CN105468922B - A kind of live electromagnetic environment Signal online analysis and intimidation estimating method - Google Patents

A kind of live electromagnetic environment Signal online analysis and intimidation estimating method Download PDF

Info

Publication number
CN105468922B
CN105468922B CN201510909171.0A CN201510909171A CN105468922B CN 105468922 B CN105468922 B CN 105468922B CN 201510909171 A CN201510909171 A CN 201510909171A CN 105468922 B CN105468922 B CN 105468922B
Authority
CN
China
Prior art keywords
signal
threat
electromagnetic environment
value
frequency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510909171.0A
Other languages
Chinese (zh)
Other versions
CN105468922A (en
Inventor
李东洋
侯智鹏
赖剑平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 2 Research Institute
Original Assignee
CETC 2 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 2 Research Institute filed Critical CETC 2 Research Institute
Priority to CN201510909171.0A priority Critical patent/CN105468922B/en
Publication of CN105468922A publication Critical patent/CN105468922A/en
Application granted granted Critical
Publication of CN105468922B publication Critical patent/CN105468922B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16ZINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS, NOT OTHERWISE PROVIDED FOR
    • G16Z99/00Subject matter not provided for in other main groups of this subclass

Abstract

The present invention relates to Analysis of Electromagnetic Environment technical field, and the invention discloses a kind of live electromagnetic environment Signal online analysis and intimidation estimating method, it is specifically included:Step 1: according to the characteristic parameter of various signals, build signal characteristic database, signal characteristic database using semi-automatic mode of learning, can constantly improve expand;Step 2: collection site electromagnetic environment signal, four frequency, bandwidth, power and duration basic parameters of signal are obtained after signal is handled, basic parameter input is matched into signal characteristic database, obtains the Modulation Types and type of signal;Step 3: the signal match query result of connected applications scene information, user's customized demand and step 3, using signal Threat assessment models, carries out Threat of the signal under application-specific scene and judges.By construction feature database, so as to automatically analyze out the Modulation Types of signal and type, then the Threat judgement of signal is automatically derived.

