期刊文献+

强电磁干扰下舰船通信的可靠性分析

Reliability Analysis of Ship Communication under Strong Electromagnetic Interference Environment
下载PDF
导出
摘要 为了提高强电磁干扰下舰船通信的可靠性,需要进行通信信号的抗干扰设计和信道均衡设计,提出一种基于自相关匹配滤波检测的强电磁干扰下舰船通信的可靠性优化方法。构建强电磁干扰下舰船通信的信号输出模型,提取强电磁干扰下舰船通信信号的输出谱特征,根据信道的冲激响应进行频谱畸变抑制,采用分数间隔均衡结合的方法进行强电磁干扰下舰船通信信道均衡设计,结合自相关匹配滤波检测方法实现强电磁干扰下舰船通信信号滤波检测和可靠性输出。仿真结果表明,采用该方法进行强电磁干扰下舰船通信的可靠性较好,抗干扰能力较强,输出的稳定性较好。 In order to improve the reliability of ship communication under strong electromagnetic interference(EMI)environment,the anti-interference design and channel equalization design of communication signal are needed.A reliability optimization method for warship communication under strong EMI situation based on autocorrelation matched filter detection is proposed.The signal output model of ship communication under strong electromagnetic interference environment is constructed,and the characteristics of the output spectrum are extracted,and the spectrum distortion is suppressed according to the impulse response of the channel.The design of ship communication channel equalization under strong electromagnetic interference situation is carried out by using fractional interval equalization method,and the filtering detection and reliability output of ship communication signal under strong electromagnetic interference environment are realized by combining with autocorrelation matched filter detection method.The simulation results show that the method has good reliability,strong anti-jamming ability and good output stability under strong electromagnetic interference environment.
作者 邵凌 SHAO Ling(91550 Forces,Dalian 116023)
机构地区 [
出处 《环境技术》 2019年第2期11-15,共5页 Environmental Technology
关键词 强电磁干扰 舰船 通信 可靠性 滤波 strong electromagnetic interference ship communication reliability filteringfuzzy control
  • 相关文献

参考文献4

二级参考文献22

  • 1WANGXiao-yun,YANGLi-zhen,CHENKe-fei.SLEACH: Secure Low-Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Networks[J].Wuhan University Journal of Natural Sciences,2005,10(1):127-131. 被引量:12
  • 2Kohanbash D, Kantor G, and Martin T, et al.. Wireless sensor network design for monitoring and irrigation control: user-centric hardware and software development [J]. HortTechnology, 2013, 23(6): 725-734.
  • 3Park Y T, Sthapit P, and Pyun J Y. Energy efficient data fragmentation for ubiquitous computing[J]. The Computer Journal, 2014, 57(2): 263-272.
  • 4Padmavathi G and Shanmugapriya D. A survey of attacks, security mechanisms and challenges in wireless sensor networks[J]. International Journal of Computer Science and Information Security, 2009, 4(1/2): 1-9.
  • 5Chen X, Yang Z, and Cheng H. Unequal clustering mechanism of leach protocol for wireless sensor networks[C]. 2009.
  • 6WRI World Congress on Computer Science and Information Engineering, IEEE, Los Angeles, CA, USA, 2009 1: 258-262.
  • 7Perrig A, Szewczyk R, and Tygar J D, et al.. Spins: security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5): 521-534.
  • 8Ye M, Li C, Chen G, et al.. EECS: an energy efficientclustering scheme in wireless sensor networks[C]. 24th IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, USA, 2005: 535-540.
  • 9Das M L. Two-factor user authentication in wireless sensor networks[J]. IEEE Transactions on Wireless Communi- cations, 2009, 8(3): 1086-1090.
  • 10Huang Z, Lai X, and Li D. Information security technology - Entity authentication involving a trusted third party and access architecture specification[OL], http://www, csres.com /detail/225096.html.

共引文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部