首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 812 毫秒
1.
烟幕干扰效能评估系统设计   总被引:1,自引:1,他引:0  
烟幕干扰效能评估是烟幕干扰技术研究和烟幕战术使用研究的重要环节,论述了烟幕干扰评估系统的功能和组成,对成像视频跟踪器、烟幕干扰视景仿真技术及烟幕干扰效果定量评估方法等关键技术进行了分析并给出了解决方案.  相似文献   

2.
本文介绍了烟幕干扰技术的现状 ,讨论了烟幕干扰技术的发展趋势 ,并对我国烟幕干扰技术的发展提出了建议  相似文献   

3.
舰载烟幕弹对抗红外成像型反舰导弹的仿真研究   总被引:1,自引:0,他引:1  
施放红外烟幕是一种有效地对抗红外成像型反舰导弹的方法之一,为了研究烟幕对抗红外成像型反舰导弹的战术运用方法,分别建立了舰艇、烟幕、导弹的运动模型,并从烟幕浓度的变化引起导引头信噪比变化的角度,建立了烟幕干扰效果的评判模型,给出了烟幕干扰效果的一种判断方法。通过计算机仿真,动态地模拟出了红外烟幕对抗红外成像型反舰导弹的态势,得出了烟幕布放、舰艇规避机动战术决策的原则和方法,仿真结果对烟幕对抗红外成像型反舰导弹的战术运用有重要的参考价值。  相似文献   

4.
烟幕干扰技术的现状与发展趋势   总被引:8,自引:0,他引:8  
本文介绍了烟幕干扰技术的现状,讨论了烟幕干扰技术的发展趋势,并对我国烟幕干扰技术的发展提出了建议。  相似文献   

5.
研究红外烟幕干扰仿真,是烟幕测试和评价工作中的重要方面.基于烟幕干扰外场试验实测数据,分析了天空背景下红外烟幕的辐射特性,计算了太阳辐射和天空背景辐射对中长波段红外辐射的影响,对红外烟幕的透过率进行了计算,对双色红外烟幕干扰进行了仿真.仿真结果同外场试验结果吻合,满足烟幕测试和评价要求.  相似文献   

6.
探讨了改装 80mm反坦克火箭弹、电磁感应点火烟幕火箭弹、复合发射烟幕火箭弹等几种烟幕火箭弹的部分方案设想。为烟幕火箭弹在无源干扰中的研究应用提供参考。  相似文献   

7.
杨彦杰  白玉栋 《红外》2013,34(9):40-43
施放烟幕是对抗激光制导导弹的有效方法之一。为了模拟烟幕对抗激光制导导弹的过程,本文分别建立了舰船、烟幕和导弹运动的数学模型,提出了干扰效果的评估准则。通过编程对烟幕对抗过程进行了仿真,并评估了在不同对抗环境下舰船的转角、航速及风速对烟幕干扰效果的影响。  相似文献   

8.
烟幕作为一种重要的干扰手段,在对抗各类精确制导武器的过程中发挥了重要作用。本文从烟幕干扰对导引头的影响机理出发,从烟幕透过率、烟幕自身辐射、烟幕有效遮蔽时间和目标的面积遮挡比四个方面分析了烟幕对红外导引头的性能影响,并结合半实物仿真进行了定量测试,得出了科学合理的试验数据,实现烟幕干扰环境下红外导引头的抗干扰能力准确评估。  相似文献   

9.
烟幕对红外制导武器的干扰研究   总被引:8,自引:5,他引:8  
烟幕是对抗红外制导武器的有效手段,分析了红外成像系统的组成及工作原理,论述了对抗红外成像系统的干扰机理及烟幕对红外成像制导的干扰原理,并详细论述了烟幕对成像系统的视频信号处理、跟踪处理器以及红外成像系统的信噪比的影响,得出了其作用机理,为烟幕在光电对抗中的应用提供了一定的理论基础.  相似文献   

10.
探讨了改装80mm反坦克火箭弹、电磁感应点火烟幕火箭弹、复合发射烟幕火箭弹等几种烟幕火箭弹的部分方案设想。为烟幕火箭弹在无源干扰中的研究应用提供参考。  相似文献   

11.
陈文建  迟泽英 《红外技术》2005,27(6):449-452
主要介绍了研究红外烟幕环境对目标热像像质影响程度和规律的综合评价软件设计.该软件主要包括两大功能模块:1)红外烟幕对热像图遮蔽效果的评价和管理模块,利用该模块研究红外烟幕环境对红外与热像传输影响的定量测试与评价,指导红外烟幕弹的研制与改进;2)红外烟幕遮蔽条件下热像图增强处理模块,该模块主要是研究采用一定的处理方法,改善烟幕遮蔽条件目标热像图的观察效果,争取最短时间发现或识别目标,为今后热像仪的研制设计、改进提供参考依据.最后给出了利用该评价平台对热像仪所获得的烟幕遮蔽条件下坦克目标的热像数据计算分析结果,获得了一些有意义的数据.  相似文献   

