参考文献
[1]JR D L.射频隐身导论[M].沈玉芳,译.西安:西北工业大学出版社,2009.
[2]WANG Wenqin.Feature Article:Potential Transmit Beamforming Schemes for Active LPI Radars[J].IEEE Aerospace and Electronic Systems Magazine,2017,32(5):46-52.
[3]SHANG Changhai,WANG Zhenghua.A Metric Valuation of the Power Management for LPI Radar[C]//Proceedings of International Conference on Radar.Shanghai,China:[s.n.],2016:1-3.
[4]OHAD B,VLADMIR V N.Adaptive Optimization of a Free Space Laser Communication System Under Dynamic Link Attenuation[J].IEEE/OSA Journal of Optical Communications and Networking,2011,3(3):215-222.
[5]朱江,巴少为,杜清敏.认知无线网络中一种非合作博弈功率控制算法[J].电讯技术,2016,56(12):1301-1309.
[6]VINCENT L N,BART S.DADS with Short Spreading Sequences for High Data Rate Communications or Improved BER Performance[C]//Proceedings of Military Communications and Information Systems Conference.Paris,France:IEEE Press,2013:1-8.
[7]BART S,VINCENT L N.Pseudo-random Binary Sequence Selection for Delay and Add Direct Sequence Spread Spectrum Modulation Scheme[J].IEEE Communications Letters,2010,14(11):1002-1004.
[8]AMIR I S,ARKADIY V K,IRINA R L,et al.Analysis and Simulation of Channel Nonreciprocity in Meteor-burst Communications[J].IEEE Transactions on Antennas and Propagation,2017,65(4):2009-2019.
[9]AMIR I S,ARKADIY V K.Secure Key Distribution Based on Meteor Burst Communications[C]//Proceedings of International Conference on Security and Cryptography.Vienna,Austria:IEEE Press,2014:1-6.
[10]杨宇晓,周建江,陈军,等.基于最大条件熵的射频隐身数据链猝发通信模型[J],航空学报,2014,35(5):1385-1393.
[11]洪涛,宋茂忠,刘渝.切换天线发射的低截获率通信信号物理层安全传输[J].应用科学学报,2011,29(4):368-373.
[12]ZHENG Y R,LI L F.Performance Metrics for Low Probability of Detection in Cooperative Communication Networks [C]//Proceedings of OCEANS’16.Shanghai,China:[s.n.],2016:1-5.
[13]JI W J,YOUNG S K.Low Probability of Intercept Property of Binary Sidel’nikov Sequences[C]//Proceedings of International Conference on Information and Communication Technology Convergence.Seoul,South Korea:IEEE Press,2015:733-735.
[14]FANCEY C,ALABASTER C M.The Metrication of Low Probability of Intercept Waveforms[C]//Proceedings of IEEE WDD’10.Washington D.C.,USA:IEEE Press,2010:58-62.
[15]YIRONG S,CHANG Zengping.Evaluation and Simulation of LPI Radar Signals’ Low Probability of Exploitation[C]//Proceedings of International Conference on Image,Vision and Computing.Shanghai,China:[s.n.],2017:842-846.
[16]SHANNON C E.A Mathematical Theory of Communication II[J].Bell System Technical Journal,1948,27(4):623-656.
[17]JAYNES E T.Information Theory and Statistical Mechanics[J].The Physical Review,1957,106(4):620.
[18]WANG Hongfei,LIU Yongwei.Hybrid Teaching-learning-based PSO for Trajectory Optimisation[J].Electronics Letters,2017,53(12):777-779.
[19]DONG Wenyong,ZHANG Mengchu.A Supervised Learning and Control Method to Improve Particle Swarm Optimization Algorithms[J].IEEE Transactions on Systems,Man,and Cybernetics Systems,2017,47(7):1135-1148.
[20]MENG H J,ZHENG P,Wu R Y,et al.A Hybrid Particle Swarm Algorithm with Embedded Chaotic Search[J]//Proceedings of 2004 IEEE Conference on Cybernetics and Intelligent Systems.Singapore:IEEE Press,2004:1-6.
编辑索书志 |