化导航接收机的仿真数据快速生成.  相似文献   

8.
提出了一种基于四阶累积量的相干信号二维波达方向(DOA)估计的算法--CSS算法.该算法利用双平行线阵的接收数据以及平滑技术构造了一个平滑的渡达方向矩阵,通过对其进行特征分解估计出空间相干信号的二维到达角.在色噪声环境下,该算法能够精确地估计空间相干信号的二维到达角,无需谱峰搜索,并且信号的二维参数能够自动配对.计算机仿真结果验证了算法的有效性.  相似文献   

9.
针对高动态、大频偏的扩频系统采用了一种基于快速傅氏变换(FFT)算法的伪码快速捕获方法,该捕获方法是在搜索伪码相位的同时,通过频率扫描的方式搜索载波频率偏移值,将原来的伪码相位、载波频偏的二维搜索过程变成只搜索伪码相位的一维搜索过程,从而大大减少了高动态、大频偏扩频系统中的同步伪码的搜索的复杂度。理论分析和仿真结果都证实在不增加硬件复杂度的情况下,基于FFT算法的伪码快速捕获方法能够大幅度地缩短捕获时间,降低系统复杂度。  相似文献   

10.
最小和算法(MSA)折中了译码性能和运算复杂度两个方面,是低密度奇偶校验码(LDPC码)硬件实现最常用的译码算法。比特后验概率对数似然比(LLR)是LDPC码MSA译码的关键参数,现有的高阶调制信号比特后验概率LLR计算方法及简化算法都需要估计噪声方差,估计值影响译码性能。论文从分析M阶无记忆二维调制信号比特后验概率LLR通用的计算方法入手,研究了适用于MSA译码的高阶调制信号比特后验概率LLR简化算法,该算法无需估计噪声方差,进一步降低了运算量和实现复杂度。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

17.
18.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

19.

The Soviet Union was able to develop a large military-industrial complex and become the world's second superpower despite deficiencies in its centrally planned economy because defence was given high priority status and special planning, rationing and administrative mechanisms were used to attain national security objectives. However, in the period 1976-85 the effectiveness of priority protection diminished and defence institutions experienced more of the problems typical of the shortage economic system. The heavy defence burden also created growing difficulties for the civilian economy. The attempts by the Gorbachev government to reform the defence sector and improve defence-economic relationships during perestroika (1985-91) uniformly failed. For most of the transition period, the Russian military-industrial complex has been adversely affected by its low priority status, cuts in defence spending, instability of the hybrid politico-economic system, and negative growth of the economy. The armed forces and defence industry have been reduced in size and their outputs of military services and equipment have fallen to low levels. Nevertheless, the Russian armed forces still have over one million troops, significant stocks of sophisticated conventional weapons, and a large nuclear arsenal. The government of President Putin has raised the priority of the defence sector, increased real defence spending, and adopted ambitious plans to revive Russian military power. It is likely, though, that tight resource constraints will hamper efforts to reform the armed forces and to upgrade weapons. By 2010 Russia will be an important, but not dominant, military power in Eurasia.  相似文献   

20.
The collapse of the Soviet Union precipitated the massive expansion of drug use and trade in Russia. The country now has one of the largest populations of injecting drug users in the world and has become the largest single-country market for Afghan heroin. In 2003 the Federal Service for the Control of the Drugs Trade was created to coordinate a comprehensive counternarcotics strategy appropriate to the scale of this threat. The service continues to face a number of challenges in its early stages of development. However, it has made considerable advances in improving responses to large-scale organised crime and in building international cooperation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号