首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
SAR雷达二维间歇采样转发干扰可以在距离向和方位向同时形成假目标串,对SAR雷达具有良好的欺骗干扰效果,但该方法存在间歇采样转发干扰共同缺陷。针对SAR雷达二维间歇采样转发干扰的缺陷,提出了基于卷积调制的SAR雷达二维间歇采样转发干扰方法,即对二维间歇转发干扰信号进行距离向和方位向的二维卷积调制,通过选择参与卷积调制信号的形式,可以产生灵活可控的干扰效果,能够有效克服间歇采样转发干扰的缺陷,理论分析和仿真实验证明了该方法的可行性、有效性。  相似文献   

2.
理论推导了不同阶数假目标的相位特性及影响因素,根据单脉冲雷达角度测量的原理,分析了间歇采样转发假目标实现角度欺骗干扰的制约条件,推导了实施角度欺骗相干干扰需要满足的相位相干、幅度匹配等要求,并进一步研究了为实现相干干扰对间歇采样转发延时、转发频率、转发功率的约束条件。进行了仿真分析,分别讨论了相干干扰和非相干干扰两种角度欺骗干扰条件下关键参数对干扰效果的影响。结果表明,通过灵活的参数设计和合理布设,间歇采样转发假目标能有效诱偏单脉冲测角系统,这对于间歇采样转发干扰机的设计及使用具有指导意义。  相似文献   

3.
针对目前间歇采样转发干扰(interrupted sampling repeater jamming,ISRJ)多假目标分布均匀与次假目标衰减快的缺点,提出一种间歇混沌采样灵巧干扰(interrupted chaotic sampling smart jamming,ICSSJ)生成算法。该算法首先产生Tent混沌序列,通过该序列控制采样时间窗长度和转发时间窗长度,生成间歇混沌采样信号,产生非均匀密集假目标群;其次,通过灵巧噪声对间歇混沌采样信号进行卷积调制,提高次假目标群归一化幅度,增加有效假目标数量;最后与间歇采样转发干扰中的切片干扰和脉冲随机转发干扰进行仿真对比实验。结果表明,该算法解决了多假目标分布均匀与次假目标衰减快的缺点,更好地兼顾了压制干扰与欺骗干扰的效果,大幅增加雷达接收机对干扰信号参数估计的难度,进而使得雷达识别与抑制假目标的能力大幅下降。  相似文献   

4.
当前,对ISAR成像和目标识别的研究很多,但用于ISAR成像和目标识别的目标模型大都相对简单.建立一种新的ISAR二维散射点模型,生成目标各种姿态的二维散射点数据库.首先选用3DS为散射点生成模型,以此为基础完成模型简化和信息抽取.然后根据目标姿态变化,计算转换坐标,并以F16战斗机为例生成二维散射点图像.最后采用步进频雷达信号对目标散射点模型进行ISAR成像.所建立的目标二维散射点模型可以用于ISAR成像和目标识别研究.  相似文献   

5.
基于盒维数的间歇采样转发干扰识别方法   总被引:1,自引:0,他引:1  
间歇采样转发干扰是一种针对相干雷达的有效干扰样式,其对抗技术研究已经成为电子战领域的热点课题,而干扰识别历来是抗干扰技术中最关键的环节,针对间歇采样转发干扰的识别问题,提出了一种基于盒维数的干扰识别方法,将分形理论应用于间歇采样转发干扰的识别。通过对3类间歇采样转发干扰信号的产生原理及频谱进行分析,挖掘干扰及目标回波的分形特征,提取分形盒维数作为干扰识别的特征参数,并利用支持向量机进行分类识别,为后续雷达系统采取抗干扰措施提供先验信息。仿真结果证明该方法具有较高的识别概率。  相似文献   

6.
对无人机光电侦察系统实施机载伴飞式强激光干扰,是一种较为有效的干扰模式。根据高空无人侦察机空间位置及其搭载的光电探测系统设备指标,通过确定高空无人侦察机位置及飞行轨迹,设定干扰机飞行高度,构建空间三维坐标模型,使干扰机始终介于高空无人侦察机光电探测器和我方重要防护目标两者连线之间,得出干扰机最小发射功率以及激光光轴最大偏离角。结果表明,仿真结果与理论计算相一致,可用于未来指导机载强激光干扰高空无人侦察机光电探测设备。  相似文献   