12.
Three alternative schemes for secure Virtual Private Network (VPN) deployment over the Universal Mobile Telecommunication System (UMTS) are proposed and analyzed. The proposed schemes enable a mobile node to voluntarily establish an IPsec-based secure channel to a private network. The alternative schemes differ in the location where the IPsec functionality is placed within the UMTS network architecture (mobile node, access network, and UMTS network border), depending on the employed security model, and whether data in transit are ever in clear-text, or available to be tapped by outsiders. The provided levels of privacy in the deployed VPN schemes, as well as the employed authentication models are examined. An analysis in terms of cost, complexity, and performance overhead that each method imposes to the underlying network architecture, as well as to the mobile devices is presented. The level of system reliability and scalability in granting security services is presented. The VPN management, usability, and trusted relations, as well as their behavior when a mobile user moves are analyzed. The use of special applications that require access to encapsulated data traffic is explored. Finally, an overall comparison of the proposed schemes from the security and operation point of view summarizes their relative performance. Christos Xenakis received his B.Sc. degree in computer science in 1993 and his M.Sc. degree in telecommunication and computer networks in 1996, both from the Department of Informatics and Telecommunications, University of Athens, Greece. In 2004 he received his Ph.D. from the University of Athens (Department of Informatics and Telecommunications). From 1998–2000 was with the Greek telecoms system development firm Teletel S.A., where was involved in the design and development of advanced telecommunications subsystems for ISDN, ATM, GSM, and GPRS. Since 1996 he has been a member of the Communication Networks Laboratory of the University of Athens. He has participated in numerous projects realized in the context of EU Programs (ACTS, ESPRIT, IST). His research interests are in the field of mobile/wireless networks, security and distributed network management. He is the author of over 15 papers in the above areas. Lazaros Merakos received the Diploma in electrical and mechanical engineering from the National Technical University of Athens, Greece, in 1978, and the M.S. and Ph.D. degrees in electrical engineering from the State University of New York, Buffalo, in 1981 and 1984, respectively. From 1983 to 1986, he was on the faculty of Electrical Engineering and Computer Science at the University of Connecticut, Storrs. From 1986 to 1994 he was on the faculty of the Electrical and Computer Engineering Department at Northeastern University, Boston, MA. During the period 1993–1994 he served as Director of the Communications and Digital Processing Research Center at Northeastern University. During the summers of 1990 and 1991, he was a Visiting Scientist at the IBM T. J. Watson Research Center, Yorktown Heights, NY. In 1994, he joined the faculty of the University of Athens, Athens, Greece, where he is presently a Professor in the Department of Informatics and Telecommunications, and Director of the Communication Networks Laboratory (UoA-CNL) and the Networks Operations and Management Center. His research interests are in the design and performance analysis of broadband networks, and wireless/mobile communication systems and services. He has authored more than 150 papers in the above areas. Since 1995, he is leading the research activities of UoA-CNL in the area of mobile communications, in the framework of the Advanced Communication Technologies & Services (ACTS) and Information Society Technologies (IST) programmes funded by the European Union (projects RAINBOW, Magic WAND, WINE, MOBIVAS, POLOS, ANWIRE). He is chairman of the board of the Greek Universities Network, the Greek Schools Network, and member of the board of the Greek Research Network. In 1994, he received the Guanella Award for the Best Paper presented at the International Zurich Seminar on Mobile Communications.  相似文献   

13.
随着企业规模逐渐扩大,远程用户、分支机构、合作伙伴也在不断增多,关键业务的需求增加,出现了一种通过公共网络(如Internet)来建立自己的专用网络的技术,这种技术就是虚拟专用网(简称VPN)。本文首先介绍了VPN的概念,对VPN的实现技术进行了分类和适用性分析,然后分析了各种类型的企业在信息安全方面的需求和限制,根据不同企业的特点提出了不同的VPN解决方案,最后,对VPN在集成电路企业中的应用做了简单的拓朴展示。  相似文献   

14.
徐春霞 《电子工程师》2004,30(5):65-67,73
在讨论了接入控制器(AC)网络管理系统安全重要性的基础上,分析了SNMP协议的应用,包括对其3个版本SNMPv1、SNMPv2及SNMPv3的优缺点的对比,并解释了该设备网络管理系统采用SNMPv3版本的原因.详细介绍了AC所实现的管理信息库的内容,包括RFC1213协议、IEEE 802.1x协议、RMON协议、Web DHCP、EAP_OTP、EAP_MD5、EAP_TLS、EAP_SIM等多种认证协议以及网络管理系统的五大功能.最后阐述了AC安全网络管理系统结构的设计与实现.  相似文献   

