首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
接收机在进行窄带干扰抑制后,其输出信号的相关峰会发生分裂。使用传统的基于信号到达时间的抗转发欺骗干扰算法,会使得捕获锁定的相关值为真实信号的旁瓣。针对该问题提出一种基于局部相关值最大的时延检测方法,在真实信号相关峰分裂所产生的旁瓣与欺骗信号不重合前提下,通过对主瓣三个码片范围内最大值的搜索,保证捕获不会锁定在旁瓣,再选择局部最大值中的最早码相位点从而避免锁定到转发欺骗干扰。与传统的基于信号到达时间的抗转发欺骗干扰算法相比,在无窄带干扰情况下,所提算法性能相当;在存在窄带干扰情况下,其性能明显优于传统算法。通过数值仿真验证了方法的有效性。  相似文献   

2.
GPS天线信号到射频前端变换后的中频信号,再经模拟数字转换,便可得捕获与跟踪的原始信号.采用专用集成电路设计的GPS接收机极大地限制了用户对这原始信号的性能分析和新算法的自由开发.先对GPS信号的形成和接收机的结构作扼要介绍,再对GPS信号的捕获与跟踪进行算法研究与仿真实现.结论表明通过仿真技术能有效地复现出捕获和跟踪的GPS信号.  相似文献   

3.
改进的GPS弱信号差分捕获方法研究   总被引:1,自引:0,他引:1  
捕获是GPS接收机信号处理中的关键部分,在微弱信号情况下,传统的弱信号捕获方法不能很好地捕获到卫星信号,采用一种改进的GPS弱信号差分捕获方法来进行捕获研究.并对一组GPS的数据信息,分别采用以上2种方法对其进行捕获仿真.结果显示,新方法可以捕获到较微弱的GPS信号,提高了接收机的灵敏度.  相似文献   

4.
存在窄带干扰情况下,接收机在进行干扰抑制后,其输出信号的相关峰会发生分裂,使用传统的基于信号传输时延的抗转发欺骗干扰方法,会使得捕获锁定的相关值在真实信号的旁瓣。针对该问题提出了一种基于局部相关值最大的信号时延检测方法,在真实信号相关峰分裂产生的旁瓣与欺骗信号不重合前提下,通过对两个码片范围内最大值的搜索,保证捕获不会锁定在旁瓣,再通过选择局部最大值中最早码相位点来避免锁定到转发欺骗干扰。与传统的方法相比,在无窄带干扰情况下,其与基于信号传输时延的抗转发欺骗干扰方法性能相当,在存在窄带干扰情况下其性能明显优于传统的基于信号传输时延的抗转发欺骗干扰方法。通过数值仿真验证了本文方法的有效性。  相似文献   

5.
GPS欺骗式干扰具有发射功率小,抗干扰难度大的特点,分为转发式干扰与产生式干扰。利用卫星信号模拟器产生包含错误导航信息的GPS民用C/A码欺骗信号,通过直接侵入和压制式干扰辅助两种方式进入接收机的捕获跟踪环路,对已定位的某款GPS接收机实施欺骗干扰。试验结果表明,直接侵入方式下,通过合理控制欺骗信号功率,接收机定位被扰乱,但定位结果并未被成功欺骗至预设位置;压制式干扰辅助方式下,接收机成功误定位于预设位置,验证了对GPS接收机进行欺骗式干扰的可行性。  相似文献   

6.
针对GPS接收机设计中,接收机信号跟踪精度同信号处理的实时性不能兼顾的特点,设计了一种基于DSP+FPGA的数字GPS接收机实时高精度基带环路.阐述了基带信号处理原理及原有方法的不足,提出了一种改进的GPS信号快速、高精度捕获、跟踪方法.利用信号粗捕后先进行精捕,在提高了信号的捕获精度后再结合二阶锁频环路辅助,最终利用三阶载波科斯塔斯锁相环完成GPS载波信号的高精度稳定闭环跟踪,同时使用载波来实时的辅助码环跟踪,从而完成整个GPS信号的实时高精度跟踪.实验结果表明该基带环路能够实现对GPS信号的快速捕获、实时稳定的高精度跟踪,并具有良好的动态性能.  相似文献   

7.
为提高全球导航卫星系统接收机抑制带内窄带干扰的能力,提出一种采用复系数自适应陷波器的时域滤波干扰抑制方法。在数字基带通过自适应算法调整复数滤波器的频率参数,以实时检测和跟踪窄带干扰的中心频率。仿真结果表明,该方法可以快速、有效地抑制固定频率的窄带干扰和线性调频干扰,提高接收机在干扰条件下的捕获性能。其干扰抑制性能优于实系数自适应陷波器的干扰抑制方法。  相似文献   

8.
GPS微弱信号捕获算法   总被引:1,自引:0,他引:1  
捕获是GPS接收机信号处理中的关键部分,在微弱信号情况下,FFT快速捕获等传统方法不能很好地捕获到卫星信号,将采用一种改进的方法--相关积分与批式捕获相结合的方法进行捕获研究.并对一组GPS实测数据信息,分别采用以上两种方法对其进行捕获仿真.结果显示,采用改进的方法捕获到了较微弱的GPS 信号,提高了接收机的灵敏度,并能有效避免由导航数据位翻转造成的误捕获.  相似文献   

9.
首先分析了GPS制导巡航导弹的制导方法,针对其制导体制中的弱点,探讨了GPS干扰对巡航导弹制导的影响。然后根据压制干扰下接收机干扰门限以及干扰链路和电波空间传播的特性,给出了宽带压制式干扰下有效干扰距离的计算方法;根据转发式欺骗干扰捕获概率与转发干扰—信号功率比的关系,给出了转发式欺骗干扰下有效干扰距离的计算方法。最后通过仿真,验证了方法的有效性,能够为评估、预测GPS的干扰效果提供依据。  相似文献   

10.
在GPS导航定位系统中,高动态环境下产生的多普勒频移直接影响接收机跟踪性能.为了克服多普勒频移影响,对高速飞行旋转体GPS接收机跟踪环路进行研究.根据高速飞行旋转体GPS接收机载波信号的数学模型,提出在GPS接收机跟踪环路建立包含姿态信息的载波信号卡尔曼滤波模型,并对环路的跟踪性能进行MATLAB仿真.结果表明,此算法的跟踪环路带宽窄,能有效抑制噪声干扰,较好地实现了对旋转信号的跟踪.  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号