首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
针对传统时频方法对多相码信号参数估计计算量比较大的问题,提出一种新的多相码参数估计方法。首先利用积分二次相位函数(IQPF)估计信号的调频率,然后重新构造一个线性调频信号(LFM),通过解线调将多相码信号的调频率消除,最后计算解线调后信号的傅里叶变换(FFT)估计信号脊线间隔和载频,进而估计信号的码元宽度和重复周期。该方法不需要进行直角坐标和极坐标的变换且仅需一维搜索,可以大幅度减小计算量。仿真表明,可以用较小的计算量取得与RAT(Radon-Wigner Transformation)和RWT(Radon-Ambiguity Transformation)相当的估计精度。  相似文献   

2.
针对低信噪比下多相码信号参数估计方法性能不佳的问题,提出了一种低信噪比下基于积分二次相位函数(IQPF)和分数阶傅里叶变换(Fr FT)的联合参数估计方法。首先在理论上推导出IQPF将多相码信号的所有脊线累积为一个峰值,并利用IQPF估计出的调频率将Fr FT的二维搜索变为一维搜索,从而估计出其他参数。仿真实验表明,所提方法在计算量以及估计精度上优于传统方法。  相似文献   

3.
利用多相码雷达信号在某个分数阶域内呈现多个间隔相等的冲击这一特性,提出了一种基于分数阶Fourier变换的多相码雷达信号分离算法,首先将混合信号以特定的旋转角作分数阶Fourier变换,然后通过窄带通滤波器抽取多相码雷达信号,去除大量噪声和其他干扰信号,最后再经过分数阶Fourier反变换,恢复出时域的多相码雷达信号。理论分析和仿真实验表明,该算法计算量小,分离效果好,可实现较低信噪比下的多相码雷达信号分离。  相似文献   

4.
于媛 《现代防御技术》2013,41(1):136-141
提出了一种基于RAT法和RWT法的快速算法,研究噪声环境中线性调频信号的检测以及参数估计问题.该方法对信号的检测通过一维搜索完成,同时对调频率识别比较准确,在此基础上,通过窄带通滤波器对LFM信号去除大部分的噪声能量.和其他基于二维时频分析工具的算法相比,降低了计算的复杂度,其实现更为简便.最后通过计算机仿真验证了该方法的有效性.  相似文献   

5.
目标运动使雷达回波表现为初始频率和调频率参数均为未知的线性调频(LFM)信号,精确且快速地检测和估计出未知参数的LFM信号是雷达信号处理的主要工作。文章利用LFM信号在特定阶数的FRFT域呈现出能量聚集特性,介绍了基于FRFT的二维峰值搜索、模最大值两步搜索和预判法三种LFM信号检测与参数估计算法。通过在高斯白噪声背景下对三种算法的仿真进行分析、比较,结果表明:在低信噪比条件下,基于FRFT模最大值两步搜索算法估计精度高,计算量较小,为工程应用提供可能。  相似文献   

6.
扩频技术在通信和卫星导航领域得到了广泛应用,传统仿真数据的生成方法存在计算量大、忽略信道影响因素,较难实现高精度生成等问题.结合扩频系统信号和噪声的特点,提出了基于扩频码码片相关的信号生成以及基于AR模型的带限高斯噪声生成两种高效仿真信号生成方式.该方法计算量相对于传统高精度方法可由1GHz的生成速率降低至码片速率级的数据生成速率,同时保证了信号生成的灵活性和可控性.相关结果可用于现代化导航接收机的仿真数据快速生成.  相似文献   

7.
提出了一种利用空间谱估计对干涉测角系统进行解算的方法,该方法在多重信号分类(M USIC)算法的基础上,对协方差矩阵的估计、特征值分解、谱峰搜索等计算量较大的步骤进行了改进,提高了运算速度.并根据入射角连续的特点,提出了空域跟踪搜索的算法,进一步减小了计算量,同时提高了解模糊的正确率.  相似文献   

8.
提出了一种基于四阶累积量的相干信号二维波达方向(DOA)估计的算法--CSS算法.该算法利用双平行线阵的接收数据以及平滑技术构造了一个平滑的渡达方向矩阵,通过对其进行特征分解估计出空间相干信号的二维到达角.在色噪声环境下,该算法能够精确地估计空间相干信号的二维到达角,无需谱峰搜索,并且信号的二维参数能够自动配对.计算机仿真结果验证了算法的有效性.  相似文献   

9.
针对高动态、大频偏的扩频系统采用了一种基于快速傅氏变换(FFT)算法的伪码快速捕获方法,该捕获方法是在搜索伪码相位的同时,通过频率扫描的方式搜索载波频率偏移值,将原来的伪码相位、载波频偏的二维搜索过程变成只搜索伪码相位的一维搜索过程,从而大大减少了高动态、大频偏扩频系统中的同步伪码的搜索的复杂度。理论分析和仿真结果都证实在不增加硬件复杂度的情况下,基于FFT算法的伪码快速捕获方法能够大幅度地缩短捕获时间,降低系统复杂度。  相似文献   

10.
最小和算法(MSA)折中了译码性能和运算复杂度两个方面,是低密度奇偶校验码(LDPC码)硬件实现最常用的译码算法。比特后验概率对数似然比(LLR)是LDPC码MSA译码的关键参数,现有的高阶调制信号比特后验概率LLR计算方法及简化算法都需要估计噪声方差,估计值影响译码性能。论文从分析M阶无记忆二维调制信号比特后验概率LLR通用的计算方法入手,研究了适用于MSA译码的高阶调制信号比特后验概率LLR简化算法,该算法无需估计噪声方差,进一步降低了运算量和实现复杂度。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

16.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

17.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

18.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

19.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号