15.
Thanks to their structure, the SOI technologies present several intrinsic advantages for analog and RF applications. Indeed, as it is well established now, these technologies allow the reduction of the power consumption at a given operating frequency. Moreover, the high-insulating properties of SOI substrates, in particular when high resistivity substrate is used, make that these technologies are perfect candidates for mixed-signal applications. In the present paper, we will discuss the performances of the SOI technologies in radio-frequency range. First of all, the high-frequency behavior of SOI substrates, thanks to the characterization of transmission lines, will be shown. The impact of the SOI substrate resistivity on the performances of passive components will also be analyzed. Then, an overview of RF performances of SOI MOSFETs for two different architectures, fully- and partially-depleted, will be achieved and compared to the bulk ones. Finally, the influence of some specific parasitic effects, such as the kink effect, the self-heating effect and the kink-related excess noise, on the RF performances of SOI devices will be studied, thanks to a specific high-frequency characterization.  相似文献   

16.
自动测试系统中的总线技术   总被引:3,自引:2,他引:1  
自动测试系统满足现代科研生产中对测试高速度和高精度的要求,其发展方向是标准化、模块化和系列化,而标准的总线技术是满足这三化的关键技术,总线技术作为自动测试系统的核心,其发展推动了自动测试系统的更新换代.按照自动测试系统中出现的总线技术的顺序,依次对GPIB,VXI,PXI,LXI的基本特性、优缺点及应用进行概括,重点是结合在实际中组建自动测试系统对总线的选型,从宏观上比较了选取传统的卡式仪器总线或基于以太网的新型总线的因素.从而使用户在选取总线时更有针对性和目的性.  相似文献   

17.
雷达探鸟技术发展与应用综述   总被引:3,自引:0,他引:3  
探鸟雷达已成为机场鸟击防范、风力发电场鸟击风险评估、鸟类自然保护区鸟情观测与科学研究的重要工具。文中首先论述了探鸟雷达的主要组成部分。然后,分析了地面杂波、空域杂波和其他无关目标对探鸟雷达探测效果的影响,进而介绍了传统的杂波抑制方法和相参雷达杂波抑制技术,以及先进的探鸟雷达采用的目标检测、目标跟踪、目标显示、数据记录和雷达组网等数据处理技术。接着,给出了当前的探鸟雷达能够获取的目标轨迹、回波大小、回波强度、信号波动、飞行速度、飞行高度等反映飞鸟目标特性的主要指标。最后,描述了国内外四种典型雷达探鸟系统,并针对雷达探鸟技术的未来发展提出了一些思考及可行性建议。  相似文献   

18.
事件科普营销模式探究   总被引:1,自引:0,他引:1  
王勇  王蒲生 《科普研究》2013,8(2):26-30
从事件的视角看科普,已形成了社会公共事件、社会热点事件、社会突发事件等社会事件中嵌入科普的应急科普模式。但从科普的视角看事件,应急科普模式只是依托事件展开科普的组成部分,结合事件营销和科普营销的已有研究基础,本文提出事件科普营销模式,界定其依借公益性、聚焦性和危机性事件的内涵和依附性、新闻性、策划性三个特征,并从科学技术渗透疆常生活、资源整合、投入产出效率等角度论述其兴起的内在依据,并提出借势方式和造势方式下的四种路径。  相似文献   

19.
李郁  郑士德 《电子设计工程》2011,19(19):147-149
随着雷达发射机技术的不断发展,越来越多的新技术应用于发射机设计中。复杂可编程逻辑器件CPLD和现场可编程门阵列FPGA,同以往的PAL和GAL器件相比,这些器件含有数量众多的可编程逻辑宏单元或逻辑块,规模大,组合能力强,设计成功能各异的逻辑电路,适合于时序、组合等逻辑电路。本文用CPLD对发射机控制功能进行综合处理,控制命令产生部分根据信号处理机通过串行链发来的控制命令产生控制命令,然后对发射机进行相应的控制,并对相关命令根据时序和故障情况进行逻辑链锁,达到最终控制发射机的目的。  相似文献   

20.
为提高天馈问题被发现的准确性和维护效率,提出了基于高斯分布的最佳方向角解决方案来诊断运营商天馈覆盖问题。首先计算 UE 上报的具有定位信息的每个 MR 采样点与基站之间的位置方向信息,然后按照位置方向的一定角度间隔逐个统计各区间的MR采样点占比,取MR采样点占比最大的角度区间为该扇区的、基于用户热点分布的最佳天线方向角,最后将该最佳方向角与后台天线基础数据库中基站方向角进行比对,发现天馈系统接反、天线覆盖方向不合理、后台天线数据库错误等一系列天馈相关问题。经验证,采用该算法发现天馈问题的成本、准确率和效率较现有方法有明显改善?。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号