首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 406 毫秒
1.
针对窄带雷达稀疏孔径条件下,目标微多普勒信号无法使用传统方法进行参数化表征和提取的问题,提出一种方位向稀疏孔径条件下微动目标特征提取与成像的新方法。通过详细分析微动目标雷达回波特性,并根据目标回波特征构造微多普勒信号原子集,在此基础上,使用正交匹配追踪算法实现微动目标的特征提取与成像。仿真实验表明该方法能够在稀疏孔径条件下有效提取目标微动特征并实现目标成像。  相似文献   

2.
提出了一种混沌背景下的编码信号检测新方法。信号检测过程包含两个步骤:混沌信号的预测和检测判决。该方法利用非线性前馈神经网络进行混沌信号模型的创建,并采用13位巴克码作为编码信号。仿真结果表明,通过该方法进行编码信号检测可以得到较高的检测概率和较低的虚警概率,整体检测性能较高,并且对于不同信噪比的信号具有较强的鲁棒性。  相似文献   

3.
为实现圆周合成孔径雷达(Circular Synthetic Aperture Radar,CSAR)快速成像,提出一种用于CSAR的快速时域成像算法。该算法通过将CSAR的圆孔径分成若干子孔径,分别对子孔径采用快速因式分解后向投影算法处理,再将各子图像相干插值叠加至同一坐标系下得到成像结果。详细分析算法实现中的坐标转换、误差控制和运算效率等关键问题,并用点目标仿真和实测数据处理结果验证算法的有效性。所研究方法具有成像范围大、计算量小等优点。  相似文献   

4.
提出了一种基于模式编码进行宽带信号到达角估计的方法。该方法通过广义回归神经网络(GRNN)对信号的线性时频协方差矩阵进行分类来实现。介绍了网络结构,数据仿真和应用于高频地波雷达目标定向的实际效果。特别介绍了通过窄带信号数据训练网络然后应用于宽带信号的训练方法,适于宽带训练数据难以获得的情形。仿真和实测数据的分析结果显示该估计方法能适应阵列的误差模式且鲁棒性好,在较低信噪比时能够给出正确估计。  相似文献   

5.
针对空间平滑MUSIC算法会损失阵列的有效孔径且需要信源先验数目的问题,提出了一种新算法.该算法从矢量重构的思路出发,通过对接收数据协方差矩阵的最大特征向量进行矢量重构,即可实现不损失阵列孔径的解相干处理,同时利用全空间加权MUSIC算法,实现了信源数目未知下的相干信号准确定位.仿真结果证实了该方法的有效性.  相似文献   

6.
为解决低信噪比条件下短观测时间雷达成像问题,提出一种基于回波协方差矩阵处理的压缩感知逆合成孔径雷达成像技术。该方法构建了回波协方差矩阵层面下的压缩感知问题模型,并通过特定的线性变换降低环境噪声对成像结果的影响。在仿真实验中,通过处理短观测时间和低信噪比条件下的模拟回波数据,该方法获得比传统压缩感知方法像质更好、对比度更强的目标成像结果。同时,其成像结果的目标背景比和背景噪声能量两个雷达图像评价指标都优于传统方法,进一步验证了该方法的有效性。  相似文献   

7.
为改善小波脊线法在低信噪比下提取二相编码信号脉内特征的性能,提出了一种改进的小波脊线脉内特征提取方法。该方法将魏格纳-威利变换与小波脊线法相结合,利用魏格纳-威利变换对噪声的抑制来改善信噪比,通过分析二相编码信号的小波脊线特征来得到脉内特征参数。仿真结果表明,该方法在低信噪比下仍能准确提取二相编码信号的脉内特征,具有明显优越性。  相似文献   

8.
针对复杂背景下的远距离红外弱小目标检测问题,提出了一种基于自适应结构元素形态学和BP神经网络的智能化检测方法。该方法首先将图像按一定大小分成子图像,通过统计子图像的特征确定候选目标区域,然后基于自适应结构元素的灰度形态学顶帽变换,实现红外空中复杂背景的抑制并突出待检测的小目标。接下来,以像素的灰度、水平、垂直和对角梯度、邻域均值和方差6个特征为输入量,构造三层BP神经网络,最终实现红外复杂背景下的弱小目标检测。仿真实验结果表明,该方法可以实现对红外复杂背景的有效抑制,稳定准确地检测出信噪比大于2的红外弱小目标。  相似文献   

9.
太赫兹技术概述   总被引:3,自引:0,他引:3  
太赫兹技术是电子学和光子学交叉的新兴前沿领域。在介绍太赫兹辐射原理及特性的基础上,阐述了太赫兹辐射的产生和探测方法,重点分析了太赫兹源和探测器的发展现状,探讨了太赫兹技术在光谱识别、成像及无线通信等方面的应用前景。太赫兹技术的发展仍然受到诸多方面的制约,一旦取得突破,将为国民经济发展和国家安全带来新的机遇。  相似文献   

10.
研究利用神经网络实现超分辨雷达成像。该方法首先根据Tuff的前后向线性预测(FBLP)方程用神经网络得到样本序列的AR模型参数,然后利用神经网络作线性预测外推,再用神经网络对外推后的数据作离散哈特来变换(DHT)。从哈特来变换可以方便地得到外推数据的离散傅里叶变换,从而得到距离-多普勒超分辨雷达像。利用微波暗室数据对这一方法进行了数字仿真,结果表明这种方法是可行的,即使在低信噪比下也有较好的性能。  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号