Description

A kind of live electromagnetic environment Signal online analysis and intimidation estimating method
Technical field
The present invention relates to electromagnetic environment monitor technical field, and in particular to a kind of live electromagnetic environment Signal online analysis with Intimidation estimating method, the threat assessment of electromagnetic environment signal and analysis of automation can be achieved.
Background technology
Electromagnetic environment signal analysis is scanned for, detects, intercepts and captures, measured typically by non-cooperation air electromagnetic signals Analyzed and identified to obtain the characteristic parameter of signal, the characteristic parameter of acquisition generally includes electromagnetic signal frequency, electromagnetism letter Number bandwidth, signal form (continuous wave or electromagnetic pulse), modulating characteristic etc., and supervision for radio signal and counter provide according to According to.
Generally it is required for periodically carrying out the wirelessly prestige such as eavesdropping, burglary signal for concerning security matters playground or VIP residence The inspection of signal is coerced, some concerning security matters meetings also need to carry out control to the specific conventional wireless communication signal such as mobile phone.It is domestic at present In such application scenarios carry out air electromagnetic signals analysis means mainly by means of spectrum analyzer come to environment in electricity A small amount of parameter such as the frequency of the presence or absence of magnetic signal and signal, bandwidth measures, and accordingly and user specialty background knowledge Signal kinds are identified with experience and menace is assessed.Measuring instrument only provides spectrum information, signal point in this method Groundwork of the analysis with assessing requires very high by operating personnel's artificial treatment to the professional skill of practitioner.And in complexity In electromagnetic environment, carry out signal analysis identification by manpower and assessment efficiency is low, poor reliability.Though some software approach on the market The automatic measurement analysis of signal parameter can be provided, eliminate and identification signal parameter measurement is read from spectrum analyzer by manpower As a result poorly efficient tedious work, but function still imperfection:The signal detection parameter that certain methods provide is more, but as signal is adjusted The amount of calculation of the parameters such as sample preparation formula is big, high to the demand of computing resource, poor real, and is provided solely for relevant parameter letter Breath, the work of identification signal type (such as mobile phone 3G (3G (Third Generation) Moblie), wifi (Wireless Fidelity) signals type) still need to Manually to be differentiated based on signal parameter;Other methods, such as Beijing Jiaotong University Zhou Huasheng in 2009 master's degree opinion Text《The exploitation of complex electromagnetic environment signal automatic monitoring and identifying system》The signal analysis method of middle proposition, though ageing height, But it is only capable of providing a small amount of simple parameter, it is difficult to effectively support follow-up signal type analysis and threat assessment.In latter class method, If build Signals Data Base using priori, you can corresponding electromagnetic signal is inquired in database by a small amount of simple parameter Complete parameter, but it is abundant comprehensive how to construct record, and can constantly carry out the signal characteristic database of knowledge accumulation expansion, It is still an open question.In terms of signal threat assessment, there is presently no not only combine level of confidentiality scene information but also take user's reality into account Flexible customized demand in the operation of border and carry out the effective ways of electromagnetic signal menace quantisation metric.
The content of the invention
For above-mentioned technology existing for live electromagnetic environment Signal online analysis of the prior art and intimidation estimating method Problem, the invention discloses a kind of live electromagnetic environment Signal online analysis and intimidation estimating method.
Technical scheme is as follows:
The invention discloses a kind of live electromagnetic environment Signal online analysis and intimidation estimating method, it specifically includes following The step of:Step 1: according to the characteristic parameter of various signals, signal characteristic database is built;Step 2: collection site electromagnetism ring Border signal, frequency, bandwidth, power and the basic ginseng of duration four of signal are obtained after the signal collected is handled Number, basic parameter input is matched into signal characteristic database, obtains the Modulation Types and type of signal;Step 3rd, the signal match query result of connected applications scene information, user's customized demand and step 3, is commented using signal Threat Estimate model, carry out Threat of the signal under application-specific scene and judge.
Further, above-mentioned signal characteristic database is expanded using semi-automatic mode of learning, constantly improve.
Further, the structure of above-mentioned signal characteristic database specifically includes following step:In signal characteristic data In storehouse, two class signal characteristic tables of data are formulated, one kind is that expert predefines table, and another kind of is User Defined table;Expert makes a reservation for Adopted table is signal analysis expert, the signal record table formulated according to priori experience, is to carry out signal analysis and threat assessment Main Basiss;The data content of User Defined table is defined by the user, and what is run into user's practical operation fails in expert The signal matched in predefined table, is chosen whether, according to its working experience, to be defined the Expressive Features of signal by user And it is added in User Defined table;Signal characteristic data record in User Defined table periodically carries out discriminating by expert and recognized Card, and extend to expert and predefine in table, so as to realize the renewal of the iteration of signal characteristic database and upgrading.
