期刊文献+
共找到29篇文章
< 1 2 >
每页显示 20 50 100
Novel non-coherent integration method using binary phase-coded radar signal 被引量:2
1
作者 田黎育 何苗 +1 位作者 刘斌 傅雄军 《Journal of Beijing Institute of Technology》 EI CAS 2013年第1期60-66,共7页
The m series with 511 bits is taken as an example being applied in non-coherent integra- tion algorithm. A method to choose the bi-phase code is presented, which is 15 kinds of codes are picked out of 511 kinds of m s... The m series with 511 bits is taken as an example being applied in non-coherent integra- tion algorithm. A method to choose the bi-phase code is presented, which is 15 kinds of codes are picked out of 511 kinds of m series to do non-coherent integration. It is indicated that the power in- creasing times of larger target sidelobe is less than the power increasing times of smaller target main- lobe because of the larger target' s pseudo-randomness. Smaller target is integrated from larger tar- get sidelobe, which strengthens the detection capability of radar for smaller targets. According to the sidelobes distributing characteristic, a method is presented in this paper to remove the estimated sidelobes mean value for signal detection after non-coherent integration. Simulation results present that the SNR of small target can be improved approximately 6. 5 dB by the proposed method. 展开更多
关键词 binary phase-coded signal non-coherent integration code agility peak sidelobe level(PSL) mainlobe-peak sidelobe ratio
在线阅读 下载PDF
Optimization of jamming formation of USV offboard active decoy clusters based on an improved PSO algorithm 被引量:1
2
作者 Zhaodong Wu Yasong Luo Shengliang Hu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期529-540,共12页
Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for t... Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for timing and deployment.To improve the response speed and jamming effect,a cluster of OADs based on an unmanned surface vehicle(USV)is proposed.The formation of the cluster determines the effectiveness of jamming.First,based on the mechanism of OAD jamming,critical conditions are identified,and a method for assessing the jamming effect is proposed.Then,for the optimization of the cluster formation,a mathematical model is built,and a multi-tribe adaptive particle swarm optimization algorithm based on mutation strategy and Metropolis criterion(3M-APSO)is designed.Finally,the formation optimization problem is solved and analyzed using the 3M-APSO algorithm under specific scenarios.The results show that the improved algorithm has a faster convergence rate and superior performance as compared to the standard Adaptive-PSO algorithm.Compared with a single OAD,the optimal formation of USV-OAD cluster effectively fills the blind area and maximizes the use of jamming resources. 展开更多
关键词 Electronic countermeasure Offboard active decoy USV cluster Jamming formation optimization Improved PSO algorithm
在线阅读 下载PDF
NF-κB decoy寡核苷酸对人结肠癌细胞株SW480/ADM耐药性的逆转作用 被引量:1
3
作者 刘昕 《山东医药》 CAS 北大核心 2011年第33期50-51,共2页
目的探讨核转录因子κB(NF-κB)decoy寡核苷酸对人结肠癌细胞株SW480/阿霉素(ADM)耐药的逆转作用。方法应用脂质体转染方法将NF-κB decoy寡核苷酸质粒转入SW480及SW480/ADM细胞株并证实基因转入成功,MTT法检测SW480及SW480/ADM对ADM的... 目的探讨核转录因子κB(NF-κB)decoy寡核苷酸对人结肠癌细胞株SW480/阿霉素(ADM)耐药的逆转作用。方法应用脂质体转染方法将NF-κB decoy寡核苷酸质粒转入SW480及SW480/ADM细胞株并证实基因转入成功,MTT法检测SW480及SW480/ADM对ADM的药物敏感度并观察NF-κB decoy寡核苷酸对耐药的逆转程度。结果构建NF-κB decoy寡核苷酸有效,能降低核内NF-κB表达;核内NF-κB表达可以导致SW480耐药细胞株药物敏感度增高,并与剂量和时间相关。结论 NF-κB decoy寡核苷酸对人结肠癌细胞株SW480/ADM耐药有明显的逆转作用。 展开更多
关键词 结肠肿瘤 细胞株SW480/ADM NF-ΚB decoy寡核苷酸 耐药性 逆转作用
在线阅读 下载PDF
Free-space measurement-device-independent quantum-key-distribution protocol using decoy states with orbital angular momentum 被引量:20
4
作者 王乐 赵生妹 +1 位作者 巩龙延 程维文 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第12期238-245,共8页
In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protoc... In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol,the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie's successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover,the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence(AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source. 展开更多
关键词 measurement-device-independent quantum key distribution orbital angular momentum atmospheric turbulence decoy states
在线阅读 下载PDF
Practical non-orthogonal decoy state quantum key distribution with heralded single photon source 被引量:4
5
作者 米景隆 王发强 +1 位作者 林青群 梁瑞生 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第4期1178-1183,共6页
Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal deco... Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal decoy state protocol with a heralded single photon source (HSPS) for QKD is presented. The protocol is based on 4 states with different intensities. i.e. one signal state and three decoy states. The signal state is for generating keys; the decoy states are for detecting the eavesdropping and estimating the fraction of single-photon and two-photon pulses. We have discussed three cases of this protocol, i.e. the general case, the optimal case and the special case. Moreover, the final key rate over transmission distance is simulated. For the low dark count of the HSPS and the utilization of the two-photon pulses, our protocol has a higher key rate and a longer transmission distance than any other decoy state protocol. 展开更多
关键词 quantum key distribution decoy state non-orthogonal encoding protocol heralded single photon source
在线阅读 下载PDF
Decoy State Quantum Key Distribution via Beam-Wandering Modeled Atmosphere Channel 被引量:1
6
作者 张胜利 金晨辉 +3 位作者 郭建胜 史建红 邹旭波 郭光灿 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第12期9-13,共5页
We investigate the decoy state quantum key distribution via the atmosphere channels. We consider the efficient decoy state method with one-signal state and two-decoy states. Our results show that the decoy state metho... We investigate the decoy state quantum key distribution via the atmosphere channels. We consider the efficient decoy state method with one-signal state and two-decoy states. Our results show that the decoy state method works even in the channels with fluctuating transmittance. Nevertheless, the key generation rate will be dra-matically decreased by atmosphere turbulence, which sheds more light on the characterization of atmosphere turbulence in realistic free-space based quantum key distributions. 展开更多
关键词 of on in decoy State Quantum Key Distribution via Beam-Wandering Modeled Atmosphere Channel that is
在线阅读 下载PDF
Security of the Decoy State Two-Way Quantum Key Distribution with Finite Resources 被引量:1
7
作者 古亚彬 鲍皖苏 +1 位作者 汪洋 周淳 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第4期1-5,共5页
The quantum key distribution (QKD) allows two parties to share a secret key by typically making use of a one-way quantum channel. Howevery the two-way QKD has its own unique advantages, which means the two-way QKD h... The quantum key distribution (QKD) allows two parties to share a secret key by typically making use of a one-way quantum channel. Howevery the two-way QKD has its own unique advantages, which means the two-way QKD has become a focus recently. To improve the practieM performance of the two-way QKD, we present a security analysis of a two-way QKD protocol based on the decoy method with heralded single-photon sources (HSPSs). We make use of two approaches to calculate the yield and the quantum bit error rate of single-photon and two-photon pulses. Then we present the secret key generation rate based on the GLLP formula. The numerical simulation shows that the protocol with HSPSs has an advantage in the secure distance compared with weak coherent state sources. In addition, we present the final secret key by considering the statistical fluctuation of the yield generation rate of the LM05 protocol with finite resources and the error rate. 展开更多
关键词 QKD in IS on of Security of the decoy State Two-Way Quantum Key Distribution with Finite Resources with
在线阅读 下载PDF
One-decoy state reference-frame-independent quantum key distribution
8
作者 Xiang Li Hua-Wei Yuan +1 位作者 Chun-Mei Zhang Qin Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第7期246-250,共5页
Reference-frame-independent quantum key distribution(RFI-QKD)has been proven to be very useful and practical under realistic environment.Here,we present a scheme for one-decoy state RFI-QKD based on the work of Rusca ... Reference-frame-independent quantum key distribution(RFI-QKD)has been proven to be very useful and practical under realistic environment.Here,we present a scheme for one-decoy state RFI-QKD based on the work of Rusca et al.[Appl.Phys.Lett.112,171104(2018)],and carry out investigation on its performance under realistic experimental conditions.Numerical simulation results show that the one-decoy state RFI-QKD can achieve comparable performance in terms of secret key rate and transmission distance as the two-decoy state correspondence under practical experimental conditions.On contrast,it does not need to prepare the vacuum state in the former case,substantially reducing the experimental complexity and random number consumptions.Therefore,our present proposal seems very promising in practical implementations of RFI-QKD. 展开更多
