期刊文献+

火控雷达认知抗干扰技术研究 被引量:8

A Study on the Technology of Cognitive Anti-jamming for Fire Control Radar
下载PDF
导出
摘要 认知雷达技术通过对周围环境的学习,实时调整雷达的工作参数,最优化雷达在特定场景下的工作性能,发挥雷达最大性能。火控雷达认知抗干扰技术是一种基于认知技术的雷达抗干扰设计方法,将认知技术融入火控雷达设计中。文中针对火控雷达面临的复合干扰特别是主瓣干扰威胁问题,研究火控雷达认知抗干扰技术,智能化调整火控雷达工作参数,选择工作频率,优化发射波形,有效提升火控雷达抗干扰的能力。 Cognitive anti-jamming technology for fire control radar is proposed, which is state of the art technology. Through the study of the surrounding environment, cognitive radar technology adjust the working parameters of radar in real time, optimize ra-dar performance in a specific scenario, to maximize the performance of radar. Anti-jamming technology of cognitive radar is one kind of radar anti-jamming design method based on cognitive technology, which integrate the cognitive technology into the radar designing, so that the radar has the ability to adjust its working parameters, and effectively improve the ability of radar anti-jam-ming.
作者 张梅仓 王磊
出处 《现代雷达》 CSCD 北大核心 2016年第12期91-94,共4页 Modern Radar
关键词 认知雷达技术 雷达抗干扰 欺骗式干扰 technology of cognitive radar radar anti-jamming deception jamming
  • 相关文献

参考文献8

二级参考文献102

  • 1赵知劲,郑仕链,孔宪正.认知无线电中频谱感知技术[J].现代雷达,2008,30(5):65-69. 被引量:8
  • 2卢建斌,胡卫东,郁文贤.多功能相控阵雷达实时任务调度研究[J].电子学报,2006,34(4):732-736. 被引量:56
  • 3蔡庆宇 薛毅 张伯彦.相控阵雷达数据处理及其仿真技术[M].北京:国防工业出版社,2000..
  • 4Spitzner L. Honeypots: definitions and value of honeypots. http://www.tracking-hackers.com/, 2003.
  • 5Krawetz N. Anti-honeypot technology. IEEE Security & Privacy, 2004, 2(1): 76-79.
  • 6Spitzner L. Dynamic honeypots, http://www.securityfocus. com/infocus/1731, 2003.
  • 7Shi L, Li J, Han X, et al.. Design and implementation of distributed self-election dynamic array honeypot system. China Communications, 2011, 8(4): 109-115.
  • 8Rowe N, Custy E, and Duong B. Defending cyberspace with fake honeypots. Journal of Computers, 2007, 2(2): 25-36.
  • 9Lye K and Wing J. Game strategies in network security. International Journal of Information Security, 2005, 5(4): 71 -86.
  • 10Shiva S, Roy S, and Dasgupta D. Game theory for cyber security. Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, New York, 2010: 1-4.

共引文献218

同被引文献212

引证文献8

二级引证文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部