CN105468922B - A kind of live electromagnetic environment Signal online analysis and intimidation estimating method - Google Patents
A kind of live electromagnetic environment Signal online analysis and intimidation estimating method Download PDFInfo
- Publication number
- CN105468922B CN105468922B CN201510909171.0A CN201510909171A CN105468922B CN 105468922 B CN105468922 B CN 105468922B CN 201510909171 A CN201510909171 A CN 201510909171A CN 105468922 B CN105468922 B CN 105468922B
- Authority
- CN
- China
- Prior art keywords
- signal
- threat
- electromagnetic environment
- value
- frequency
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Z—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS, NOT OTHERWISE PROVIDED FOR
- G16Z99/00—Subject matter not provided for in other main groups of this subclass
Abstract
The present invention relates to Analysis of Electromagnetic Environment technical field, and the invention discloses a kind of live electromagnetic environment Signal online analysis and intimidation estimating method, it is specifically included:Step 1: according to the characteristic parameter of various signals, build signal characteristic database, signal characteristic database using semi-automatic mode of learning, can constantly improve expand;Step 2: collection site electromagnetic environment signal, four frequency, bandwidth, power and duration basic parameters of signal are obtained after signal is handled, basic parameter input is matched into signal characteristic database, obtains the Modulation Types and type of signal;Step 3: the signal match query result of connected applications scene information, user's customized demand and step 3, using signal Threat assessment models, carries out Threat of the signal under application-specific scene and judges.By construction feature database, so as to automatically analyze out the Modulation Types of signal and type, then the Threat judgement of signal is automatically derived.
Description
Technical field
The present invention relates to electromagnetic environment monitor technical field, and in particular to a kind of live electromagnetic environment Signal online analysis with
Intimidation estimating method, the threat assessment of electromagnetic environment signal and analysis of automation can be achieved.
Background technology
Electromagnetic environment signal analysis is scanned for, detects, intercepts and captures, measured typically by non-cooperation air electromagnetic signals
Analyzed and identified to obtain the characteristic parameter of signal, the characteristic parameter of acquisition generally includes electromagnetic signal frequency, electromagnetism letter
Number bandwidth, signal form (continuous wave or electromagnetic pulse), modulating characteristic etc., and supervision for radio signal and counter provide according to
According to.
Generally it is required for periodically carrying out the wirelessly prestige such as eavesdropping, burglary signal for concerning security matters playground or VIP residence
The inspection of signal is coerced, some concerning security matters meetings also need to carry out control to the specific conventional wireless communication signal such as mobile phone.It is domestic at present
In such application scenarios carry out air electromagnetic signals analysis means mainly by means of spectrum analyzer come to environment in electricity
A small amount of parameter such as the frequency of the presence or absence of magnetic signal and signal, bandwidth measures, and accordingly and user specialty background knowledge
Signal kinds are identified with experience and menace is assessed.Measuring instrument only provides spectrum information, signal point in this method
Groundwork of the analysis with assessing requires very high by operating personnel's artificial treatment to the professional skill of practitioner.And in complexity
In electromagnetic environment, carry out signal analysis identification by manpower and assessment efficiency is low, poor reliability.Though some software approach on the market
The automatic measurement analysis of signal parameter can be provided, eliminate and identification signal parameter measurement is read from spectrum analyzer by manpower
As a result poorly efficient tedious work, but function still imperfection:The signal detection parameter that certain methods provide is more, but as signal is adjusted
The amount of calculation of the parameters such as sample preparation formula is big, high to the demand of computing resource, poor real, and is provided solely for relevant parameter letter
Breath, the work of identification signal type (such as mobile phone 3G (3G (Third Generation) Moblie), wifi (Wireless Fidelity) signals type) still need to
Manually to be differentiated based on signal parameter;Other methods, such as Beijing Jiaotong University Zhou Huasheng in 2009 master's degree opinion
Text《The exploitation of complex electromagnetic environment signal automatic monitoring and identifying system》The signal analysis method of middle proposition, though ageing height,
But it is only capable of providing a small amount of simple parameter, it is difficult to effectively support follow-up signal type analysis and threat assessment.In latter class method,
If build Signals Data Base using priori, you can corresponding electromagnetic signal is inquired in database by a small amount of simple parameter
Complete parameter, but it is abundant comprehensive how to construct record, and can constantly carry out the signal characteristic database of knowledge accumulation expansion,
It is still an open question.In terms of signal threat assessment, there is presently no not only combine level of confidentiality scene information but also take user's reality into account
Flexible customized demand in the operation of border and carry out the effective ways of electromagnetic signal menace quantisation metric.