Further, when the record in four basic parameters and signal characteristic database matches completely, directly read The threat scoring recorded in database, is multiplied by scene indices and obtains the final Threat Quantitative marking of signal.
Further, Threat quantitative evaluation formula is specially in above-mentioned signal Threat assessment models:T=α * (β F+ γA+δB+εM);Wherein T is the Threat Quantitative marking of electromagnetic signal, and α is the scene threat assessment coefficient that signal occurs, and β is Frequency Threat assessment weight, γ are signal strength evaluation weight, and δ is signal bandwidth threat assessment weight, and ε is Modulation Types prestige Coerce assessment weight;Values of the α between [0-1], β+γ+δ+ε=1;F is frequency range threat assessment coefficient residing for signal, and A is that signal is strong Threat assessment coefficient is spent, B is signal bandwidth threat assessment coefficient, and M is signal modulation pattern threat assessment coefficient, and F, A, B, M divide The value between [0-100] is not taken.
Further, when signal type is formulated into blacklist, in order to obtain higher threat assessment score value, respectively Term coefficient directly according to blacklist matching treatment.
Further, when four basic parameters and data-base recording only partly match, only looked into according to frequency matching Ask in obtained candidate record if having be under the jurisdiction of threat signal characteristic table or blacklist record if frequency threat assessment system Number F values according to blacklist matching treatment, if without if according to the actually located threat frequency range of signal frequency or white spaces to F Carry out value, secondly check in signal bandwidth and candidate record whether there is occurrence, it is different from normal signal if nothing, B according to Progress value processing different from normal signal, if so, then belonging to threat signal characteristic table or black according to being whether there is in occurrence For the situation of name unirecord to B assignment, the method same B, A of M values are exceeded the actual conditions progress value of threshold value by signal intensity, will Each term coefficient and weighted value bring signal Threat quantitative evaluation formula into and calculate acquisition signal Threat quantized value T.
Further, the above method also includes determining knot to signal menace according to signal Threat quantized value T By T>90 points threaten for height, and 90>T>80 be that moderate threatens, 80>T>50 threaten to be slight, and 50>T is general signal.
Technical scheme more than, beneficial effects of the present invention are:
1) signal interception and bigness scale are completed using FPGA (programmable gate array) to guide main frame completion amount of calculation small Signal parameter accurate measurement, and obtain signal type and Modulation Types etc. by inquiring about signal characteristic database and be difficult to measure or survey The big signal parameter of gauge evaluation time expense, significantly reduces system-computed complexity, improves the real-time of signal analysis.
2) propose signal characteristic database construction method can construct can with constantly improve, continuous learning expand letter Number property data base, solves the defects of normal signal property data base data record is difficult to flexible iteration renewal.
3) the signal menace metrization assessment models with reference to scene information and user's customized demand are proposed, can be obtained Relatively reasonable signal Threat quantitative evaluation data, so as to realize the electromagnetic environment signal threat assessment of flexible automation With analysis.
Brief description of the drawings
Fig. 1 is the schematic diagram of the live electromagnetic environment Signal online analysis of the present invention and intimidation estimating method.
Embodiment
With reference to Figure of description, embodiment of the invention is described in detail.
Level of confidentiality proposed by the present invention based on electromagnetic signal property data base, VIP playground scene electromagnetic environment The theory diagram of Signal online analysis and intimidation estimating method is as shown in Figure 1.
Data acquisition is carried out to environment electromagnetics signal through antenna and data acquisition board first (" to gather " refer to environment here Middle electromagnetic signal carries out AD samplings, obtains the initial data for being available for signal analysis, and " intercepting and capturing " refer to wrap in the initial data of collection AD sampled datas containing a certain unknown measured signal, and analyzed by carrying out follow-up signal detection for the data, find The signal).The signal quantization data collected deliver FPGA (field programmable gate array) program in data processing plate Handled, the presence or absence of detection signal, and the frequency of bigness scale signal, bandwidth, power, duration (whether being continuous wave) four Individual parameter, and signal spectrum information is generated, while basis signal bigness scale result is also wanted, filtering obtains thick near intercepted signal frequency Signal sample data in the range of the wide degree of measuring tape, such as:Down coversion is carried out using " frequency " information in signal bigness scale result Processing, signal is changed near zero-frequency, uses the width of " bandwidth " information setting wave filter in signal bigness scale result.Intercept and capture letter Number it is exactly the signal that is found in signal detection, bigness scale process gives the thick of the characterising parameters such as signal " bandwidth ", " frequency " Survey result.Signal outside the signal that bigness scale is detected filters out as far as possible, excludes other signals to the signal accurate measurement result Interference.Then by spectrum information, bigness scale signal parameter and signal initial data three parts, (signal initial data is exactly after sampling Data of the initial data after frequency conversion, filtering process.Original sampling data first passes through the bigness scale of FPGA digital processing plates, become Frequently, filtering, then report PC main frames to carry out accurate measurement processing) data report main frame.Frequency spectrum data will be shown by main frame for frequency spectrum, be cut Obtain the bigness scale parameter of signal and sampled data will be used for the accurate measurement of intercepted signal parameter by main frame, acquisition is more accurately believed Number four frequency, bandwidth, power, duration basic parameters.(it is that signal is former to sampled data using bigness scale parameter as guiding Beginning data, bigness scale processing-frequency conversion, filtered original sampling data) analyzed by the FFT spectrum of bigger points, bigness scale is joined Number is modified, and then obtains accurate parameters measurement result, and these are all the conventional methods in signal detection, and this is not belonging to this hair Bright improvement, will not be described in full detail herein.
