共查询到20条相似文献,搜索用时 234 毫秒
1.
通过分析线性调频连续波雷达回波差拍信号的频谱特点,提出了一种目标差拍幅度谱值配对和多普勒测距误差校正及解决距离一速度耦合的方法,并进行了计算机仿真。仿真结果验证了本文方法的有效性。 相似文献
2.
3.
4.
调频连续波雷达根据发射和接收线性调频信号的差拍频率计算目标高度,具有发射峰值功率小、硬件成本低和信号处理简单等优点,是当前高度表最常采用的一种测高波形。但当测高雷达相对地面运动,距离延时对应差拍频率和目标运动多普勒存在耦合时,直接将回波多普勒前沿检测结果作为差拍频率计算平台高度会存在较大偏差。通过对运动雷达发射调频连续波信号的回波信号进行数学建模,分析运动目标多普勒频率和距离延时对应差拍频率之间的耦合关系,给出一种改进的运动目标高度解算方法,并推导给出解析表达式。通过数值仿真,对比采用补偿方法的前后运动目标测高结果,说明所提出方法的有效性。 相似文献
5.
针对传统调频连续波(FMCW)雷达高度表模拟信号处理方法精度差、检测能力低、不够灵活等缺点,给出了一种基于快速傅里叶变换(FFT)的恒差拍FMCW雷达高度表数字信号处理器设计方案,实现了信号的全数字化处理,并通过仿真验证了方案的可行性和正确性。 相似文献
6.
7.
8.
针对LFMCW雷达高速运动目标的检测问题,本文提出了一种二次混频与MTD处理相结合的方法。根据上、下调频差拍信号对称特点,采用二次混频处理解决多周期信号中心频率偏移问题,同时实现了距离-多普勒解耦合。MTD处理则等效地实现了多周期信号的积累,并得到目标速度估计。然后根据速度估计值对差拍信号进行运动补偿,获取目标距离信息。性能分析结果表明,与传统MTD方法相比,在输入信噪比一定的情况下,该方法的处理增益不受目标多普勒的影响,因此更适用于高速运动目标的检测。仿真结果验证了该方法的有效性。 相似文献
9.
单快拍DOA估计方法可解决短时突发信号和相干信源背景下传统方法面临的秩亏损问题。本文提出一种基于迭代超分辨的单快拍DOA估计方法,利用迭代超分辨技术估计阵列的协方差矩阵,然后采用求根MUSIC算法实现对DOA的估计。该方法无需谱峰搜索,可在不损失阵列孔径的同时实现单快拍DOA估计。论文推导了基于最小方差无畸变响应原则的迭代超分辨技术,仿真分析了空间角度划分、迭代次数、信噪比等参数对DOA分辨的正确率和估计精度的影响,与已有方法的对比结果验证了本文方法的有效性。 相似文献
10.
11.
针对数字天顶仪原有方法计算过程复杂和计算过程中存在误差的问题,通过改变时间补偿方式和优化迭代核心,提出了一种改进的数字天顶仪定位方法.该方法在切平面中进行均值过程,消除了原方法运算中引入的误差,也避免了切平面变换和反变换的反复计算,从而大幅简化了计算流程.通过实验比较了传统方法与改进方法的计算效率和精度,结果表明:改进方法的计算效率比原方法提高了至少6倍;改进方法赤纬的计算精度比原来的15米左右提高了约1.05 m.因此,改进方法能够在一定程度上提高定位的精度. 相似文献
12.
为了减小全画幅平均红外标定引起的非均匀性误差,主要探究一种适用于外场条件的红外系统分区域标定方法。首先对增益系数矩阵进行估计,然后利用估计矩阵对标定区域进行划分,最后利用最小二乘法分别对不同区域进行标定,得到增益系数标定矩阵。通过开展大口径地基红外测量系统标定实验,对本文方法进行精度验证。结果表明,与传统方法相比,通过本文方法得到的标定方程进行目标辐射亮度反演时,平均相对误差减小13.07%,平均误差偏离度减小0.2877。该方法对于整个画幅标定精度更高,目标特性反演准确性显著提升,可为红外系统标定的实际工程应用提供有益的参考和借鉴。 相似文献
13.
