首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对窄带雷达稀疏孔径条件下,目标微多普勒信号无法使用传统方法进行参数化表征和提取的问题,提出一种方位向稀疏孔径条件下微动目标特征提取与成像的新方法。通过详细分析微动目标雷达回波特性,并根据目标回波特征构造微多普勒信号原子集,在此基础上,使用正交匹配追踪算法实现微动目标的特征提取与成像。仿真实验表明该方法能够在稀疏孔径条件下有效提取目标微动特征并实现目标成像。  相似文献   

2.
提出了一种混沌背景下的编码信号检测新方法。信号检测过程包含两个步骤:混沌信号的预测和检测判决。该方法利用非线性前馈神经网络进行混沌信号模型的创建,并采用13位巴克码作为编码信号。仿真结果表明,通过该方法进行编码信号检测可以得到较高的检测概率和较低的虚警概率,整体检测性能较高,并且对于不同信噪比的信号具有较强的鲁棒性。  相似文献   

3.
提出了一种基于模式编码进行宽带信号到达角估计的方法。该方法通过广义回归神经网络(GRNN)对信号的线性时频协方差矩阵进行分类来实现。介绍了网络结构,数据仿真和应用于高频地波雷达目标定向的实际效果。特别介绍了通过窄带信号数据训练网络然后应用于宽带信号的训练方法,适于宽带训练数据难以获得的情形。仿真和实测数据的分析结果显示该估计方法能适应阵列的误差模式且鲁棒性好,在较低信噪比时能够给出正确估计。  相似文献   

4.
为实现圆周合成孔径雷达(Circular Synthetic Aperture Radar,CSAR)快速成像,提出一种用于CSAR的快速时域成像算法。该算法通过将CSAR的圆孔径分成若干子孔径,分别对子孔径采用快速因式分解后向投影算法处理,再将各子图像相干插值叠加至同一坐标系下得到成像结果。详细分析算法实现中的坐标转换、误差控制和运算效率等关键问题,并用点目标仿真和实测数据处理结果验证算法的有效性。所研究方法具有成像范围大、计算量小等优点。  相似文献   

5.
针对空间平滑MUSIC算法会损失阵列的有效孔径且需要信源先验数目的问题,提出了一种新算法.该算法从矢量重构的思路出发,通过对接收数据协方差矩阵的最大特征向量进行矢量重构,即可实现不损失阵列孔径的解相干处理,同时利用全空间加权MUSIC算法,实现了信源数目未知下的相干信号准确定位.仿真结果证实了该方法的有效性.  相似文献   

6.
为解决低信噪比条件下短观测时间雷达成像问题,提出一种基于回波协方差矩阵处理的压缩感知逆合成孔径雷达成像技术。该方法构建了回波协方差矩阵层面下的压缩感知问题模型,并通过特定的线性变换降低环境噪声对成像结果的影响。在仿真实验中,通过处理短观测时间和低信噪比条件下的模拟回波数据,该方法获得比传统压缩感知方法像质更好、对比度更强的目标成像结果。同时,其成像结果的目标背景比和背景噪声能量两个雷达图像评价指标都优于传统方法,进一步验证了该方法的有效性。  相似文献   

7.
为改善小波脊线法在低信噪比下提取二相编码信号脉内特征的性能,提出了一种改进的小波脊线脉内特征提取方法。该方法将魏格纳-威利变换与小波脊线法相结合,利用魏格纳-威利变换对噪声的抑制来改善信噪比,通过分析二相编码信号的小波脊线特征来得到脉内特征参数。仿真结果表明,该方法在低信噪比下仍能准确提取二相编码信号的脉内特征,具有明显优越性。  相似文献   

8.
针对复杂背景下的远距离红外弱小目标检测问题,提出了一种基于自适应结构元素形态学和BP神经网络的智能化检测方法。该方法首先将图像按一定大小分成子图像,通过统计子图像的特征确定候选目标区域,然后基于自适应结构元素的灰度形态学顶帽变换,实现红外空中复杂背景的抑制并突出待检测的小目标。接下来,以像素的灰度、水平、垂直和对角梯度、邻域均值和方差6个特征为输入量,构造三层BP神经网络,最终实现红外复杂背景下的弱小目标检测。仿真实验结果表明,该方法可以实现对红外复杂背景的有效抑制,稳定准确地检测出信噪比大于2的红外弱小目标。  相似文献   

9.
太赫兹技术概述   总被引:3,自引:0,他引:3  
太赫兹技术是电子学和光子学交叉的新兴前沿领域。在介绍太赫兹辐射原理及特性的基础上,阐述了太赫兹辐射的产生和探测方法,重点分析了太赫兹源和探测器的发展现状,探讨了太赫兹技术在光谱识别、成像及无线通信等方面的应用前景。太赫兹技术的发展仍然受到诸多方面的制约,一旦取得突破,将为国民经济发展和国家安全带来新的机遇。  相似文献   

10.
研究利用神经网络实现超分辨雷达成像。该方法首先根据Tuff的前后向线性预测(FBLP)方程用神经网络得到样本序列的AR模型参数,然后利用神经网络作线性预测外推,再用神经网络对外推后的数据作离散哈特来变换(DHT)。从哈特来变换可以方便地得到外推数据的离散傅里叶变换,从而得到距离-多普勒超分辨雷达像。利用微波暗室数据对这一方法进行了数字仿真,结果表明这种方法是可行的,即使在低信噪比下也有较好的性能。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

16.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
本文介绍了笔者为开发名为OONMES的网络管理专家系统所实现的一个简单专家系统工具SIM-LISP。SIM-LISP是一个用C/C++语言来实现的模拟LISP语言的可调用函数集,它短小精巧,速度快,可以完成针对网管专家系统的事实或规则知识的表示、匹配、合一和推理等基本操作,并有与知识对象的连接功能,是网管专家系统内核实现的支撑环境。  相似文献   

19.
This article consists of selected translations from captured interviews and dairies of Al Qaida members. The time period covered is from mid-2001 to early 2002 and concerns their operations in Afghanistan. The material clearly conveys a range of emotion, from confident to despondent, as well as efforts to contest the US actions. The first several pages give the reader context and some possible “lessons learned,” but the story(ies) are best told by the Al Qaida members themselves. All names are pseudonyms.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号