首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 343 毫秒
1.
黄晓涛  李悦丽 《国防科技》1999,20(3):11-13,14
抑制射频干扰(RFI)技术是超宽带合成孔径雷达(UWB—SAR)的关键技术之一。本文首先分析了RFI信号的来源和特性。基于RFI信号的窄带性质,简要综述了抑制RFI技术的参数化方法。然后,针对RFI信号的调制特性和非平稳性,采用基函数展开形式,分别提出了其调制模型和时变AR模型。此外,还探讨了RFI抑制的自适应滤波算法。  相似文献   

2.
几种UWB-SAR窄带干扰抑制方法的分析和比较   总被引:1,自引:0,他引:1  
SAR(Synthetic Aperture Radar)信号处理窄带干扰抑制技术是SAR抗干扰技术的重要内容。对3种UWB-SAR(Ultra-W ideBand Synthetic Aperture Radar)窄带干扰抑制方法———陷波滤波法、AR模型参数化干扰抑制法以及小波包分析自适应干扰抑制法进行了分析,利用自行开发的成像软件,对SAR理想点目标和实录数据进行干扰抑制仿真实验,从定性和定量的角度对3种方法的干扰抑制效果作了比较。  相似文献   

3.
参数化方法是实现UWB -SAR抑制RFI的重要手段。为评估抑制RFI算法的实际性能 ,利用UWB -SAR实验系统的实测数据 ,从干扰抑制能力和脉冲压缩性能改善两个方面对几种主要算法进行了比较分析。结果表明 ,在干扰能量抑制比和脉冲压缩指标度量下 ,几种典型的参数化算法都能显著提高接收信号的信干比 ,而基于正弦波模型的算法略优于基于AR模型的算法。  相似文献   

4.
在首先给出超宽带合成孔径雷达 ( UWB-SAR)抑制射频干扰 ( RFI)问题的参数化模型基础上 ,从信号参数估计出发 ,具体推导了实信号下 RELAX算法的计算公式。针对 RFI的复杂性 ,提出了一种逐级RELAX算法 ( GRELAX)。基于仿真和实测数据的实验结果表明 :GRELAX算法能够有效地抑制 RFI,并具有较快的运算速度  相似文献   

5.
对合成孔径雷达( SAR)的干扰技术进行了系统的研究,在对余弦转发式干扰和伪装遮盖干扰进行详细理论分析和计算机仿真的基础上提出了一种新的干扰方法——转发式扫频干扰,该方法通过转发调制了扫频信号的SAR回波,使得SAR回波在距离向频域不能实现压缩,破坏了合成孔径雷达的自聚焦能力.理论研究表明,这几种方法均可以在低干信比的条件对SAR进行有效干扰,使其不能成像,从而达到掩护分布式目标的目的.通过对汽车模型成像的干扰仿真,验证了这些方法的有效性和可行性.  相似文献   

6.
提高合成孔径雷达(SAR)抗干扰性能是保证其在干扰条件下能正常工作的重要前提。针对SAR中宽带噪声干扰(WBNI),提出了一种在距离向基于回波数据去调频处理和特征子空间滤波的宽带噪声干扰抑制方法并进行了计算机仿真。仿真结果表明,在SAR距离向脉冲压缩增益大于接收端输入干信比5 dB时,该方法可以获得较理想的干扰抑制效果。而随着输入干信比的增加,干扰抑制性能将开始恶化。  相似文献   

7.
车载UWB SAR干扰自适应抑制新方法   总被引:1,自引:1,他引:0       下载免费PDF全文
在分析车载超宽带合成孔径雷达(UWB SAR)探测系统中干扰类型及其产生机理的基础上,针对Tsaipei Wang等提出的批处理方法的局限性,提出一种基于迭代运算的图像域自适应干扰抑制方法.该方法利用基于韦布尔分布的恒虚警率(CFAR)检测器提高干扰信号估计的准确性;采用迭代方法在线估计和更新参数,实现干扰的自适应抑制.实测数据处理结果表明:该方法可有效抑制自信号干扰,且结构上适于实时处理,可满足车载UWB SAR探测系统对图像预处理的要求.  相似文献   

8.
随着电力电子技术和微电子技术在电子设备中的应用,电磁干扰和抑制越来越受到人们的重视。在电子产品设计过程中,如何实现抑制来自外界的电磁干扰和控制设备间的相互干扰,已成为电子产品设计的关键技术之一。一、电磁干扰电磁干扰(Electromagnetic Interference)是指自然干扰源或人为干扰源对有用电磁信号的损害。它能降低采用电磁波能量变换原理工作的电子设备的工作质量。电磁干扰可以来自系统内部,也可以来自系统外部,前一种情况称为系统内部的干扰,后一种情况称为系统之间的干扰。当不希望的电压和电流影响设备性能时,称之为存在电磁干…  相似文献   

9.
卫星通信系统较易受到各种干扰,尤其是人为干扰,为了抑制干扰,需对信号进行正确的干扰检测。就几种常见的卫星干扰信号,对其进行 Matlab仿真实验,研究不同干扰类型信号的特点,提出一种改进的CME算法用于检测干扰信号是否存在。与能量检测法和传统的CME方法相比,它具有较好的检测性能。仿真结果表明,提出的CME方法可以有效用于干扰检测。  相似文献   

10.
电磁兼容性设计是机动式指挥自动化系统的重要环节。电磁屏蔽、滤波、接地等技术是电磁兼容性设计的重要方法。电磁屏蔽是抑制辐射干扰的一种有效隔离方法。滤波是抑制传导干扰最直接、最有效的方法,对于瞬态脉冲干扰,最有效的办法是采用脉冲吸收技术。接地的综合考虑,对产品电磁兼容性有至关重要的意义。针对机动式指挥自动化系统的结构和组成特点,给出了一些具体的电磁干扰抑制设计,对满足实际的电磁兼容性方面作出了有意义的尝试。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

14.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

15.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

16.
17.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
ABSTRACT

What was the scope of the Bosnian jihadi participation in the war in Syria? Did the Bosnian volunteers tend to join one particular faction? Why did the Bosnian youngsters decide to join the holy war in the Levant? Was this an organized and hierarchical process or was this a grassroots movement? Last, were all the Salafis in Bosnia supportive of this dynamic or did this process cause internal frictions? These are some of the questions that this research will try to answer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号