首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 594 毫秒
1.
针对某海上编队一体化训练模拟系统兵力服务器战场观察预警模拟的需求,克服以往对多雷达平台探测与信息融合仿真度不高的不足,构建了雷达探测仿真模块.设计实现了雷达目标分辨算法、雷达目标探测误差拟合算法和多雷达平台对多目标探测数据的信息融合方法,并具体阐述了该雷达探测模块的主要仿真函数和数据流程.经在某海上编队训练模拟系统上的兵力服务器联邦成员中仿真实现,证明可比较准确地模拟海战场多雷达平台的观察探测和战场信息融合过程.  相似文献   

2.
雷达组网系统将多部雷达组成互联互通的网络,作为典型的赛博物理系统,同样面临着赛博攻击的威胁。为了研究赛博攻击对其性能产生的影响,构建针对雷达组网系统交互式多模型(IMM)数据融合的虚假数据注入攻击(FDIA)模型。建立机动目标动态模型,以及单站雷达和雷达组网系统基于交互式多模型融合算法的分布式数据处理模型。分析虚假数据注入攻击的原理,并建立对应的数学模型。根据机动目标动态模型,进行实验仿真,结果显示虚假数据注入攻击对单站雷达目标状态估计的影响,明显大于对组网雷达目标状态融合估计的影响,验证了雷达组网系统数据融合对于虚假数据注入攻击具有一定的鲁棒性。  相似文献   

3.
基于联邦滤波算法,对雷达/红外双模导引头数据融合算法进行了研究,给出了基于雷达/红外双模导引头跟踪系统的结构及算法模型.针对典型工作状况参数,对匀速、匀加速、机动等目标运动状态进行了蒙特卡罗追踪仿真.仿真结果表明:基于联邦滤波的分布式融合跟踪算法,对各种目标运动状态下的位置、速度跟踪精度和抗干扰能力都相对于雷达单模跟踪的较好.  相似文献   

4.
现代战场上各种隐身目标的出现,要求利用多种传感器组网来采集信息并加以融合,才能充分利用隐身目标各个方向及各个频段不同的反射特性,最大限度提取信息,满足战场对信息、目标识别和态势分析的需要。为此,对制导雷达组网的带反馈的数据融合模型,以及分层Kal-man滤波融合算法、信噪比加权融合算法进行了研究,并通过对特定组网布站的仿真试验,验证了制导雷达组网反隐身的有效性。  相似文献   

5.
研究了一种基于双波段红外和雷达传感器的自适应目标跟踪算法.利用目标多普勒信息和红外辐射信息,建立具有树形结构的红外雷达跟踪系统状态估计模型,采用平方根无迹卡尔曼滤波方法实现双波段红外传感器的初步融合,并将其作为融合节点与雷达传感器进行基于自适应交互式多模型算法的深层融合.在交互式多模型算法的基础上,研究了寻求快速准确的机动目标模型匹配方法,通过局部优化来达到最终融合结果的优化.仿真结果表明,该算法能有效提高机动目标跟踪精度,具有一定的稳健性和自适应性.  相似文献   

6.
复杂电磁环境下组网雷达的作战效能建模   总被引:2,自引:0,他引:2  
针对战场电磁环境日益复杂的趋势,研究了复杂电磁环境组网雷达的作战效能评估问题。依据干扰环境下组网雷达的工作机理,分别建立了基于独立观测的组网雷达目标融合发现模型、基于不同干扰强度的组网雷达目标定位模型和基于信息融合的组网雷达多目标跟踪模型。  相似文献   

7.
对组网雷达的多目标航迹欺骗   总被引:1,自引:0,他引:1  
由于目前点迹压缩、点迹串行合并等融合方法在组网雷达中的普遍应用,使得对单部雷达的多目标航迹欺骗很容易被雷达组网系统所识别。为了能够有效地欺骗组网雷达,并在网内各雷达的PPI显示器上显示相似的航迹,在对单部雷达实施多目标航迹欺骗的理论基础上,提出了一种对组网雷达实施多目标航迹欺骗的方法。根据组网雷达系统中各雷达坐标位置的不同以及各雷达主波束对准干扰机时间的不同,详细讨论了产生具有空间相关性和时间相关性的可控欺骗航迹的算法。  相似文献   

8.
基于WGS-84地球等效参考椭球,构建了较为实际的两部2D雷达组网目标高度观测模型,提出了一种新的雷达情报组网目标高度估计方法,并通过大量仿真分析和对比了该算法的性能.理论分析与仿真证明,该算法模型考虑了雷达电磁波信号在大气中的传播折射问题,以及地球曲率对雷达观测的影响,充分利用了各雷达的量测信息,更贴近雷达观测的实际...  相似文献   

9.
根据武器装备体系对抗仿真的特点,基于HLA技术讨论了组网雷达体系对抗仿真系统的设计问题。提出了仿真系统设计的总体要求,阐述了HLA的基本思想及联邦设计的模型,分析了仿真系统的体系结构和基本工作过程,突破了仿真系统设计的关键技术,完成了基于HLA的组网雷达体系对抗仿真系统的设计。与传统的实体功能仿真相比,该系统既支持纯数学仿真,又支持半实物注入式仿真,是一个较为通用的组网雷达对抗仿真环境。  相似文献   