Afterwards, basis signal accurate measurement parameter enters in electromagnetic signal property data base the match query for carrying out signal, obtains The number of winning the confidence Modulation Types and type etc. are difficult to the directly quick parameter information for calculating acquisition.Finally, connected applications scene information is (close Level) and user's custom analysis demand (setting of signal black and white lists) and signal match query result, utilize letter proposed by the present invention Number Threat assessment models, realize that Threat of the signal under application-specific scene judges.Technical scheme has three Key content, one update for the structure and iteration of signal characteristic database, secondly be signal Threat quantitative appraisement model, its Three be the specific side that binding signal property data base and signal Threat quantitative appraisement model carry out electromagnetic signal Threat assessment Method.
The structure of signal characteristic database first has to the characteristic parameter of selection description signal characteristic, special in the signal of the present invention In the constructing plan for levying database, whether it (is continuous that we are selected from frequency, bandwidth, power, Modulation Types, continuous wave mark Ripple), signal type, menace, quantify to threaten eight dimensions of scoring (0-100 point) to describe bars feature record.In signal In property data base, we have formulated two class signal characteristic tables of data, and one kind is that expert predefines table, and another kind of is that user makes by oneself Adopted table.It is signal analysis expert that expert, which predefines table, the signal record table formulated according to priori experience, is to carry out signal point The Main Basiss of analysis and threat assessment.The data content of User Defined table is defined by the user, and is run into user's practical operation The signal for failing to match in expert predefines table, chosen whether by user according to its working experience, the description to signal Feature is defined and is added in User Defined table, and the signal characteristic data record in User Defined table can be periodically by special Family carries out discriminating certification, and extends to expert and predefine in table, realizes the iteration renewal and upgrading of signal characteristic database.
Expert predefines table and includes two signal characteristic tables of data, normal signal characteristic table and threat signal characteristic According to table.The signal characteristic data record of normal signal characteristic table is foundation《The radio frequency division of Chinese name republic Regulation》The contents such as defined signal type, frequency, bandwidth are built, and it is legal, conventional wireless to contain most of the country The signal characteristic data of electricity application, such as mobile phone signal, radio signals, wifi (Wireless Fidelity) signal, such normal signal prestige The side of body characteristic need binding signal occur scene information, signal type black and white lists be set for threaten sex determination.Threat signal The signal characteristic data record of characteristic table is illegal, true according to the eavesdropping having found, society is existing, burglary etc. by expert It is set to the signal characteristic data of the electromagnetic signal frequency characterizing definition of menace.
It is as follows that electromagnetic signal Threat quantitative appraisement model is established in the present invention:
T=α * (β F+ γ A+ δ B+ ε M)
Wherein T is the Threat Quantitative marking of electromagnetic signal, and α is the scene threat assessment coefficient that signal occurs, and β is frequency Threat assessment weight, γ are signal strength evaluation weight, and δ is signal bandwidth threat assessment weight, and ε is that Modulation Types threat is commented Estimate weight.α takes the value between [0-1] respectively in the case of scene level of confidentiality is general, secret, secret, and value relation is general< It is secret<Secret, such as value is 0.1,0.7,1 respectively, β, γ, δ and ε take the value between [0-1] respectively, and value relation be β+ γ+δ+ε=1, such as value can be respectively 0.4,0.1,0.3 and 0.2.F is frequency range threat assessment coefficient residing for signal, in low prestige Side of body frequency range, high threat frequency range, white spaces, black-listed frequency bands take the value between [0-100] respectively, and value relation is low threat Frequency range<Height threatens frequency range<White spaces<Black-listed frequency bands, such as value can be respectively 10,60,80,100.A is signal intensity Threat assessment coefficient, not less than signal strength threshold, more than threshold value A1dB、A2dB、A3dB(A1<A2<A3) when take [0- respectively 100] value between, and value relation is not less than signal strength threshold<More than threshold value A1dB<More than threshold value A2dB<More than threshold value A3DB, such as value can be respectively 1,10,50,100.B is signal bandwidth threat assessment coefficient, B value signal bandwidth with Normal signal is consistent, signal bandwidth is different from normal signal and with blacklist signal bandwidth mismatch, signal bandwidth and blacklist The value between [0-100] is taken in the case of three kinds of matching respectively, and value relation is that signal bandwidth is consistent with normal signal<Signal band Width is different from normal signal and is mismatched with blacklist signal bandwidth<Signal bandwidth matches with blacklist, such as value can be distinguished For 10,80,100.M is signal modulation pattern threat assessment coefficient, M value signal modulation pattern it is consistent with normal signal, Taken respectively in the case of but three kinds of mismatch blacklist, signal modulation pattern and blacklist Signal Matching inconsistent with normal signal Value between [0-100], and value relation is that signal modulation pattern is consistent with normal signal<Signal modulation pattern and normal signal Inconsistent but mismatch blacklist<Signal modulation pattern and blacklist Signal Matching, such as value can be respectively 10,80,100.