文中为机动目标提出了一种宽带和窄带脉冲相结合的雷达运动参数估计方法。该方法采用相邻脉冲互相关法(CCAE)作为宽带估计方法,采用基于牛顿迭代的最大似然估计方法(MN)作为窄带估计方法。文中提出的融合方法具有两个优点。首先,融合方法利用CCAE的速度估计值作为MN方法的初始速度。由于CCAE的速度无模糊范围较大,能有效解决MN方法的速度模糊问题。其次,由于MN方法的距离和速度的估计精度对于初始加速度不敏感,该融合方法将CCAE的加速度估计值作为MN方法的最终加速度,把MN方法的三维搜索简化成二维搜索。分析了CCAE和MN方法的估计性能,并且比较了CCAE、MN方法和融合算法的计算复杂度。仿真结果表明:提出的宽窄带融合估计方法在距离和速度上拥有与MN方法相近的估计性能,并且拥有更低的计算量。 相似文献
14.
A risk assessment method of the wireless network security 总被引:2,自引:0,他引:2
Zhao Dongmei Wang Changguang Ma Jianfeng 《电子科学学刊(英文版)》2007,24(3):428-432
The core of network security is the risk assessment. In this letter, a risk assessment method is introduced to estimate the wireless network security. The method, which combines Analytic Hierarchy Process (AHP) method and fuzzy logical method, is applied to the risk assessment. Fuzzy logical method is applied to judge the important degree of each factor in the aspects of the probability, the influence and the uncontrollability, not to directly judge the important degree itself. The risk assessment is carved up 3 layers applying AHP method, the sort weight of the third layer is calculated by fuzzy logical method. Finally, the important degree is calculated by AHP method. By comparing the important degree of each factor, the risk which can be controlled by taking measures is known. The study of the case shows that the method can be easily used to the risk assessment of the wireless network security and its results conform to the actual situation. 相似文献
15.
叙述了一种减小硅外延自掺杂影响的改进的二步外延法:减压-常压二步法。采用该方法所生长的外延层,其过渡区明显小于常规二步法的结果,和单纯减压方法所得的结果相当,外延层晶格质量明显优于单纯减压外延的结果。 相似文献
16.
针对阈值法分割红外图像易产生误分割和水平集分割方法受初始曲线限制大,提出了一种结合模糊阈值与水平集的自适应红外图像分割方法。该方法首先采用二维Otsu方法计算阈值,利用该阈值获取模糊阈值分割法中的窗口宽度,使模糊阈值分割法具有自适应性;然后采用此自适应模糊阈值分割法预分割红外图像,利用预分割结果自动获取水平集初始曲线;最后将Chan-Vese方法与Shi方法结合提出改进的水平集方法,并用此方法分割红外图像。实验结果表明,本文方法具有较好的分割效果和较强的鲁棒性。 相似文献
17.
A new decoding method with decoder is used in open-loop all-optical chaotic communi-cation system under strong injection condition. The performance of the new decoding method is nu-merically investigated by comparing it with the common decoding method without decoder. For new decoding method, two cases are analyzed, including whether or not the output of the decoder is ad-justed by its input to receiver. The results indicate the decoding quality can be improved by adjusting for the new decoding method. Meanwhile, the injection strength of decoder can be restricted in a certain range. The adjusted new decoding method with decoder can achieve better decoding quality than decoding method without decoder when the bit rate of message is under 5 Gb/s. However, a stronger injection for receiver is needed. Moreover, the new decoding method can broaden the range of injection strength acceptable for good decoding quality. Different message encryption techniques are tested, and the result is similar to that of the common decoding method, indicative of the fact that the message encoded by using Chaotic Modulation (CM) can be best recovered by the new decoding method owning to the essence of this encryption technique. 相似文献
18.
19.
A method for the design of linear-phase digital filters by the tapped cascaded interconnection of identical subfilters is presented. The method is an extension of the method proposed by Saramaki (1987). An example is given to show that the number of distinct multipliers of the filter determined by the proposed method is less than that of filters determined by Saramaki's method (1987). We also consider the case in which the subfilters are determined by multiple use of a single filter. In particular, if we can make the subfilters multiplierless then the number or multiplications per sample required to implement the overall filter is less than that required by the direct-form minimax method. Methods for the design of computationally efficient filters are also developed based on the proposed transformation method. The multiplication rate of the overall filter is the same as that of the prototype filter. It is very low as compared to that designed by the equivalent direct-form minimax method. With the proposed transformation method, methods for the design of a filter having nth-order tangency at both ends (0, π) are also developed. This is an extension of Vaidynathan's method (1985) and the proposed transformation method. The advantages of the method are that the resulting filters have very flat passbands and the stopbands are computationally efficient. 相似文献
20.