The content of the invention
For above-mentioned technology existing for live electromagnetic environment Signal online analysis of the prior art and intimidation estimating method
Problem, the invention discloses a kind of live electromagnetic environment Signal online analysis and intimidation estimating method.
Technical scheme is as follows:
The invention discloses a kind of live electromagnetic environment Signal online analysis and intimidation estimating method, it specifically includes following
The step of:Step 1: according to the characteristic parameter of various signals, signal characteristic database is built;Step 2: collection site electromagnetism ring
Border signal, frequency, bandwidth, power and the basic ginseng of duration four of signal are obtained after the signal collected is handled
Number, basic parameter input is matched into signal characteristic database, obtains the Modulation Types and type of signal;Step
3rd, the signal match query result of connected applications scene information, user's customized demand and step 3, is commented using signal Threat
Estimate model, carry out Threat of the signal under application-specific scene and judge.
Further, above-mentioned signal characteristic database is expanded using semi-automatic mode of learning, constantly improve.
Further, the structure of above-mentioned signal characteristic database specifically includes following step:In signal characteristic data
In storehouse, two class signal characteristic tables of data are formulated, one kind is that expert predefines table, and another kind of is User Defined table;Expert makes a reservation for
Adopted table is signal analysis expert, the signal record table formulated according to priori experience, is to carry out signal analysis and threat assessment
Main Basiss;The data content of User Defined table is defined by the user, and what is run into user's practical operation fails in expert
The signal matched in predefined table, is chosen whether, according to its working experience, to be defined the Expressive Features of signal by user
And it is added in User Defined table;Signal characteristic data record in User Defined table periodically carries out discriminating by expert and recognized
Card, and extend to expert and predefine in table, so as to realize the renewal of the iteration of signal characteristic database and upgrading.
Further, when the record in four basic parameters and signal characteristic database matches completely, directly read
The threat scoring recorded in database, is multiplied by scene indices and obtains the final Threat Quantitative marking of signal.
Further, Threat quantitative evaluation formula is specially in above-mentioned signal Threat assessment models:T=α * (β F+
γA+δB+εM);Wherein T is the Threat Quantitative marking of electromagnetic signal, and α is the scene threat assessment coefficient that signal occurs, and β is
Frequency Threat assessment weight, γ are signal strength evaluation weight, and δ is signal bandwidth threat assessment weight, and ε is Modulation Types prestige
Coerce assessment weight;Values of the α between [0-1], β+γ+δ+ε=1;F is frequency range threat assessment coefficient residing for signal, and A is that signal is strong
Threat assessment coefficient is spent, B is signal bandwidth threat assessment coefficient, and M is signal modulation pattern threat assessment coefficient, and F, A, B, M divide
The value between [0-100] is not taken.
Further, when signal type is formulated into blacklist, in order to obtain higher threat assessment score value, respectively
Term coefficient directly according to blacklist matching treatment.
Further, when four basic parameters and data-base recording only partly match, only looked into according to frequency matching
Ask in obtained candidate record if having be under the jurisdiction of threat signal characteristic table or blacklist record if frequency threat assessment system
Number F values according to blacklist matching treatment, if without if according to the actually located threat frequency range of signal frequency or white spaces to F
Carry out value, secondly check in signal bandwidth and candidate record whether there is occurrence, it is different from normal signal if nothing, B according to
Progress value processing different from normal signal, if so, then belonging to threat signal characteristic table or black according to being whether there is in occurrence
For the situation of name unirecord to B assignment, the method same B, A of M values are exceeded the actual conditions progress value of threshold value by signal intensity, will
Each term coefficient and weighted value bring signal Threat quantitative evaluation formula into and calculate acquisition signal Threat quantized value T.
Further, the above method also includes determining knot to signal menace according to signal Threat quantized value T
By T>90 points threaten for height, and 90>T>80 be that moderate threatens, 80>T>50 threaten to be slight, and 50>T is general signal.