关键词 quantum key distribution RFI-QKD one decoy state
在线阅读 下载PDF
Practical decoy-state BB84 quantum key distribution with quantum memory
9
作者 Xian-Ke Li Xiao-Qian Song +2 位作者 Qi-Wei Guo Xing-Yu Zhou Qin Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第6期133-136,共4页
We generalize BB84 quantum key distribution(QKD) to the scenario where the receiver adopts a heralded quantum memory(QM). With the heralded QM, the valid dark count rate of the receiver's single photon detectors c... We generalize BB84 quantum key distribution(QKD) to the scenario where the receiver adopts a heralded quantum memory(QM). With the heralded QM, the valid dark count rate of the receiver's single photon detectors can be mitigated obviously, which will lower the quantum bit error rate, and thus improve the performance of decoy-state BB84 QKD systems in long distance range. Simulation results show that, with practical experimental system parameters, decoy-state BB84 QKD with QM can exhibit performance comparable to that of without QM in short distance range, and exhibit performance better than that without QM in long distance range. 展开更多
关键词 quantum key distribution quantum communication quantum memory decoy state
在线阅读 下载PDF
Passive decoy-state quantum key distribution using weak coherent pulses with modulator attenuation
10
作者 李源 鲍皖苏 +2 位作者 李宏伟 周淳 汪洋 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第11期118-124,共7页
Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on t... Passive decoy-state quantum key distribution is more desirable than the active one in some scenarios. It is also affected by the imperfections of the devices. In this paper, the influence of modulator attenuation on the passive decoy-state method is considered. We introduce and analyze the unbalanced Mach-Zehnder interferometer, briefly, and combining with the virtual source and imaginary unitary transformation, we characterize the passive decoy-state method using a weak coherent photon source with modulator attenuation. According to the attenuation parameter 6, the pass efficiencies are given. Then, the key generation rate can be acquired. From numerical simulations, it can be seen that modulator attenuation has a non- negligible influence on the performance of passive-state QKD protocol. Based on the research, the analysis method of virtual source and imaginary unitary transformation are preferred in analyzing passive decoy state protocol, and the passive decoy-state method is better than the active one and is close to the active vacuum + weak decoy state under the condition of having the same modulator attenuation. 展开更多
关键词 quantum key distribution passive decoy state modulator attenuation weak coherent pulses
在线阅读 下载PDF
Effect of weak randomness flaws on security evaluation of practical quantum key distribution with distinguishable decoy states
11
作者 周雨 李宏伟 +5 位作者 周淳 汪洋 陆宜飞 江木生 张晓旭 鲍皖苏 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第5期254-260,共7页
Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections... Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation. 展开更多
关键词 weak randomness quantum key distribution distinguishable decoy state
在线阅读 下载PDF
Detecting the possibility of a type of photon number splitting attack in decoy-state quantum key distribution
12
作者 Xiao-Ming Chen Lei Chen Ya-Long Yan 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第12期67-72,共6页
The existing decoy-state quantum key distribution(QKD)beating photon-number-splitting(PNS)attack provides a more accurate method to estimate the secure key rate,while it still considers that only single-photon pulses ... The existing decoy-state quantum key distribution(QKD)beating photon-number-splitting(PNS)attack provides a more accurate method to estimate the secure key rate,while it still considers that only single-photon pulses can generate secure keys in any case.However,multiphoton pulses can also generate secure keys if we can detect the possibility of PNS attack in the channel.The ultimate goal of this line of research is to confirm the absence of all types of PNS attacks.In particular,the PNS attack mentioned and detected in this paper is only the weaker version of PNS attack which