首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 250 毫秒
1.
为了提高接收信号的质量,在一定程度上消除噪声对信号的影响,提出了一种基于双树复小波变换的信号降噪方法。通过双树结构消除了因间隔采样而丢失的有用信息,对每一层的高频分量的实部和虚部分别计算阈值,依据各自的阈值进行滤波处理。实验结果表明:该方法与离散小波变换消噪方法相比具有平移不变性,处理后的波形较平滑,能够较好地保留信号细节信息,而且其去噪性能也优于离散小波变换。  相似文献   

2.
提出了基于实值离散Gabor变换的阶比跟踪滤波方法.分析了阶比跟踪滤波为时频滤波的实质,给出了如何通过实值离散Gabor变换实现阶比跟踪滤波的步骤.通过对仿真信号阶比跟踪滤波前后的时频分布、阶比谱和时域信号对比,证实本方法能有效滤除阶比混叠成分.通过延长信号两端采样长度的方法可以消除阶比跟踪滤波后端点的误差.  相似文献   

3.
多普勒雷达测速信号滤波方法分析   总被引:2,自引:0,他引:2  
针对四波束多普勒雷达测速信号的特点,提出了适用于光纤捷联惯导/多普勒雷达/气压高度表组合导航系统应用的多普勒雷达测速信号滤波方法.分别分析了卡尔曼滤波、经典数字滤波和小波变换滤波方法在从含有噪声和野值的多普勒雷达测速信号中提取出原始信号的特点,并对实际跑车试验中测得的多普勒雷达测速数据进行了滤波处理.结果表明:小波滤波方法在降噪以及剔除野值方面性能更好,更能适用于组合导航中对多普勒雷达测速信号的精度要求.  相似文献   

4.
飞机发动机是一个非常复杂的大系统,由于其结构复杂,工作环境恶劣,对其关键系统的故障进行准确诊断始终是困扰业界的技术瓶颈之一。提出了采用EMD小波阈值降噪与主元分析相结合的方法,对飞机发动机气路系统故障诊断进行了深入研究。针对某型真实飞机发动机进行测试试验采集的气路多参量数据,首先采用经验模态分解(Empirical Mode Decomposition,EMD)对气路系统各参量信号进行EMD分解,然后采用软阈值函数对其进行降噪,并进行信号重构,从而可得到飞机发动机气路工作状态有效数据。在此基础上,设计了飞机发动机气路系统主元分析故障诊断模型,并结合预处理得到的飞机发动机气路有效数据,运用所设计的主元分析故障诊断模型对飞机发动机进行故障诊断技术研究。研究结果表明,所提出的方法能够很好地诊断出飞机发动机气路系统实际运行时所出现的故障,具有重要的实际应用价值,并有广泛的应用前景。  相似文献   

5.
Hilbert边际谱是Hilbert-Huang变换在频域的一种表示形式,适合分析机械故障诊断中广泛存在的非平稳信号,但是噪声会影响Hilbert边际谱的分析精度。针对从装甲车辆机械系统采集的振动信号中噪声的特点,将形态滤波和自相关相结合,对振动信号进行降噪,提高了Hilbert边际谱对振动信号的分析精度,并在某型坦克变速箱主轴7216轴承滚动体点蚀故障诊断中得到了应用。  相似文献   

6.
在分析基于SVD的平稳信号降噪原理的基础上,提出了一种基于SVD的非平稳信号重叠分段降噪算法.非平稳信号通过数据分段可近似处理为多段平稳信号.为降低连续分段降噪误差,进行一定比例的重叠分段,应用基于SVD的平稳信号降噪方法对各分段信号进行降噪,相邻段之间的重叠信号经过多次降噪后求平均得到最终降噪信号.仿真结果表明,该算...  相似文献   

