[1] |
Gavan J. Analysis of desensitization effects on radio systems[C]. Tokyo: Proceedings of the International Symposium on Electromagnetic Compatibility, 1984.
|
[2] |
Gavan J, Joffe E B. An investigation of the desensitizing effects by high power HF broadcast transmitters on HF airborne receivers[J]. IEEE Transactions on Electromagnetic Compatibility, 1992, 34(2):65-77.
doi: 10.1109/15.135618
|
[3] |
Gavan J. Analysis, computation, and mitigation of radio systems' mutual interference effects in collocated vehicular transceivers[J]. IEEE Transactions on Vehicular Technology, 1994, 43(3):447-456.
doi: 10.1109/25.312801
|
[4] |
Gavan J, Handler F. Analysis, computation, and mitigation of the interference to a remote receiver from two collocated vehicular transceivers[J]. IEEE Transactions on Vehicular Technology, 1996, 45(3):431-442.
doi: 10.1109/25.533759
|
[5] |
Zhou P, Lü Y H, Chen Z H, et al. Systemlevel EMC assessment for military vehicular communication systems based on a modified fourlevel assessment model[J]. China Communications, 2018, 15(8):39-53.
|
[6] |
Guo X, Gang J X, Xu B. Research on the effectiveness evaluation method of weapon system based on information index[C]. Changchun: Proceedings of the International Conference on Information Systems and Computer Aided Education, 2018.
|
[7] |
Alcaras A. EMC performances of a land army vehicle to respect integrated radios reception sensitivity: Typical performances needed for “Fitted for Radio (FFR)” land vehicle[C]. Amsterdam: Proceedings of the International Symposium on Electromagnetic Compatibility, 2018.
|
[8] |
何洪涛, 聂纯, 刘继东, 等. 无线电接收机阻塞干扰响应的建模方法研究[J]. 微波学报, 2014, 30(S2):61-64.
|
|
He Hongtao, Nie Chun, Liu Jidong, et al. Research on modeling method of radio receiver's jamming response[J]. Journal of Microwaves, 2014, 30(S2):61-64.
|
[9] |
Hui T, Wei W. Modeling and simulation of the nonlinear response of receiver amplifiers[C]. Harbin: Proceedings of the Third Asia-Pacific Conference on Antennas and Propagation, 2014.
|
[10] |
Leng T J. Nonlinear characteristics and pre distortion modeling of a nonmemory RF power amplifier[C]. Yangzhou: Proceedings of the Thirteenth IEEE International Conference on Electronic Measurement & Instruments, 2017.
|
[11] |
李敏玥. 基于多项式的接收机非线性行为建模方法研究[D]. 西安: beoplay体育提现, 2020.
|
|
Li Minyue. Research on of receiver nonlinear behavior modeling method based on polynomial[D]. Xi'an: Xidian University, 2020.
|
[12] |
成伟兰, 刘坚强, 谌丽. 干扰条件下接收机减敏机理分析[J]. 舰船科学技术, 2012, 34(3):122-125.
|
|
Cheng Weilan, Liu Jianqiang, Zhan Li. Analysis of receiver desensitization mechanism under interference conditions[J]. Ship Science and Technology, 2012, 34(3):122-125.
|
[13] |
武南开, 苏东林, 何洪涛, 等. 机载超短波电台邻道干扰减敏特性建模与评估[J]. 北京航空航天大学学报, 2017, 43(3):481-487.
|
|
Wu Nankai, Su Donglin, He Hongtao, et al. Adjacent channel interference modeling and assessment on reduction of airborne VHF radio sensitivity[J]. Journal of Beijing University of Aeronautics and Astronautics, 2017, 43(3):481-487.
|
[14] |
周洋, 郑剑云. 采用灰色关联分析法的舰艇超短波通信效能评估研究[J]. 舰船电子工程, 2018, 38(1):108-111.
|
|
Zhou Yang, Zheng Jianyun. Efficiency evaluation of warship VHF/UHF communication based on gray relation analysis[J]. Ship Electronic Engineering, 2018, 38(1):108-111.
|
[15] |
文良浒, 祁连年, 谷伟. 变换域通信与扩频通信抗干扰的性能比较[J]. 电子科技, 2017, 30(5):203-206.
|
|
Wen Liangxu, Qi Liannian, Gu Wei. Comparison of anti jamming performance of transform domain communication and spread spectrum communication[J]. Electronic Science and Technology, 2017, 30(5):203-206.
|
[16] |
王亚. 军事综合电子信息系统作战适用性分析与评估方法[J]. 火力与指挥控制, 2010, 35(8):75-79.
|
|
Wang Ya. Analysis and asseeement of operation applicability of military integrated electronic information systems[J]. Fire Control & Command Control, 2010, 35(8):75-79.
|
[17] |
赵红梅, 惠守强, 王健, 等. 通信设备受扰性能评估方法研究[J]. 中国电子bepaly手机下载院学报, 2013, 8(4):398-402.
|
|
Zhao Hongmei, Hui Shouqiang, Wang Jian, et al. Study on method for performance evaluation with electromagnetic interference of communication device[J]. Journal of China Academy of Electronics and Information Technology, 2013, 8(4):398-402.
|
[18] |
查红泽. 基于等级保护的信息安全评估算法研究[J]. 电子科技, 2019, 32(11):78-82.
|
|
Zha Hongze. Research on information security evaluation algorithm based on hierarchical protection[J]. Electronic Science and Technology, 2019, 32(11):78-82.
|