significantly changes the observed values of the legitimate users.In this paper,under the null hypothesis of no weaker version of PNS attack,we first determine whether there is an attack or not by retrieving the missing information of the existing decoy-state protocols,extract a Cauchy distribution statistic,and further provide a detection method and the type I error probability.If the result is judged to be an attack,we can use the existing decoy-state method and the GLLP formula to estimate the secure key rate.Otherwise,the pulses with the same basis received including both single-photon pulses and multiphoton pulses,can be used to generate the keys and we give the secure key rate in this case.Finally,the associated experiments we performed(i.e.,the significance level is 5%)show the correctness of our method. 展开更多
关键词 quantum key distribution photon number splitting decoy state hypothesis testing
在线阅读 下载PDF
Experimental demonstration of passive decoy state quantum key distribution
13
作者 张阳 王双 +5 位作者 银振强 陈巍 梁文烨 李宏伟 郭光灿 韩正甫 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第10期97-100,共4页
Passive decoy state quantum key distribution(PDS-QKD) has advantages in high-speed scenarios.We propose a modified model to simulate the PDS-QKD with a weak coherent light source based on Curty's theory [Opt.Lett.3... Passive decoy state quantum key distribution(PDS-QKD) has advantages in high-speed scenarios.We propose a modified model to simulate the PDS-QKD with a weak coherent light source based on Curty's theory [Opt.Lett.34 3238(2009)].The modified model can provide better performance in a practical PDS-QKD system.Moreover,we report an experimental demonstration of the PDS-QKD of over 22.0-dB channel loss. 展开更多
关键词 quantum key distribution passive decoy state method
在线阅读 下载PDF
Improved statistical fluctuation analysis for two decoy-states phase-matching quantum key distribution
14
作者 周江平 周媛媛 +1 位作者 周学军 暴轩 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第8期188-194,共7页
Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant... Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant system performance to deteriorate when data size is below 1010.In this work,an improved statistical fluctuation analysis method is applied for the first time to two decoy-states phase-matching quantum key distribution,offering a new insight and potential solutions for improving the key generation rate and the maximum transmission distance while maintaining security.Moreover,we also compare the influence of the proposed improved statistical fluctuation analysis method on system performance with those of the Gaussian approximation and Chernoff-Hoeffding boundary methods on system performance.The simulation results show that the proposed scheme significantly improves the key generation rate and maximum transmission distance in comparison with the Chernoff-Hoeffding approach,and approach the results obtained when the Gaussian approximation is employed.At the same time,the proposed scheme retains the same security level as the Chernoff-Hoeffding method,and is even more secure than the Gaussian approximation. 展开更多
关键词 quantum key distribution phase matching protocol statistical fluctuation analysis decoy state
在线阅读 下载PDF
Research on Application of Radar Decoy
15
作者 周哲帅 吴汉平 《Defence Technology(防务技术)》 CAS 2012年第1期26-30,共5页
Taken guidance radar as an example,some evaluation models for number of shot,single-shot kill probability and damage ability are established firstly.Then tactics calculation methods for number of anti-radar reflector ... Taken guidance radar as an example,some evaluation models for number of shot,single-shot kill probability and damage ability are established firstly.Then tactics calculation methods for number of anti-radar reflector beam,throwing time interval and total consumption are given.Finally,the models' feasibility is illustrated with a numerical example and some valuable conclusions are drawn. 展开更多
关键词 operation research radar decoy jamming guidance radar effectiveness evaluation tactics calculation
在线阅读 下载PDF
Corny Criminals: Decoy Detail
16
《海外英语》 2011年第4期35-35,共1页
诱捕偷车贼,该,还是不该?众说纷纭。
关键词 《Corny Criminals: decoy Detail》 英语学习 学习方法 阅读
在线阅读 下载PDF
Experimental demonstration of passive decoy state quantum key distribution
17
作者 张阳 王双 +5 位作者 银振强 陈巍 梁文烨 李宏伟 郭光灿 韩正甫 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第10期101-104,共4页