Binding signal property data base and signal Threat quantitative appraisement model carry out electromagnetic signal Threat and assessed specifically Comprised the following steps in application scheme:1) the side reaction coefficient value according to corresponding to being selected operative scenario (general, secret, secret), and according to User needs the normal signal species (such as mobile phone, Wireless Fidelity signal) of special control to set specific black and white in concrete scene List;2) according to four signal frequency of accurate measurement, bandwidth, duration, power basic parameters, signal characteristic data are inquired about first User Defined signal characteristic tables of data in storehouse, the data record that four basic parameters match completely is searched, is entered if finding Enter step 6), otherwise continue step 3);3) inquire about expert and predefine table, entry is matched completely according to four basic parameter inquiries, Otherwise continue step 4) into step 6) if finding;4) inquire about expert and predefine table, only carry out matching inquiry according to frequency term, Step 7) is transferred to if some candidate entries are found, if otherwise continuing step 5);5) any occurrence, quantitative evaluation mould are not found The height of frequency ranges of the F according to residing for signal frequency threatens frequency range or white spaces attribute to carry out value in type, and A is according to signal detection The concrete condition that power exceedes threshold value carries out value, and B and M are then according to different from normal signal but at mismatch blacklist Reason, brings signal Threat quantitative evaluation formula into and calculates and obtain signal Threat quantized value T, while can be decided whether by user pair The signal definition signal type, Modulation Types parameter, and the signal after definition is added in User Defined table, it is transferred to step 8);6) situation about matching completely is recorded in this step process signal basic parameter and database, from the matching entry in database The middle signal type and Modulation Types information for reading signal, the signal parameter of pending signal is supplemented completely, and if making by oneself Adopted table clause matches completely, then directly reads the threat scoring recorded in database, be multiplied by scene indices and obtain the final of signal Threat Quantitative marking, if being formulated into threat signal characteristic table or the signal type in blacklist, frequency, band Wide, Modulation Types Threat metewand F, B, M then surpass according to the value with blacklist matching treatment, A according to signal power The actual conditions for crossing threshold value carry out value, and bringing each term coefficient and weighted value into signal Threat quantitative evaluation formula calculates acquisition Signal Threat quantized value T, is transferred to step 8);7) this step process signal parameters and data-base recording only partly match Situation, it is under the jurisdiction of threat signal characteristic table or blacklist if having in the candidate record only obtained according to frequency matching inquiry Record then frequency threat assessment coefficient F values according to blacklist matching treatment, if without if it is actually located according to signal frequency Threat frequency range (it is the priori statistical analysis knot that is distributed according to threat signal in frequency range according in special scenes to threaten frequency range Fruit division, the larger frequency range of threat signal probability of occurrence threatens frequency range to be high, and State Radio Regulatory Commission divides normal It is low threat frequency range to advise military, civilian frequency range) or white spaces (State Radio Regulatory Commission not yet divides the less frequency used Section) value (low threat frequency range is carried out to F<Height threatens frequency range<White spaces<Black-listed frequency bands take between [0-100] respectively Value).The present invention, which only limits value rule and scope, specific value, need to combine concrete scene environment tuning.Secondly signal band is checked Whether there is occurrence in wide and candidate record, different from normal signal if nothing, B is according to progress values different from normal signal Processing, if so, the situation for then belonging to threat signal characteristic table or blacklist record according to being whether there is in occurrence is to B assignment, M The actual conditions that the method same B, A of value are exceeded threshold value by signal intensity carry out value, bring each term coefficient and weighted value into letter Number Threat quantitative evaluation formula, which calculates, obtains signal Threat quantized value T, is transferred to step 8);8) metrization is threatened according to signal Value T determines conclusion, T to signal menace>90 points threaten for height, and 90>T>80 be that moderate threatens, 80>T>50 be slight Threaten, 50>T is general signal.
The coefficient and parameter gone out given in the above embodiments, it is available to those skilled in the art to realize or use Invention, invention, which does not limit, only takes foregoing disclosed numerical value, in the case where not departing from the thought of invention, the technology of this area Personnel can make various modifications or adjustment to examples detailed above, thus the protection domain invented is not limited by above-described embodiment, And it should be the maximum magnitude for meeting the inventive features that claims are mentioned.

