首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
研究通过地基大功率干扰机干扰卫星通信上行链路,通过无人机干扰卫星通信的下行链路。通过载噪比和误码率对卫星通信链路的性能进行分析,对地基干扰大功率机干扰卫星通信上行链路进行了仿真分析,研究干扰机布放数量、干扰功率、干扰频率、通信数据传输速率和调制方式等因素对干扰效果的影响,并对无人机干扰卫星通信的下行链路进行了仿真分析,得出无人机和地基干扰机干扰卫星通信的一些作战使用结论。  相似文献   

2.
研究通过地基大功率干扰机干扰卫星通信上行链路,通过无人机干扰卫星通信的下行链路。通过载噪比和误码率对卫星通信链路的性能进行分析,对地基干扰大功率机干扰卫星通信上行链路进行了仿真分析,研究干扰机布放数量、干扰功率、干扰频率、通信数据传输速率和调制方式等因素对干扰效果的影响,并对无人机干扰卫星通信的下行链路进行了仿真分析,得出无人机和地基干扰机干扰卫星通信的一些作战使用结论。  相似文献   

3.
首先介绍了Link4A数据链信号的特征,建立了各种干扰样式模型,并在非相干检测前提下分析了各种干扰样式的理论误码率,仿真了各种干扰样式对Link4A数据链的干扰效能;其次,分析了数据链信号和干扰信号的传播损耗,计算了不同通信距离和干扰距离时通信接收机端的干信比,并得出最优干扰样式选择原则.  相似文献   

4.
以FH-GMSK(frequency hopping-gaussian filtered minimum shift keying)通信系统作为载体对跳频通信的干扰样式识别进行研究,从跳频通信接收信号中联合提取干扰的时域、频域和时频域特征,得到了一组稳定性好、对干信比不敏感的特征参数,在不需要干扰先验知识的情况下对FH-GMSK通信系统中常用的干扰样式进行了自动识别.仿真结果表明:该方法对跳频通信常见的干扰信号在不同干信比的情况下能获得很高的正确识别率.  相似文献   

5.
针对卫星通信对抗中干扰资源分配这个问题,利用遗传算法在解决组合优化问题上的优点,提出了一种基于遗传算法的卫星通信干扰资源分配方法。利用这种方法对某给定的作战情况进行仿真,仿真的结果表明,尽管这是一种求得近似最优解的方法,但这种干扰资源分配方法是比较有效的,并且分配的结果具有一定的可信度。  相似文献   

6.
高技术战争中的通信电子战及其技术   总被引:1,自引:0,他引:1  
C^3I的动用是现代高技术战争的重要标志和战斗力的重要体现,通信电子战是制约C^3I系统动用的最有效手段之一。以预警机为中心的空中指挥通信系统、以“地域网”为骨干的战场信息系统、以卫星通信为主的远程干线通信以及C^3I系统的计算机网络将是未来高技术战争中通信电子战攻击的四个重点目标。硬摧毁、干扰、欺骗和计算机病毒是通信电子战对付C^3I系统的四个主要作战手段或潜在手段。低截获概率和抗干扰体制通信对  相似文献   

7.
特高频(UHF)频段由于其良好的通信性能,正愈发广泛地应用于军事卫星通信,尤其是卫星移动通信,然而由于该频段信道所受干扰和固有衰落的限制,UHF在卫星通信中的应用并非一帆风顺。如何提高系统通信容量及在干扰环境下的信道可用率是目前UHF频段军事卫星通信发展所面临的主要挑战。文章在分析UHF频段卫星通信特点的基础上,简要介绍了具有良好性能的低密度校验码(LDPC)码和连续相位调制(CPM)方式,并结合UHF频段的卫星信道特点,提出了一种新的发展对策——LDPC+CPM+FH的串行级联通信方案,最后对方案进行了建模和计算机仿真。  相似文献   

8.
基于低轨道卫星通信技术,针对高空长航时无人机系统,建立以卫星中继的通信数据链模型.从传统数据链入手,分析其存在的弊端和使用的局限性,并融合现代通信技术,在引用新型编码技术的基础上,给出了新的无人机通信数据链路方案.该设计方案以无人机作战使用实际为基础,极大地提高信息传输能力和信息安全性.  相似文献   

9.
许建新 《国防》2012,(8):44
夯实信息基础设施.一是优化信息传输平台.目前,预备役部队可利用的信息网络对上衔接、横向联通受限,制约了基于信息系统体系作战能力的生成.鉴此,应积极向上申请引接作战指挥专网、指挥自动化网等信息网络,请领北斗卫星通信终端,尽快融人三军一体的栅格化信息基础网络,建立以光缆通信为主体、卫星通信为骨干、无线通信为补充,固定与机动相结合的信息传输平台,实现信息迅速、准确、顺畅传递.二是丰富作战数据信息.  相似文献   

10.
跳频通信系统干扰性能仿真研究   总被引:2,自引:0,他引:2  
通过描述跳频通信系统的组成,建立跳频通信系统的仿真模型,实现了跳频通信干扰性能仿真,通过仿真对比各种干扰样式的干扰效果并进行参数优化,找到了以最小代价换取最佳干扰效果的干扰模式,为战时电子对抗提供理论依据.  相似文献   

11.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

12.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

13.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

14.
15.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

16.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

17.
18.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

19.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

20.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号