7.
以去除力锤激励下大型结构振动信号的背景噪声为研究目的,分析了背景噪声产生的原因及结构振动信号的特点,提出了将Prony算法应用于降噪的方法。该方法首先用一组衰减余弦信号分量之和来拟合原始信号,得出各衰减余弦信号的参数,然后根据振动信号的特点从中识别出背景噪声并构造其数学表达式,最后进行降噪处理。运用传统Prony算法和改进Prony算法分别对仿真信号和实测信号进行降噪处理,其结果证明了Prony算法的有效性,且改进的Prony算法具有更高的识别精度和更好的降噪效果。  相似文献   

8.
针对机动车辆换挡信号中存在大量强电磁及环境振动噪声的问题,同时考虑到实时性和硬件实现性能的需求,基于最小带宽离散小波算法,提出了简化的、适用于工程实现的小波分解层数确定方法;然后利用初始阈值对各层小波系数进行分类,利用各层中各类系数均值差的模及均方差为依据,设计了各层阈值的自适应迭代确定算法,同时改进了阈值的量化函数。仿真对比试验和应用测试结果表明,该算法具有较好的降噪效果,适用于机动车辆的相关信号检测与降噪。  相似文献   

9.
矢量量化技术与离散余弦变换相结合不仅能在低码率下获得较好的恢复图象,而且能降低矢量量化器的复杂度。在此基础上,本文对变换后的系数矩阵进行自适应分类,分散码书的搜索过程,进一步降低了矢量量化器的复杂度。  相似文献   

10.
滚动轴承振动信号能够及时准确地提供机电设备状态特征信息,且可实现在线或离线监测,广泛用于滚动轴承故障诊断。由于滚动轴承工作环境复杂多变,往往掺杂较多噪声,噪声会淹没机电设备状态的有用特征信息。针对传统小波阈值函数对轴承信号降噪不明显的问题,提出了一种用于轴承振动信号降噪的差分进化优化小波软阈值算法,对含噪信号进行小波分解,利用广义交叉验证GCV函数作为新的阈值函数对分解后的小波系数进行处理,结合差分进化算法进行寻优获取最优阈值。实验采用美国凯斯西储大学的轴承数据进行仿真分析,通过与常用降噪方法相比,该方法在较好地保留特征信号的前提下,较大程度地去除了噪声,有效地提高了降噪效果。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

14.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

15.
16.
This article demonstrates the inconsistent and wavering Soviet attitude towards national liberation movements in general and the Palestinian organizations in particular. Until the late 1960s, the Soviets viewed these organizations with suspicion, hesitating to engage in political dialogue with them. However, in the 1970s, political and military events in the region, as well as modifications in the Kremlin's Cold War strategies, led to a general shift towards the Middle East in Soviet foreign policy. Soviet leaders showed increased willingness to provide certain Palestinian organizations with arms with which to conduct terrorist activities against Israeli, pro-Israeli, Jewish and Western targets. The article explores the complex relations between Palestinian organizations and the USSR in the field of international terror. The study also exposes and analyzes the nature and content of Soviet–Palestinian arms dialogues and transactions. It provides clear evidence that Soviet policymakers and other luminaries were fully informed of, and sometimes directly involved in, these transactions and dialogues at the highest levels.  相似文献   

17.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   

18.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

19.
This article analyses to what extent the Burmese KNU insurgency made use of external support from states, refugees, and diasporas. Based on extensive fieldwork it is concluded that support from neighbouring states and refugees has for years kept the Karen rebellion alive. Western countries perceived forms of resistance to the illegitimate Burmese regime as just and have therefore played a crucial role in the continuation of conflict in Karen State. It is important that policymakers and donors as well as executing organizations continue to reflect critically on the way they exercise their work.  相似文献   

20.
装备的RMS是装备的重要设计参数,是影响战备完好和保障能力的关键因素.引入GTST-DMLD作为主要建模工具,建立起装备系统的RMS描述模型,以ESD为补充和扩展,对维修过程进行建模.并以GTST-DMLD-ESD模型作为装备RMS仿真的核心,对装备RMS仿真模型的总体框架进行了研究,并对各模块进行了较为详细的探讨.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号