首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
分析电晕放电信号小波阈值去噪中小波基函数的最优选取、分解层数及阈值的确定,并对实测电晕放电信号进行小波阈值去噪。结果表明,选取db8小波作为最优小波基函数,选取双变量阈值函数作为小波阈值函数对电晕放电信号进行小波阈值去噪,放电辐射信号与背景噪声可以得到有效分离,具有很好的去噪效果。  相似文献   

2.
电晕放电若干特性的实验研究   总被引:1,自引:0,他引:1  
为研究空中带高压物体的电晕放电辐射信号特征,采用组建的静电放电测试系统对电晕电流及其辐射信号进行了实验研究。实验表明:电晕放电脉冲波形具有明显的极性效应。负极性下先发生电晕放电,且电流波形的上升时间小于正电晕电流;电晕放电信号波形前沿陡峭,上升时间从几个ns到二十几个ns;电晕放电辐射信号的频谱成钟型连续谱,其频率范围主要集中在20~100MHz之间;极性不同,电晕放电辐射信号波形不同,并且正电晕信号幅值高于负电晕信号幅值。  相似文献   

3.
针-板电极电晕辐射仿真研究   总被引:1,自引:0,他引:1  
电晕放电是静电放电的一种特殊形式。在分析电晕放电特性的基础上,对针-板电极系统高压电晕辐射场方向特性进行了仿真研究。通过实验与仿真得出:针-板电极系统高压电晕辐射场频谱范围大约为10~200MHz,能量主要集中在80 MHz以下。80 MHz以下辐射场方向图与偶极子天线的辐射方向图相似,低于100 MHz的辐射主要在针电极一侧,而高于100 MHz以上的辐射场方向图极为复杂,其主要辐射在板电极的后方。电晕放电辐射场的空间分布与放电电压、电极的形状以及电晕的发展过程等因素有关,对于电晕放电的不同发展阶段,其辐射场的频域范围也不同。  相似文献   

4.
电晕放电辐射场若干特性分析   总被引:2,自引:0,他引:2  
为了研究电晕放电辐射场若干特性,首先进行了电晕放电时电晕电流的理论分析,研究了电晕电流的波形随电压变化情况。然后在采用针-板电极物理实验模型的基础上进行了电晕放电实验研究,分析了放电针上的充电电压对脉冲电流的影响,并确定了辐射场随传播距离的变化规律以及放电重复率随电压的变化情况。实验结果发现,当针为负极性时先发生放电,但正极性下先发生火花放电;电晕放电辐射场与距离成反比关系;放电重复率随着电压的增大而增大。  相似文献   

5.
特高压输电线路的电晕放电是机载无线电罗盘的主要干扰源之一。根据无线电罗盘的工作原理,在特高压输电线路电晕干扰条件下,通过理论推导得出了无线电罗盘测得的电台相对方位角偏差。针对无方向信标台不同频率、功率及罗盘与输电线路间不同的距离,对无线电罗盘受干扰影响产生的测角偏差进行了仿真分析。研究表明:电晕放电干扰下,机载无线电罗盘测得的电台相对方位角偏差随频率、功率、距离的增加而减小,变化趋势由陡峭逐步趋近平稳。  相似文献   

6.
为研究平稳小波变换去噪算法在工程应用时如何选择小波基、小波系数处理方法和阈值计算方法的参数以取得最优去噪效果,通过仿真实验,对比不同小波基、不同小波系数处理方法及不同阈值计算方法对平稳小波变换去噪算法去噪效果的影响,对算法的参数选择问题进行研究。实验结果表明:相比其他滤波器组,大部分情况下Daubechies 小波基对应的滤波器组去噪效果更好;信号信噪比较低时选用软阈值法,信噪比较高时选用硬阈值法;使用阈值法处理小波系数,信号信噪比不高的情况下应采取固定阈值法来确定阈值,信号信噪比较高时应采取无偏风险估计法。  相似文献   

7.
柴油机振动是一种多振源的复杂振动形式,其机体表面振动是内部各种激振力共同作用的综合反映。在柴油机使用过程中技术状态的改变将导致激振力发生不同的变化,因此测量机体激振信号有利于对柴油机技术状态进行监测。通过测量不同技术状态的柴油机机体振动信号,利用小波包分析的方法,将柴油机振动信号按其特征频率进行了小波分解和重构,提取了振动信号特征。分析结果表明,此方法能够提高信噪比,提取的振动信号特征能够反映柴油机技术状态的变化。  相似文献   

8.
基于小波包分析的电磁导波信号缺陷识别   总被引:1,自引:0,他引:1  
在钢管的电磁导波缺陷检测中,导波信号会不同程度地受到环境噪声污染。针对该问题,提出基于小波包系数区域相关分析的信号处理方法,通过对有缺陷与无缺陷情况的钢管电磁导波检测信号进行小波包分解重构、滤波和区域相关法对比分析,有效地解决了电磁导波检测中钢管缺陷的判别问题。  相似文献   

9.
在运用小波分层阈值降噪方法对再制造发动机磨合振动信号进行降噪处理的过程中,结合现有方法,提出了一种新的分层阈值确定方法,通过仿真对比分析,证明了该方法的优越性,得出了适用于再制造发动机磨合振动信号降噪处理的方法.小波时频分析结果证明了该方法的有效性,为下一步磨合振动特征的提取奠定了基础.  相似文献   

10.
在研究小波分析的基础上,鉴于不同小波函数和融合规则对融合效果的影响,通过改变小波函数和融合规则对红外与可见光图像进行大量融合实验;首先,研究了不同类型小波函数的性质,分析了不同融合算法的特点;接着,对融合实验结果进行了定量分析和比较,为不同应用目的和场合正确选择合适的小波函数和融合规则进行红外和可见光图像融合提供了理论依据.  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号