7.
宽带ISAR雷达能够从目标回波中计算得出众多目标特征,对ISAR雷达的干扰信号必须高逼真地模拟目标的电磁散射特性和运动特性。从弹头目标电磁散射机理出发,分析了干扰信号生成流程,提出二维成像干扰的实现方案。针对虚假目标特性模拟问题,提出基于一维距离像模板合成欺骗干扰信号的算法。算法采用距离像模板与实际宽带ISAR信号的卷积调制处理,生成的干扰信号能较好地反映目标的电磁特性。通过多个脉冲的模拟,生成的干扰信号也能够准确反映目标的运动特性。仿真实验对暗室测量数据和HRRP模板数据进行成像效果对比,验证了算法的有效性。该算法对二维成像干扰机的工程设计具有指导意义。  相似文献   

8.
相参雷达间歇采样灵巧干扰方法   总被引:2,自引:0,他引:2  
间歇采样转发干扰是针对相参雷达一种有效的干扰方法,它利用脉压雷达匹配滤波特性,能够对雷达形成假目标干扰.首先分析了间歇采样转发干扰方法,指出了间歇采样转发干扰的不足之处,即脉压后干扰能量损失和假目标分布均匀,进而提出了间歇采样灵巧干扰方法,新方法形成的假目标分布不均匀,使得雷达识别真假目标可能性大大降低,仿真实验验证了新干扰方法的有效性.  相似文献   

9.
空时自适应处理(STAP)是一种有效地抗干扰技术,但在非均匀环境下其性能将大大降低。首先介绍了机载相控阵雷达STAP技术的基本原理,然后研究了间歇采样转发干扰和正弦加权调频干扰的原理和特点,提出了一种新的产生非均匀环境的干扰方法—间歇采样正弦加权调频干扰。即干扰机对接收到的雷达照射信号先进行间歇采样处理,再附加正弦频率调制,然后将调频结果放大转发出去,根据调制参数不同可以产生假目标欺骗干扰和覆盖干扰,构造非均匀环境降低STAP处理性能。仿真结果证明了理论的正确性和干扰的有效性。  相似文献   

10.
间歇采样转发干扰是一种针对相干雷达的有效干扰样式,该类干扰的抑制技术研究需求迫切,而干扰识别历来是抗干扰流程中的关键环节,针对间歇采样转发干扰的识别问题,提出了一种基于关联维数的干扰识别方法。通过对3类间歇采样转发干扰信号进行傅里叶变换,挖掘信号频谱上的差异,提取频域关联维数作为干扰识别的特征参数,并利用支持向量机进行分类识别,为后续雷达系统采取针对性抗干扰措施提供重要的决策信息。仿真结果证明该方法具有较高的识别率。  相似文献   

11.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

12.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

17.
18.
The UK’s interrogation operations during the conflict in Iraq (2003–2008) are often portrayed by the media as involving significant amounts of mistreatment. This article demonstrates that these practices are not necessarily representative of the UK’s interrogation operations across this conflict. In doing so it contributes to the limited literature on the practice of interrogation and on the UK’s combat operations in Iraq. The UK’s interrogation capability, and therefore its intelligence-gathering capability, is shown to have rested primarily with the military’s Joint Forward Interrogation Team (JFIT). The JFIT suffered from limitations to the number, training and experience of its interrogators and interpreters. It is argued that maintaining a permanent, higher level of preparedness for interrogation by the British armed forces is desirable.  相似文献   

19.
ABSTRACT

While the study of organised violence is considered essential to understanding the history of the West, and accordingly imbued with various layers of meaning and remembrance, war is widely regarded as inimical to the modern nation in Africa and stable development more broadly. Using examples drawn from primarily from East Africa, this paper considers the ways in which warfare in the deeper (‘precolonial’) past has been framed and envisioned in recent decades, in particular by governments whose own roots lie in revolutionary armed struggle and who began life as guerrilla movements. While in some cases particular elements of the deeper past were indeed mobilised in pursuit of contemporary political goals, in many other scenarios histories of precolonial violence were beheld as problematic and unworthy of remembrance. This paper highlights the paradox and ambiguity which has attended the memory of key aspects of Africa’s deeper past.  相似文献   

20.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号