期刊文献+

脉冲成形幅相调制信号的符号级广义加扰及应用

Symbol Level Generalized Scrambling and Its Application for Pulse-shaping Amplitude-phase Modulated Signal
下载PDF
导出
摘要 在对脉冲成形幅相调制信号模型与通信系统中各种环节加解扰所发挥的不同作用简要概述的基础上,针对脉冲成形幅相调制这一类信号,将比特级加扰操作推广至符号级广义加扰,建立了符号级广义加扰与解扰的理论模型,阐述了其工程实现方法,并对相关特性进行了详细分析。最后,通过示例性仿真展示了符号级广义加扰在脉冲成形幅相调制信号传输中所发挥的作用,从而为推广其在通信电子防御中的工程化应用提供了重要参考。 Based on a brief overview of the pulse-shaping amplitude-phase modulated signal model and the different roles played by scrambling and descrambling in various parts in communication systems,for such signals as pulse-shaped amplitude-phase modulation,the bit-level scrambling operation is extended to symbol-level generalized scrambling,a theoretical model of symbol-level generalized scrambling and descrambling is established,its engineering implementation method is described,and the relevant features are analyzed in detail.Finally,an example simulation indicates the role of symbol-level generalized scrambling and descrambling in pulse-shaping amplitude-phase modulated signals transmission,which provides an important reference for the popularized engineering application in communication electronic defense.
作者 石荣 包金晨 SHI Rong;BAO Jinchen(Science and Technology on Electronic Information Control Laboratory,Chengdu Sichuan 610036,China)
出处 《通信技术》 2022年第6期688-694,共7页 Communications Technology
基金 中国电科技术创新基金(科预字2021043)。
关键词 脉冲成形幅相调制信号 比特级加扰 符号级广义加扰 轻量级加密 反调制识别 通信电子防御 pulse-shaping amplitude-phase modulated signal bit-level scrambling symbol-level generalized scrambling lightweight encryption anti-modulation recognition communication electronic defense
  • 相关文献

参考文献3

二级参考文献17

  • 1朱华安,谢端强.基于m序列统计特性的序列密码攻击[J].通信技术,2003,36(8):96-98. 被引量:6
  • 2罗向阳,沈利,陆佩忠,刘粉林.高容错伪随机扰码的快速盲恢复[J].信号处理,2004,20(6):552-558. 被引量:13
  • 3杨允军,武传华,陶雷.m序列估计的三阶相关函数法[J].电子对抗技术,2005,20(6):18-20. 被引量:4
  • 4Vincent W,Chan S. Optical satellite networks[J]. IEEE Journal of Lightwave Technology, 2003, 21 (11) : 2811 - 2827.
  • 5黄月江,祝世雄.信息安全与保密[M].2版.北京:国防工业出版社,2008.
  • 6雷蓓蓓.基于物理层加密的调制方式隐蔽算法研究[D].西安:西北大学,2012.
  • 7MASSEY J L. Shift Register Syntheies and BCH Decoding[J].{H}IEEE Transactions on Information Theory,1969,(1):122-127.
  • 8MEIER W,STAFFEBACH O. Fast Correlation Attacks on Certain Stream Ciphers[J].{H}Journal of Cryptology,1989,(3):159-176.
  • 9张永光;楼才义.信道编码及其识别分析[M]{H}北京:电子工业出版社,2010160-199.
  • 10肖国镇;梁传甲;王育民.伪随机序列及其应用[M]{H}北京:国防工业出版社,1985.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部