首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对中分辨雷达,提出了一种基于模型的舰船目标特征提取方法。通过对特征向量的组合和加权提高了舰船目标的特征提取质量,在人工神经网络识别器中取得了较好的识别效果。  相似文献   

2.
根据高分辨导弹制导雷达的基本工作原则和舰船目标的散射特性,利用现有雷达回波的仿真技术,在合理的战术想定下,计算了三类典型舰船的雷达回波.在此基础上,研究了利用雷达回波功率谱的方法来识别目标类型的有效性,并基于混沌理论提出了一种比功率谱方法更加有效的新的识别方法,从而为进一步利用混沌理论来开发雷达目标识别技术奠定了初步的理论基础.  相似文献   

3.
舰船目标一维距离像的方位敏感性是利用一维距离像开展雷达目标识别的难点问题。针对该问题,首先根据舰船目标一维成像的机理和特点,分析并验证了舰船目标一维距离像复高斯分布的统计特性;然后,在此基础上利用K-S假设检验对距离像方位角进行自适应分帧,使得每帧的距离像数据符合同一复高斯分布,而帧帧之间的数据符合不同分布;最后,针对分帧后距离像数据的统计分布,利用Bayes分类器进行5类舰船目标识别实验。实验结果表明:自适应分帧算法不仅提高了舰船目标的识别率,还能显著降低识别运算量和存储量。  相似文献   

4.
研究舰船在动态条件下的散射特性对于目标识别而言具有重要的价值。以"提康德罗加"级巡洋舰为例,首先简要介绍了舰船静态散射特性数据的获取方法,其次以切片理论为核心建立了完整的水动力学模型,进而对舰船的动态散射回波进行了仿真。最后对仿真数据进行了统计分析,获取了舰船在不同海况、不同入射余角条件下的回波稳定性估计,并通过与外场实测数据的比较间接验证了模型的可信性。研究结果可为海面雷达目标识别提供一定的理论支撑。  相似文献   

5.
基于分维特性的舰船雷达目标的检测   总被引:1,自引:0,他引:1       下载免费PDF全文
在强杂波背景下设计有效的海上雷达目标检测器是相当困难的。本文提出了一种基于海面散射的分维持性的雷达目标检测方法。它利用海上目标雷达回波与海杂波在分维持性上的差异来对海上舰船目标进行检测。将该方法用于实地录取的舰船雷达弱目标的回波,取得了较好的检测效果。  相似文献   

6.
基于神经网络的舰船目标识别研究   总被引:1,自引:0,他引:1  
为了实现对水下目标的识别,在现有特征提取方法的基础上,提出了一种从DEMON谱线谱和DEMON谱连续谱提取的特征方法,并设计了一个基于BP神经网络和多神经网络分类识别器的舰船目标识别系统。通过对实际舰船噪声目标进行识别,识别效果比较满意。这对舰船目标识别的发展具有一定的参考价值。  相似文献   

7.
基于小波变换和进化网络提出一种有效的常规雷达目标识别方法。即首先利用 Mallat算法对雷达目标一维距离像进行特征提取和压缩 ,然后在进化规划的基础上提出一种混合进化算法来优化设计由多层前向网络构成的分类器。实验结果表明 ,整个目标识别系统的结构简单 ,同时具有较好的推广能力  相似文献   

8.
由于反舰导弹在速度、机动性等方面的显著潜力,已日益成为舰船的主要威胁.尽快识别反舰导弹类型对缩短系统反应时间,正确预测目标运动具有重要意义.针对从不同目标传感器提取的末制导雷达辐射源参数和弹道特性参数,对目标数据进行相关处理,应用径向基神经网络(RBFNN)分别对反舰导弹模式识别,仿真中充分考虑了各种误差干扰并进行容错性处理,仿真结果表明该算法的有效性.最后将两部分识别结果通过D-S证据理论进行综合决策,进一步提高了系统识别决策的可信度.  相似文献   

9.
导弹防御系统中的雷达目标识别研究   总被引:12,自引:1,他引:11       下载免费PDF全文
以评估美国国家导弹防御(NMD)系统雷达识别能力为背景,分析了地基雷达识别弹道导弹目标的技术途径。根据弹道导弹目标群在飞行中段和再入段表现出的特性差异,提出了涉及目标结构特性、姿态特性以及再入特性的综合识别策略,并初步分析了各种识别措施的可行性。  相似文献   

10.
针对Dempster方法在合成高度冲突证据时结果与直观结论相悖的问题,提出了一种改进的基于重要性权重的证据合成方法,并将其应用到海上目标的识别。首先,根据证据之间的相似性程度判断证据间是否存在冲突,对于有冲突的情形,由基于P距离的权重分配模型得到各证据的重要性权值;然后,对BPA函数进行修正,采用Dempster规则修正后的BPA函数进行合成;最后,利用雷达和舰船的对应关系,将侦察雷达探测到的目标雷达信号载频、脉宽、重频转化为雷达参数的概率分配,并运用改进的证据合成方法进行了目标识别。仿真计算结果证明:该方法能有效处理冲突证据组合,克服了一票否决问题,减小了识别结果的不确定性,并保留了Dempster方法处理非冲突证据组合的良好特性。  相似文献   

11.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

12.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

13.
14.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

15.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

16.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

17.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

18.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

19.
20.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号