Technical scheme more than, beneficial effects of the present invention are:
1) signal interception and bigness scale are completed using FPGA (programmable gate array) to guide main frame completion amount of calculation small
Signal parameter accurate measurement, and obtain signal type and Modulation Types etc. by inquiring about signal characteristic database and be difficult to measure or survey
The big signal parameter of gauge evaluation time expense, significantly reduces system-computed complexity, improves the real-time of signal analysis.
2) propose signal characteristic database construction method can construct can with constantly improve, continuous learning expand letter
Number property data base, solves the defects of normal signal property data base data record is difficult to flexible iteration renewal.
3) the signal menace metrization assessment models with reference to scene information and user's customized demand are proposed, can be obtained
Relatively reasonable signal Threat quantitative evaluation data, so as to realize the electromagnetic environment signal threat assessment of flexible automation
With analysis.
Brief description of the drawings
Fig. 1 is the schematic diagram of the live electromagnetic environment Signal online analysis of the present invention and intimidation estimating method.
Embodiment
With reference to Figure of description, embodiment of the invention is described in detail.
Level of confidentiality proposed by the present invention based on electromagnetic signal property data base, VIP playground scene electromagnetic environment
The theory diagram of Signal online analysis and intimidation estimating method is as shown in Figure 1.
Data acquisition is carried out to environment electromagnetics signal through antenna and data acquisition board first (" to gather " refer to environment here
Middle electromagnetic signal carries out AD samplings, obtains the initial data for being available for signal analysis, and " intercepting and capturing " refer to wrap in the initial data of collection
AD sampled datas containing a certain unknown measured signal, and analyzed by carrying out follow-up signal detection for the data, find
The signal).The signal quantization data collected deliver FPGA (field programmable gate array) program in data processing plate
Handled, the presence or absence of detection signal, and the frequency of bigness scale signal, bandwidth, power, duration (whether being continuous wave) four
Individual parameter, and signal spectrum information is generated, while basis signal bigness scale result is also wanted, filtering obtains thick near intercepted signal frequency
Signal sample data in the range of the wide degree of measuring tape, such as:Down coversion is carried out using " frequency " information in signal bigness scale result
Processing, signal is changed near zero-frequency, uses the width of " bandwidth " information setting wave filter in signal bigness scale result.Intercept and capture letter
Number it is exactly the signal that is found in signal detection, bigness scale process gives the thick of the characterising parameters such as signal " bandwidth ", " frequency "
Survey result.Signal outside the signal that bigness scale is detected filters out as far as possible, excludes other signals to the signal accurate measurement result
Interference.Then by spectrum information, bigness scale signal parameter and signal initial data three parts, (signal initial data is exactly after sampling
Data of the initial data after frequency conversion, filtering process.Original sampling data first passes through the bigness scale of FPGA digital processing plates, become
Frequently, filtering, then report PC main frames to carry out accurate measurement processing) data report main frame.Frequency spectrum data will be shown by main frame for frequency spectrum, be cut
Obtain the bigness scale parameter of signal and sampled data will be used for the accurate measurement of intercepted signal parameter by main frame, acquisition is more accurately believed
Number four frequency, bandwidth, power, duration basic parameters.(it is that signal is former to sampled data using bigness scale parameter as guiding
Beginning data, bigness scale processing-frequency conversion, filtered original sampling data) analyzed by the FFT spectrum of bigger points, bigness scale is joined
Number is modified, and then obtains accurate parameters measurement result, and these are all the conventional methods in signal detection, and this is not belonging to this hair
Bright improvement, will not be described in full detail herein.
Afterwards, basis signal accurate measurement parameter enters in electromagnetic signal property data base the match query for carrying out signal, obtains
The number of winning the confidence Modulation Types and type etc. are difficult to the directly quick parameter information for calculating acquisition.Finally, connected applications scene information is (close
Level) and user's custom analysis demand (setting of signal black and white lists) and signal match query result, utilize letter proposed by the present invention
Number Threat assessment models, realize that Threat of the signal under application-specific scene judges.Technical scheme has three
Key content, one update for the structure and iteration of signal characteristic database, secondly be signal Threat quantitative appraisement model, its
Three be the specific side that binding signal property data base and signal Threat quantitative appraisement model carry out electromagnetic signal Threat assessment
Method.