Claims (6)

1. a kind of live electromagnetic environment Signal online analysis and intimidation estimating method, it specifically includes following step:Step 1: According to the characteristic parameter of various signals, signal characteristic database is built;Step 2: collection site electromagnetic environment signal, will be gathered To signal handled after obtain four frequency, bandwidth, power and duration basic parameters of signal, basic parameter is defeated Enter into signal characteristic database and matched, obtain the Modulation Types and type of signal;Step 3: connected applications scene is believed The signal match query result of breath, user's customized demand and step 3, using signal Threat assessment models, carry out signal and exist Threat under application-specific scene judges;
Threat quantitative evaluation formula is specially in the signal Threat assessment models:T=α * (β F+ γ A+ δ B+ ε M);Wherein T is the Threat Quantitative marking of electromagnetic signal, and α is the scene threat assessment coefficient that signal occurs, and β is frequency Threat appraisal right Weight, γ is signal strength evaluation weight, and δ is signal bandwidth threat assessment weight, and ε is Modulation Types threat assessment weight;α is Value between [0-1], β+γ+δ+ε=1;F is frequency range threat assessment coefficient residing for signal, and A is signal intensity threat assessment system Number, B are signal bandwidth threat assessment coefficient, and M is signal modulation pattern threat assessment coefficient, F, A, B, M take respectively [0-100] it Between value;
Wherein when four basic parameters and data-base recording only partly match, in the candidate only obtained according to frequency matching inquiry In record if having be under the jurisdiction of threat signal characteristic table or blacklist record if frequency threat assessment coefficient F values according to Blacklist matching treatment, if carrying out value to F according to the actually located threat frequency range of signal frequency or white spaces without if, secondly Check in signal bandwidth and candidate record whether there is occurrence, it is different from normal signal if nothing, B according to normal signal not With value processing is carried out, if so, the feelings for then belonging to threat signal characteristic table or blacklist record according to being whether there is in occurrence Condition is to B assignment, and the method same B, A of M values are exceeded the actual conditions progress value of threshold value by signal intensity, by each term coefficient and power Weight values bring signal Threat quantitative evaluation formula into and calculate acquisition signal Threat quantized value T.
2. live electromagnetic environment Signal online analysis and intimidation estimating method as claimed in claim 1, it is characterised in that described Signal characteristic database is expanded using semi-automatic mode of learning, constantly improve.
3. live electromagnetic environment Signal online analysis and intimidation estimating method as claimed in claim 2, it is characterised in that described The structure of signal characteristic database specifically include following step:In signal characteristic database, two class signal characteristics are formulated Tables of data, one kind are that expert predefines table, and another kind of is User Defined table;It is signal analysis expert that expert, which predefines table, according to The signal record table formulated according to priori experience, it is the Main Basiss for carrying out signal analysis and threat assessment;User Defined The data content of table is defined by the user, the letter for failing to match in expert predefines table run into user's practical operation Number, chosen whether by user according to its working experience, the Expressive Features of signal are defined and are added to User Defined table In;Signal characteristic data record in User Defined table periodically carries out discriminating certification by expert, and extends to expert and predefine In table, so as to realize the renewal of the iteration of signal characteristic database and upgrading.
4. live electromagnetic environment Signal online analysis and intimidation estimating method as claimed in claim 1, it is characterised in that when four When record in individual basic parameter and signal characteristic database matches completely, the threat scoring recorded in database is directly read, It is multiplied by scene indices and obtains the final Threat Quantitative marking of signal.
5. live electromagnetic environment Signal online analysis and intimidation estimating method as claimed in claim 1, it is characterised in that work as letter When number type is formulated into blacklist, each term coefficient directly according to blacklist matching treatment.
6. live electromagnetic environment Signal online analysis and intimidation estimating method as claimed in claim 1, it is characterised in that described Method also includes determining conclusion, T to signal menace according to signal Threat quantized value T>90 points threaten for height, and 90>T >80 be that moderate threatens, 80>T>50 threaten to be slight, and 50>T is general signal.
CN201510909171.0A 2015-12-09 2015-12-09 A kind of live electromagnetic environment Signal online analysis and intimidation estimating method Active CN105468922B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510909171.0A CN105468922B (en) 2015-12-09 2015-12-09 A kind of live electromagnetic environment Signal online analysis and intimidation estimating method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510909171.0A CN105468922B (en) 2015-12-09 2015-12-09 A kind of live electromagnetic environment Signal online analysis and intimidation estimating method

Publications (2)

Publication Number Publication Date
CN105468922A CN105468922A (en) 2016-04-06
CN105468922B true CN105468922B (en) 2018-02-02

Family

ID=55606613

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510909171.0A Active CN105468922B (en) 2015-12-09 2015-12-09 A kind of live electromagnetic environment Signal online analysis and intimidation estimating method

Country Status (1)

Country Link
CN (1) CN105468922B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106096013A (en) * 2016-06-24 2016-11-09 中国人民解放军63888部队 Frequency queries based on electromagnetic environment data base and planing method
CN106341192B (en) * 2016-08-31 2019-01-18 成都中星世通电子科技有限公司 A kind of transmitting station signal characteristic Dynamic Recognition method
CN112183339B (en) * 2020-09-28 2024-02-20 中车长春轨道客车股份有限公司 Electromagnetic environment assessment method, device and server
CN112188459B (en) * 2020-09-29 2023-10-03 普联技术有限公司 Signal identification method, device and equipment
CN114019942B (en) * 2021-11-04 2023-08-29 哈尔滨工业大学 Industrial robot system security threat evaluation method based on time-sharing frequency

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635107A (en) * 2009-04-03 2010-01-27 国网电力科学研究院 Electromagnetic environment emulation training and data management system and method thereof

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635107A (en) * 2009-04-03 2010-01-27 国网电力科学研究院 Electromagnetic environment emulation training and data management system and method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
雷达辐射源信号智能识别方法研究;张葛祥;《中国优秀博硕士学位论文全文数据库(博士) 信息科技辑》;20060415(第4期);第1-2,15-19页 *

Also Published As

Publication number Publication date
CN105468922A (en) 2016-04-06

Similar Documents

Publication Publication Date Title
CN105468922B (en) A kind of live electromagnetic environment Signal online analysis and intimidation estimating method
CN108616900B (en) Method for distinguishing indoor and outdoor measurement reports and network equipment
CN104853379B (en) A kind of quality of wireless network appraisal procedure and device
CN103796227B (en) Carry out the method and system of wireless signal covering analyzing
CN109982366A (en) Target value area analysis method, device, equipment and medium based on big data
Xu et al. Wheat ear counting using K-means clustering segmentation and convolutional neural network
Eskelson et al. Estimating riparian understory vegetation cover with beta regression and copula models
CN109982361B (en) Signal interference analysis method, device, equipment and medium
CN105163344B (en) A kind of interior localization method interfered of TD-LTE system
CN103581995A (en) Method for measuring coverage performance of mobile communication network
Saidi et al. Assessment of trends in extreme precipitation events: a case study in Piedmont (North-West Italy)
CN103136471A (en) Method and system for testing malicious Android application programs
CN110059556A (en) A kind of transformer substation switch division condition detection method based on deep learning
CN109738724B (en) Fault diagnosis method and device of equipment, storage medium and electronic device
CN110971677A (en) Electric power internet of things terminal equipment side channel safety monitoring method based on countermeasure reinforcement learning
CN105679335A (en) Speech quality assessment method and system based on wireless analysis
CN103079221A (en) Method for conjoint analysis of mobile network condition by using sweep generator and testing mobile phone
KR20200038731A (en) Method for analyzing of indoor floating population and apparatus thereof
CN104665795A (en) Health tester, user terminal and health cloud center
CN109995549B (en) Method and device for evaluating flow value
CN116318523B (en) Examination room area mobile phone signal shielding detection management and control system
Bushmelev et al. Adaptive method of color selection in application to social media images
CN105046147A (en) Method and apparatus for monitoring degree of attack on system
CN107094306B (en) Terminal performance evaluation method and device
CN108419247B (en) Wireless communication base station cell correlation calculation method and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant