首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
随着电磁环境越来越复杂多变,给电子对抗带来了很大的挑战,基于传统的脉冲描述字和信号识别方法已不能满足战场要求。针对复杂电磁环境下的辐射源精确识别问题,将基于相控阵雷达辐射源的细微特征,主要是包络特征和相噪特征,对其进行分析建模,并结合卷积神经网络提出了一种基于雷达中频数据和一维卷积神经网络的雷达辐射源个体识别方法,训练一维卷积神经网络来学习雷达辐射源信号的有效特征并进行识别。最后在不同信噪比条件下进行了识别仿真实验,得到了较好的识别正确率,证明了该方法的有效性和可行性。  相似文献   

2.
针对当前复杂电磁环境下雷达辐射源信号(radar emitter signal,RES)识别效率不够的问题,提出一种基于深度卷积网络和时频二维特征结构的雷达辐射源信号识别方法。结合雷达辐射源信号时频二维特征结构特性,构造基于深度卷积网络的RES识别分类模型,通过设计样本集训练分类模型,利用类别信息实现网络参数精调。仿真结果验证了模型的可行性和有效性,实现了低信噪比下RES时频二维特征的结构学习和准确识别。  相似文献   

3.
雷达发射机结构上的差异、使用电子器件的不同,决定了辐射源的唯一性。提出了基于新型智能特征集的辐射源个体识别方法,首先对接收到的信号进行时域、频域、时频域、极化域变换并提取特征,构造能够表征每个辐射源的新型智能特征集,然后为了提高运算速度同时去掉冗余信息,用主成分分析法对特征集进行主特征提取,最后再用支持向量机方法,通过选取最优RBF核函数来实现个体识别。通过仿真,验证了构建的新型智能特征集可以对辐射源进行唯一的表征,在低信噪比环境下可以实现对辐射源个体进行快速有效的识别,分别对CW,BPSK,LFM信号进行了仿真,在3 dB信噪比以上都能达到85%以上的识别率,验证所述方法的正确性和可行性。  相似文献   

4.
针对雷达辐射源识别中拓展能力不足和识别率不高问题进行研究,提出一种基于深度时频特征学习的智能识别方法。基于降采样短时傅里叶变换高效提取具备较高辨识度和稳定性的浅层二维时频特征,利用信号局部频域维稀疏性完成降噪等预处理;设计用于深度特征学习与识别的卷积神经网络,并采用不同尺度卷积核组合扩展网络广度,强化特征表征能力;利用高信噪比条件下8种辐射源信号样本对网络进行训练调优,低信噪比样本测试验证算法和网络的有效性。仿真结果表明,该方式在-8 dB信噪比条件下能达到98.31%的整体平均识别率,具备较强的鲁棒性。  相似文献   

5.
改进相空间重构方法在混沌识别中的应用研究   总被引:3,自引:1,他引:2  
讨论了传统非线性时间序列相空间重构方法的特点,提出了一种改进的相空间重构方法.为了揭示非线性时间序列中的非线性相关性,采用了一种基于关联积分的统计量,并研究了不同参数对它的影响.研究了延迟时间和嵌入维数之间的关系,并采用时间窗口描述这2个参数的变化规律.同时,应用改进方法计算了混沌时间序列的重构参数,重构了混沌信号的吸引子.研究结果表明,该方法能够从时间序列有效地重构原系统的相空间,为混沌信号识别提供了新的途径.  相似文献   

6.
一种基于隐马尔科夫模型的雷达辐射源识别算法   总被引:1,自引:0,他引:1  
针对现代雷达采用复杂的PRI样式不能对其进行准确识别的问题,提出一种基于隐马尔科夫模型的复杂体制雷达辐射源识别算法。该算法将具有复杂PRI样式辐射源识别问题转化为对具有分类特征的码序列的识别问题,通过运用符号动力学中符号时间序列分析(symbolic time series analysis)理论,将上述码序列识别问题建模为隐马尔科夫模型予以解决,实现了对具有PRI抖动、伪随机编码等复杂PRI调制样式雷达辐射源的准确识别。仿真结果证明算法在PRI值有部分重叠的情况下仍具有很好的识别能力。  相似文献   

7.
陈婷  陈卫 《现代防御技术》2011,39(1):120-124
为解决辐射源识别的问题,研究利用变精度粗糙集模型来确定辐射源识别特征权值的方法。由概念的正域中对象类的条件属性的描述,得到该概念的充分条件,并依据知识间的依赖性作为所要考虑的因素来获取特征权值,同时结合模糊集理论,提出一种基于变精度粗集特征加权的辐射源模糊识别方法。最后将此识别方法模型应用于雷达辐射源用途识别,仿真实验及其结果验证了该方法的可行性和有效性。  相似文献   

8.
为满足雷达辐射源识别技术发展和特征参数挖掘的需要,在分析辐射源基本信息和特征参数以及二者之间关联关系的基础上,通过数据库管理系统SQL Server,以E-R模型、数据类型设计为切入点,分别构建了雷达辐射源信息库和特征库。最后,分别从雷达辐射源数据可视化管理、信号调制类型识别、辐射源匹配识别等方面探究了数据库的应用实例。从应用实例的运行效果来看,验证了所构建数据库的科学性和可行性。  相似文献   

9.
为满足雷达辐射源识别技术发展和特征参数挖掘的需要,在分析辐射源基本信息和特征参数以及二者之间关联关系的基础上,通过数据库管理系统SQL Server,以E-R模型、数据类型设计为切入点,分别构建了雷达辐射源信息库和特征库。最后,分别从雷达辐射源数据可视化管理、信号调制类型识别、辐射源匹配识别等方面探究了数据库的应用实例。从应用实例的运行效果来看,验证了所构建数据库的科学性和可行性。  相似文献   

10.
对含微动运动的目标进行稀疏孔径逆合成孔径(ISAR)成像时,基于Chirplet分解和压缩感知(CS)的成像算法存在运算效率低、重构精度与鲁棒性差等问题。针对上述算法中存在的不足,提出了基于调幅-线性调频(AM-LFM)分解和贝叶斯正交匹配追踪(BOMP)的改进微动目标成像算法。应用该改进压缩感知(CS)算法进行微动目标成像,实验结果表明:由于改进算法采用AM-LFM分解和BOMP重构,提高了重构精度、鲁棒性与运算效率,成像效果比原算法更好。  相似文献   

11.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

12.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

13.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

14.
15.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

16.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

17.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

18.
19.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

20.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号