The structure of signal characteristic database first has to the characteristic parameter of selection description signal characteristic, special in the signal of the present invention
In the constructing plan for levying database, whether it (is continuous that we are selected from frequency, bandwidth, power, Modulation Types, continuous wave mark
Ripple), signal type, menace, quantify to threaten eight dimensions of scoring (0-100 point) to describe bars feature record.In signal
In property data base, we have formulated two class signal characteristic tables of data, and one kind is that expert predefines table, and another kind of is that user makes by oneself
Adopted table.It is signal analysis expert that expert, which predefines table, the signal record table formulated according to priori experience, is to carry out signal point
The Main Basiss of analysis and threat assessment.The data content of User Defined table is defined by the user, and is run into user's practical operation
The signal for failing to match in expert predefines table, chosen whether by user according to its working experience, the description to signal
Feature is defined and is added in User Defined table, and the signal characteristic data record in User Defined table can be periodically by special
Family carries out discriminating certification, and extends to expert and predefine in table, realizes the iteration renewal and upgrading of signal characteristic database.
Expert predefines table and includes two signal characteristic tables of data, normal signal characteristic table and threat signal characteristic
According to table.The signal characteristic data record of normal signal characteristic table is foundation《The radio frequency division of Chinese name republic
Regulation》The contents such as defined signal type, frequency, bandwidth are built, and it is legal, conventional wireless to contain most of the country
The signal characteristic data of electricity application, such as mobile phone signal, radio signals, wifi (Wireless Fidelity) signal, such normal signal prestige
The side of body characteristic need binding signal occur scene information, signal type black and white lists be set for threaten sex determination.Threat signal
The signal characteristic data record of characteristic table is illegal, true according to the eavesdropping having found, society is existing, burglary etc. by expert
It is set to the signal characteristic data of the electromagnetic signal frequency characterizing definition of menace.
It is as follows that electromagnetic signal Threat quantitative appraisement model is established in the present invention:
T=α * (β F+ γ A+ δ B+ ε M)
Wherein T is the Threat Quantitative marking of electromagnetic signal, and α is the scene threat assessment coefficient that signal occurs, and β is frequency
Threat assessment weight, γ are signal strength evaluation weight, and δ is signal bandwidth threat assessment weight, and ε is that Modulation Types threat is commented
Estimate weight.α takes the value between [0-1] respectively in the case of scene level of confidentiality is general, secret, secret, and value relation is general<
It is secret<Secret, such as value is 0.1,0.7,1 respectively, β, γ, δ and ε take the value between [0-1] respectively, and value relation be β+
γ+δ+ε=1, such as value can be respectively 0.4,0.1,0.3 and 0.2.F is frequency range threat assessment coefficient residing for signal, in low prestige
Side of body frequency range, high threat frequency range, white spaces, black-listed frequency bands take the value between [0-100] respectively, and value relation is low threat
Frequency range<Height threatens frequency range<White spaces<Black-listed frequency bands, such as value can be respectively 10,60,80,100.A is signal intensity
Threat assessment coefficient, not less than signal strength threshold, more than threshold value A1dB、A2dB、A3dB(A1<A2<A3) when take [0- respectively
100] value between, and value relation is not less than signal strength threshold<More than threshold value A1dB<More than threshold value A2dB<More than threshold value
A3DB, such as value can be respectively 1,10,50,100.B is signal bandwidth threat assessment coefficient, B value signal bandwidth with
Normal signal is consistent, signal bandwidth is different from normal signal and with blacklist signal bandwidth mismatch, signal bandwidth and blacklist
The value between [0-100] is taken in the case of three kinds of matching respectively, and value relation is that signal bandwidth is consistent with normal signal<Signal band
Width is different from normal signal and is mismatched with blacklist signal bandwidth<Signal bandwidth matches with blacklist, such as value can be distinguished
For 10,80,100.M is signal modulation pattern threat assessment coefficient, M value signal modulation pattern it is consistent with normal signal,
Taken respectively in the case of but three kinds of mismatch blacklist, signal modulation pattern and blacklist Signal Matching inconsistent with normal signal
Value between [0-100], and value relation is that signal modulation pattern is consistent with normal signal<Signal modulation pattern and normal signal
Inconsistent but mismatch blacklist<Signal modulation pattern and blacklist Signal Matching, such as value can be respectively 10,80,100.
Binding signal property data base and signal Threat quantitative appraisement model carry out electromagnetic signal Threat and assessed specifically
Comprised the following steps in application scheme:1) the side reaction coefficient value according to corresponding to being selected operative scenario (general, secret, secret), and according to
User needs the normal signal species (such as mobile phone, Wireless Fidelity signal) of special control to set specific black and white in concrete scene
List;2) according to four signal frequency of accurate measurement, bandwidth, duration, power basic parameters, signal characteristic data are inquired about first
User Defined signal characteristic tables of data in storehouse, the data record that four basic parameters match completely is searched, is entered if finding
Enter step 6), otherwise continue step 3);3) inquire about expert and predefine table, entry is matched completely according to four basic parameter inquiries,
Otherwise continue step 4) into step 6) if finding;4) inquire about expert and predefine table, only carry out matching inquiry according to frequency term,
Step 7) is transferred to if some candidate entries are found, if otherwise continuing step 5);5) any occurrence, quantitative evaluation mould are not found
The height of frequency ranges of the F according to residing for signal frequency threatens frequency range or white spaces attribute to carry out value in type, and A is according to signal detection
The concrete condition that power exceedes threshold value carries out value, and B and M are then according to different from normal signal but at mismatch blacklist
Reason, brings signal Threat quantitative evaluation formula into and calculates and obtain signal Threat quantized value T, while can be decided whether by user pair
The signal definition signal type, Modulation Types parameter, and the signal after definition is added in User Defined table, it is transferred to step
8);6) situation about matching completely is recorded in this step process signal basic parameter and database, from the matching entry in database
The middle signal type and Modulation Types information for reading signal, the signal parameter of pending signal is supplemented completely, and if making by oneself
Adopted table clause matches completely, then directly reads the threat scoring recorded in database, be multiplied by scene indices and obtain the final of signal
Threat Quantitative marking, if being formulated into threat signal characteristic table or the signal type in blacklist, frequency, band
Wide, Modulation Types Threat metewand F, B, M then surpass according to the value with blacklist matching treatment, A according to signal power
The actual conditions for crossing threshold value carry out value, and bringing each term coefficient and weighted value into signal Threat quantitative evaluation formula calculates acquisition
Signal Threat quantized value T, is transferred to step 8);7) this step process signal parameters and data-base recording only partly match
Situation, it is under the jurisdiction of threat signal characteristic table or blacklist if having in the candidate record only obtained according to frequency matching inquiry
Record then frequency threat assessment coefficient F values according to blacklist matching treatment, if without if it is actually located according to signal frequency
Threat frequency range (it is the priori statistical analysis knot that is distributed according to threat signal in frequency range according in special scenes to threaten frequency range
Fruit division, the larger frequency range of threat signal probability of occurrence threatens frequency range to be high, and State Radio Regulatory Commission divides normal
It is low threat frequency range to advise military, civilian frequency range) or white spaces (State Radio Regulatory Commission not yet divides the less frequency used
Section) value (low threat frequency range is carried out to F<Height threatens frequency range<White spaces<Black-listed frequency bands take between [0-100] respectively
Value).The present invention, which only limits value rule and scope, specific value, need to combine concrete scene environment tuning.Secondly signal band is checked
Whether there is occurrence in wide and candidate record, different from normal signal if nothing, B is according to progress values different from normal signal
Processing, if so, the situation for then belonging to threat signal characteristic table or blacklist record according to being whether there is in occurrence is to B assignment, M
The actual conditions that the method same B, A of value are exceeded threshold value by signal intensity carry out value, bring each term coefficient and weighted value into letter
Number Threat quantitative evaluation formula, which calculates, obtains signal Threat quantized value T, is transferred to step 8);8) metrization is threatened according to signal
Value T determines conclusion, T to signal menace>90 points threaten for height, and 90>T>80 be that moderate threatens, 80>T>50 be slight
Threaten, 50>T is general signal.
The coefficient and parameter gone out given in the above embodiments, it is available to those skilled in the art to realize or use
Invention, invention, which does not limit, only takes foregoing disclosed numerical value, in the case where not departing from the thought of invention, the technology of this area
Personnel can make various modifications or adjustment to examples detailed above, thus the protection domain invented is not limited by above-described embodiment,
And it should be the maximum magnitude for meeting the inventive features that claims are mentioned.