10.
在分析了灰色关联分析及其改进算法的基础上,针对雷达组网中多传感器数据融合问题,提出了一种新的基于绝对关联度的数据融合方法.该方法将灰色理论和多元概率信息合并理论相结合,计算各雷达之间的总关联度,并用一次平均融合后的数据替换掉总关联程度最差的雷达数据,组成最优融合组,然后进行数据融合.仿真结果表明,该方法在减小计算量的同时,减小了径向误差.  相似文献   

11.
12.
Reviews     
Douglas S. Derrer, We Are All the Target: A Handbook of Terrorism Avoidance and Hostage Survival. Annapolis, MD: US Naval Institute Press, 1992. Pp. x+135, notes, index. $14.95. ISBN 01–55750–150–5

Ian Knight, Zulu: Isandlwana and Rorke's Drift, 22–23 January 1879. London: Windrow & Greene, 1992. Pp.136, 150 illus., incl 8 colour plates, maps, biblio. £35. ISBN 1–872004–23–7

Ian Knight, By the Orders of the Great White Queen: Campaigning in Zululand through the Eyes of the British Soldiers, 1879. London: Greenhill Books and Novato: Presidio Press, 1992. Pp. 272, 17 illus., 1 map. £18.95. ISBN 1–85367–122–3

Manfried Rauchensteiner and Erwin A. Schmidl (eds.), Formen des Krieges: vom Mittelalter zum ‘Low‐intensity’ Conflict’. Graz : Verlag Styria, 1991. Pp.208. DM35. ISBN 3–22–12139–7

Harold J. Kearsley, Maritime Power and the Twenty‐First Century. Dartmouth: Dartmouth Publishing Company, Limited, 1992. Pp.xv + 203, 13 diagrams, index. £32.50. ISBN 1–85521–288–9  相似文献   

13.
The US Army has two approaches to counterinsurgency operations in Afghanistan. One is hard, or combat-focused, and the other is soft, or development-focused. This study examines two US Army task forces deployed to Panjwai District, Afghanistan from 2012 to 2013. CTF 4-9 and 1-38 offer a meaningful comparison because they pursued these contrasting approaches among the same population and against the same enemy at the same time and place. The study compares each unit’s approach and finds that neither approach was successful absent the other. The article concludes by recommending further research into combining the approaches at the operational level.  相似文献   

14.
根据chirp信号在模糊域的特点,本文提出了线性核时频表示方法。这种方法在提高分辨率、消除交叉项以及抑制噪声等方面都具有较高的性能。理论分析和实验结果都证实了这种方法的有效性  相似文献   

15.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

16.
The surprising ‘Arab Spring’ raises the question as to what would enable national intelligence to provide high quality warnings prior to the eruption of popular revolutions. This article uses new sources of evidence to trace and explain Israel's success in comparison to US failure at correctly estimating the course of the Iranian Revolution in 1977–79. In explaining this variance, the article shows that it was mainly the result of the intimate acquaintance of Israel's representatives in Iran with the local language, history and culture, as well as the ability to communicate with locals – tools which the Americans completely lacked.  相似文献   

17.
继续教育作为终身教育的重要组成部分和基本形式,对教师的发展成长意义重大。继续教育工作开展十多年来,取得了一定的成绩,但还存在不少问题,如学习动机较为被动,管理认识不到位,教学内容陈旧空泛,教学方法呆板机械等。随着课程改革的不断深入,继续教育必须采取相应的改进措施,树立以人为本,服务至上的观点,教学内容的前瞻性与实用性并重,教学人员进行整合,教学方法灵活多样,评价考核规范科学等,以此激活受训教师内在的学习动机,更大程度地提高继续教育培训的实际效果。  相似文献   

18.
目前市场上的网络监控技术一般用昂贵的硬件设备来支撑,投资较大。在深入研究微软的DirectX9.0的基础上,提出如何用DirectShow软件技术和普通的数字摄像头来实现网络视频的监控和实现技术,内容涉及通信协议、视频的编码与解码技术、视频的编码格式和COM组件编程技术等,最终的实验结果令人满意,且费用低廉,技术可靠,为在高速局域网内构建视频监控系统提供有效的技术支持。  相似文献   

19.
In 1796 a 13-year-old boy playing on wasteland behind his father’s house in Ribchester, Lancashire discovered an assemblage of over 30 Roman artefacts, including a decorated brass helmet. Although partially corroded the Ribchester helmet is a fine example of a first-century AD cavalry sports helmet. This article considers how the interpretation of the helmet has evolved since its discovery. The multi-faceted iconography of the helmet with its mural crown diadem is that of an elite soldier and is paralleled in other examples of cavalry sports helmets of the Ribchester type. The long-neglected imagery on the helmet bowl is reinterpreted and seen not as a haphazard collection of randomly placed combatants but as a highly structured, symmetrical composition specifically designed to be viewed from different directions.  相似文献   

20.
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号