Passive decoy state quantum key distribution(PDS-QKD) has advantages in high-speed scenarios.We propose a modified model to simulate the PDS-QKD with a weak coherent light source based on Curty’s theory [Opt.Lett.34 ... Passive decoy state quantum key distribution(PDS-QKD) has advantages in high-speed scenarios.We propose a modified model to simulate the PDS-QKD with a weak coherent light source based on Curty’s theory [Opt.Lett.34 3238(2009)].The modified model can provide better performance in a practical PDS-QKD system.Moreover,we report an experimental demonstration of the PDS-QKD of over 22.0-dB channel loss. 展开更多
关键词 quantum key distribution passive decoy state method
全文增补中
Regulation of human interferon signaling by transposon exonization
18
作者 Giulia Irene Maria Pasquesi 《四川生理科学杂志》 2024年第12期2607-2607,共1页
Innate immune signaling is essential for clearing pathogens and damaged cells and must be tightly regulated to avoid excessive inflammation or autoimmunity.Here,we found that the alternative splicing of exons derived ... Innate immune signaling is essential for clearing pathogens and damaged cells and must be tightly regulated to avoid excessive inflammation or autoimmunity.Here,we found that the alternative splicing of exons derived from transposable elements is a key mechanism controlling immune signaling in human cells.By analyzing long-read transcriptome datasets,we identified numerous transposon exonization events predicted to generate functional protein variants of immune genes,including the type I interferon receptor IFNAR2.We demonstrated that the transposon-derived isoform of IFNAR2 is more highly expressed than the canonical isoform in almost all tissues and functions as a decoy receptor that potently inhibits interferon signaling,including in cells infected with severe acute respiratory syndrome coronavirus 2(SARS-CoV-2).Our findings uncover a primate-specific axis controlling interferon signaling and show how a transposon exonization event can be co-opted for immune regulation. 展开更多
关键词 controlling decoy finding
在线阅读 下载PDF
肾移植受者BK病毒感染的电镜超微病理观察 被引量:2
19
作者 王惠 徐进 王素霞 《电子显微学报》 CAS CSCD 北大核心 2023年第1期1-5,共5页
BK病毒相关性肾病是BK病毒在肾组织内激活和大量复制而导致肾小管间质损害为主的肾病,该病是影响肾移植患者远期生存和移植肾功能丧失的重要因素。尿液Decoy细胞的检测是临床上诊断BK病毒感染的无创检查手段之一,以往研究多集中在尿液... BK病毒相关性肾病是BK病毒在肾组织内激活和大量复制而导致肾小管间质损害为主的肾病,该病是影响肾移植患者远期生存和移植肾功能丧失的重要因素。尿液Decoy细胞的检测是临床上诊断BK病毒感染的无创检查手段之一,以往研究多集中在尿液中病毒DNA的检测以及尿液Decoy细胞的光镜观察,而对Decoy细胞的超微结构研究报道较少。肾活检组织的电镜检查在受感染的肾小管上皮细胞内观察到BK病毒颗粒是诊断BK病毒相关性肾病的方法之一。本研究通过透射电镜观察了尿液Decoy细胞和肾组织内BK病毒的超微结构特征。BK病毒直径30~40 nm、大小均一、核心呈中高电子密度、无包膜,呈微晶矩阵或松散集落排列。本研究显示,透射电镜观察BK病毒相关性肾病患者尿沉渣中Decoy细胞的BK病毒检出率高于肾活检组织(由于肾活检取材有限)。尿沉渣电镜检查是一种无创的、可重复的检查方法,对于移植肾BK病毒感染的诊断及其动态监测均具有重要作用。 展开更多
关键词 移植肾 尿沉渣 decoy细胞 BK病毒 电镜检查 超微病理
在线阅读 下载PDF
Weak GPS L1 Signal Acquisition Based on BPDC 被引量:3
20
作者 曾庆喜 唐琳琳 +1 位作者 王庆 陈小惠 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2014年第3期331-337,共7页
It is difficult to achieve accurate acquisition of weak global positioning system( GPS) signals with traditional methods. A weak signal acquisition strategy based on block processing and differentially coherent( BPDC)... It is difficult to achieve accurate acquisition of weak global positioning system( GPS) signals with traditional methods. A weak signal acquisition strategy based on block processing and differentially coherent( BPDC) is put forward after analyzing the advantages and disadvantages of coherent and non-coherent integration algorithms. Code phase parallel search of the pre-coherent integration is conducted by using fast Fourier transform( FFT),and the results are then differential coherent processed and block processed. BPDC method reduces computation cost compared with coherent and noncoherent( CNC) algorithm. The performance of the two algorithms is also compared based on simulated signals. The result shows that the noise suppression effect of BPDC algorithms is superior to that of traditional CNC algorithm,and the superiority of BPDC is more apparent with the reduction of carrier to noise ratio( CNR). In the case that the pre-coherent integration length is 4 ms and CNR is reduced to 28 dB-Hz,CNC algorithm cannot yet acquire signal correctly while BPDC has well acquisition performance. Therefore,for weak GPS signal acquisition,BPDC algorithm can acquire the signal with lower CNR and has better acquisition property. 展开更多
关键词 block processing and differentially coherent(BPDC) coherent and non-coherent(CNC) weak GPS signals
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部