首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 296 毫秒
1.
由于阵元间相位差变化率这一观测量与通道不一致性关系不大,信号到达两阵元间的相位差变化率常用于无源定位测量中。提出了一种新的快速高精度的相位差变化率测量方法,利用分时间片思想,首先通过对无模糊相位差进行一次相位平移,得到各个时间片含模糊的相位差值;然后对得到的各个时间片的含模糊相位差进行一次相位平移,得到各时间片间相对无模糊的相位差;最后对相对无模糊相位差采用最小二乘算法求得相位差变化率。理论分析和仿真实验表明,本算法可以很好地解决测量中由于相位模糊造成的相位差抖动问题,能够在短时间内得到高精度相位差变化率信息,可以满足定位要求。  相似文献   

2.
数字式相位差测量方法及精度分析   总被引:5,自引:0,他引:5       下载免费PDF全文
相位差变化率是最近提出的用于快速无源定位的观测量。该文研究相位差的高精度测量方法 ,提出了一种正交双通道数字式的相位差测量方法。通过对信号频谱的分析 ,计算了测量系统输出的信噪比 ,从而得出了相位差测量的理论精度 ,随后进行仿真分析验证了理论精度。理论分析和仿真实验证明 ,论文提出的方法可以实现高精度的相位差测量  相似文献   

3.
测量卫星导航信号在天线阵各阵元上的载波相位之差可用于卫星波达方向解算,但传统的各阵元独立跟踪算法在干扰条件下无法实现高精度跟踪且容易失锁。针对此问题,通过将天线阵各阵元的载波相位分解为公共的平均载波相位和低动态的残余载波相位,提出了一种联合载波跟踪算法。该算法利用平均载波相位为每个阵元共有的特点,通过对全部阵元的联合处理来提高其跟踪精度,同时通过缩小环路噪声带宽来提高残余载波相位跟踪精度。理论分析与仿真结果表明,该算法提高了波达方向解算所需的阵元间载波相位差的测量精度及跟踪灵敏度,四阵元天线阵在典型应用条件下,跟踪灵敏度提高4d B,相同载噪比下载波相位差测量精度提高3倍。  相似文献   

4.
大炸高频率捷变无线电引信的研究   总被引:1,自引:0,他引:1       下载免费PDF全文
分析了现代战争对无线电引信炸高提出的新要求,提出了一种采用频率捷变体制的大炸高无线电引信的设计方案,采用了软件无线电的设计思想,使引信具有软件可编程能力,提高了引信对战场环境的适应能力和抗干扰能力。在多工作频点捷变的基础上提出一种多频脉冲联合比相测距算法,利用回波相位差实现了引信炸高的测量。最后的算法仿真结果验证了这种基于频率捷变的大炸高无线电引信体制的可行性。  相似文献   

5.
数字干涉仪测向体制中相位差信息的提取因受到噪声的影响,降低了其鉴相精度.根据高斯噪声双谱为0的特点,提出了一种基于双谱鉴相的数字干涉仪测向算法,对单频信号进行测向.分别从不加噪声的理想情况和存在高斯噪声的情况进行理论推导,论证了两者的一致性,并给出了信号频率和相位差信息的提取方法.与传统的频域鉴相算法相比较,仿真结果表明该算法可以有效地抑制高斯噪声,提高鉴相精度,验证了该算法的有效性.  相似文献   

6.
为了满足一些矢量脱靶量测量系统实时性的要求,提出了一种快速的矢量脱靶量测量算法.测量中使用了一个小型天线阵列,基于快速傅里叶变换算法,雷达回波的多普勒频率和不同天线接收信号的相位差能够快速地被估计出来,进一步利用非线性优化的方法估计出目标的矢量脱靶量参数.计算机仿真结果表明,该方法原理正确,能够满足实时要求.  相似文献   

7.
同频融合算法在处理频率快速变化的信号等应用中具有精度高、抗噪性好的优点,然而该算法实时性较差且精度受相位差测量影响较大。提出了基于全相位的同频融合分层算法,通过设计分层算法以减少多重循环中的冗余计算单元,可在不牺牲精度的前提下成倍降低运算量;采用全相位谱分析法降低相位差测量误差,明显改善了相位差补偿效果。理论分析与对比实验表明,该算法对同频融合过程有显著的改进效果。  相似文献   

8.
针对相位差法频率估计精度受信号非整周期采样影响的问题,在相位差法基础上提出了非整周期采样信号频率估计的加窗相位差法。首先,利用FFT法获得信号频率粗估计值,根据频率粗估计值设计矩形窗,对采样信号重新分段,获得2段近似整周期采样的加窗信号;其次,利用第1段加窗信号求取频谱峰值所在位置;然后,利用DFT计算出2段加窗信号频谱峰值处的相位差,得到频谱峰值位置校正量;最后,根据频谱峰值位置及其校正量计算频率精估计值。模拟计算和实测实验表明,所提方法有效抑制了信号非整周期采样带来的影响,提高了相位差法的测频精度,改善了LFMCW雷达的测距精度。  相似文献   

9.
本文提出一种新的目标跟踪输入估计方法。传统输入估计方法的主要缺陷是假设目标机动强度在检测窗内是常量。本文的新方法把目标的机动视为一些基本时间函数的线性组合,从而克服了上述缺陷。由此得出的算法具有包括此前输入估计研究成果的一般形式。根据选取的机动模型和其他设计参数如检测窗宽度、量测噪声水平和采样周期等,研究检测灵敏度,并据此分析了本文算法的检测性能。计算机仿真研究表明本文新算法的性能比得上Bogler输入估计方法,且计算时间大大减少。  相似文献   

10.
直接将绝对相位差引入距离方程和多普勒方程答解地面点坐标,称为合成孔径雷达干涉测量直接算法。利用引入含有合理误差的模拟InSAR像坐标、绝对相位差和相应的轨道参数作为起算数据,求得含有误差的地面点坐标,实现了InSAR直接算法的几何精度分析。为了把基线长度和姿态的误差引入轨道空间位置,提出了相应的数学模型。计算结果表明,直接算法与经典算法精度基本相同。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

16.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

17.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

18.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

19.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号