Claims (6)
1. a kind of live electromagnetic environment Signal online analysis and intimidation estimating method, it specifically includes following step:Step 1:
According to the characteristic parameter of various signals, signal characteristic database is built;Step 2: collection site electromagnetic environment signal, will be gathered
To signal handled after obtain four frequency, bandwidth, power and duration basic parameters of signal, basic parameter is defeated
Enter into signal characteristic database and matched, obtain the Modulation Types and type of signal;Step 3: connected applications scene is believed
The signal match query result of breath, user's customized demand and step 3, using signal Threat assessment models, carry out signal and exist
Threat under application-specific scene judges;
Threat quantitative evaluation formula is specially in the signal Threat assessment models:T=α * (β F+ γ A+ δ B+ ε M);Wherein
T is the Threat Quantitative marking of electromagnetic signal, and α is the scene threat assessment coefficient that signal occurs, and β is frequency Threat appraisal right
Weight, γ is signal strength evaluation weight, and δ is signal bandwidth threat assessment weight, and ε is Modulation Types threat assessment weight;α is
Value between [0-1], β+γ+δ+ε=1;F is frequency range threat assessment coefficient residing for signal, and A is signal intensity threat assessment system
Number, B are signal bandwidth threat assessment coefficient, and M is signal modulation pattern threat assessment coefficient, F, A, B, M take respectively [0-100] it
Between value;
Wherein when four basic parameters and data-base recording only partly match, in the candidate only obtained according to frequency matching inquiry
In record if having be under the jurisdiction of threat signal characteristic table or blacklist record if frequency threat assessment coefficient F values according to
Blacklist matching treatment, if carrying out value to F according to the actually located threat frequency range of signal frequency or white spaces without if, secondly
Check in signal bandwidth and candidate record whether there is occurrence, it is different from normal signal if nothing, B according to normal signal not
With value processing is carried out, if so, the feelings for then belonging to threat signal characteristic table or blacklist record according to being whether there is in occurrence
Condition is to B assignment, and the method same B, A of M values are exceeded the actual conditions progress value of threshold value by signal intensity, by each term coefficient and power
Weight values bring signal Threat quantitative evaluation formula into and calculate acquisition signal Threat quantized value T.
2. live electromagnetic environment Signal online analysis and intimidation estimating method as claimed in claim 1, it is characterised in that described
Signal characteristic database is expanded using semi-automatic mode of learning, constantly improve.
3. live electromagnetic environment Signal online analysis and intimidation estimating method as claimed in claim 2, it is characterised in that described
The structure of signal characteristic database specifically include following step:In signal characteristic database, two class signal characteristics are formulated
Tables of data, one kind are that expert predefines table, and another kind of is User Defined table;It is signal analysis expert that expert, which predefines table, according to
The signal record table formulated according to priori experience, it is the Main Basiss for carrying out signal analysis and threat assessment;User Defined
The data content of table is defined by the user, the letter for failing to match in expert predefines table run into user's practical operation
Number, chosen whether by user according to its working experience, the Expressive Features of signal are defined and are added to User Defined table
In;Signal characteristic data record in User Defined table periodically carries out discriminating certification by expert, and extends to expert and predefine
In table, so as to realize the renewal of the iteration of signal characteristic database and upgrading.
4. live electromagnetic environment Signal online analysis and intimidation estimating method as claimed in claim 1, it is characterised in that when four
When record in individual basic parameter and signal characteristic database matches completely, the threat scoring recorded in database is directly read,
It is multiplied by scene indices and obtains the final Threat Quantitative marking of signal.
5. live electromagnetic environment Signal online analysis and intimidation estimating method as claimed in claim 1, it is characterised in that work as letter
When number type is formulated into blacklist, each term coefficient directly according to blacklist matching treatment.
6. live electromagnetic environment Signal online analysis and intimidation estimating method as claimed in claim 1, it is characterised in that described
Method also includes determining conclusion, T to signal menace according to signal Threat quantized value T>90 points threaten for height, and 90>T
>80 be that moderate threatens, 80>T>50 threaten to be slight, and 50>T is general signal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510909171.0A CN105468922B (en) | 2015-12-09 | 2015-12-09 | A kind of live electromagnetic environment Signal online analysis and intimidation estimating method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510909171.0A CN105468922B (en) | 2015-12-09 | 2015-12-09 | A kind of live electromagnetic environment Signal online analysis and intimidation estimating method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105468922A CN105468922A (en) | 2016-04-06 |
CN105468922B true CN105468922B (en) | 2018-02-02 |
Family
ID=55606613
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510909171.0A Active CN105468922B (en) | 2015-12-09 | 2015-12-09 | A kind of live electromagnetic environment Signal online analysis and intimidation estimating method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105468922B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106096013A (en) * | 2016-06-24 | 2016-11-09 | 中国人民解放军63888部队 | Frequency queries based on electromagnetic environment data base and planing method |
CN106341192B (en) * | 2016-08-31 | 2019-01-18 | 成都中星世通电子科技有限公司 | A kind of transmitting station signal characteristic Dynamic Recognition method |
CN112183339B (en) * | 2020-09-28 | 2024-02-20 | 中车长春轨道客车股份有限公司 | Electromagnetic environment assessment method, device and server |
CN112188459B (en) * | 2020-09-29 | 2023-10-03 | 普联技术有限公司 | Signal identification method, device and equipment |
CN114019942B (en) * | 2021-11-04 | 2023-08-29 | 哈尔滨工业大学 | Industrial robot system security threat evaluation method based on time-sharing frequency |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101635107A (en) * | 2009-04-03 | 2010-01-27 | 国网电力科学研究院 | Electromagnetic environment emulation training and data management system and method thereof |
-
2015
- 2015-12-09 CN CN201510909171.0A patent/CN105468922B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101635107A (en) * | 2009-04-03 | 2010-01-27 | 国网电力科学研究院 | Electromagnetic environment emulation training and data management system and method thereof |
Non-Patent Citations (1)
Title |
---|
雷达辐射源信号智能识别方法研究;张葛祥;《中国优秀博硕士学位论文全文数据库(博士) 信息科技辑》;20060415(第4期);第1-2,15-19页 * |
Also Published As
Publication number | Publication date |
---|---|
CN105468922A (en) | 2016-04-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105468922B (en) | A kind of live electromagnetic environment Signal online analysis and intimidation estimating method | |
CN108616900B (en) | Method for distinguishing indoor and outdoor measurement reports and network equipment | |
CN104853379B (en) | A kind of quality of wireless network appraisal procedure and device | |
CN103796227B (en) | Carry out the method and system of wireless signal covering analyzing | |
CN109982366A (en) | Target value area analysis method, device, equipment and medium based on big data | |
Xu et al. | Wheat ear counting using K-means clustering segmentation and convolutional neural network | |
Eskelson et al. | Estimating riparian understory vegetation cover with beta regression and copula models | |
CN109982361B (en) | Signal interference analysis method, device, equipment and medium | |
CN105163344B (en) | A kind of interior localization method interfered of TD-LTE system | |
CN103581995A (en) | Method for measuring coverage performance of mobile communication network | |
Saidi et al. | Assessment of trends in extreme precipitation events: a case study in Piedmont (North-West Italy) | |
CN103136471A (en) | Method and system for testing malicious Android application programs | |
CN110059556A (en) | A kind of transformer substation switch division condition detection method based on deep learning | |
CN109738724B (en) | Fault diagnosis method and device of equipment, storage medium and electronic device | |
CN110971677A (en) | Electric power internet of things terminal equipment side channel safety monitoring method based on countermeasure reinforcement learning | |
CN105679335A (en) | Speech quality assessment method and system based on wireless analysis | |
CN103079221A (en) | Method for conjoint analysis of mobile network condition by using sweep generator and testing mobile phone | |
KR20200038731A (en) | Method for analyzing of indoor floating population and apparatus thereof | |
CN104665795A (en) | Health tester, user terminal and health cloud center | |
CN109995549B (en) | Method and device for evaluating flow value | |
CN116318523B (en) | Examination room area mobile phone signal shielding detection management and control system | |
Bushmelev et al. | Adaptive method of color selection in application to social media images | |
CN105046147A (en) | Method and apparatus for monitoring degree of attack on system | |
CN107094306B (en) | Terminal performance evaluation method and device | |
CN108419247B (en) | Wireless communication base station cell correlation calculation method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |