共查询到20条相似文献,搜索用时 62 毫秒
1.
2.
3.
为了解决敌方释放箔条干扰我方防空反击任务或者敌方舰船设置角反射器阵列干扰我方对海目标打击任务中的雷达抗干扰问题,提出了一种基于雷达一维距离像的稀疏表达的无源假目标识别的方法。首先,分别利用大量关注目标和无源欺骗干扰的雷达一维距离像数据进行稀疏字典学习,分别得到目标和干扰的稀疏字典;然后利用两种稀疏字典分别对未知的雷达一维距离像信号进行稀疏表达;最后分别计算两种稀疏字典对未知信号稀疏表达的重构误差,利用重构误差比值识别目标和干扰类别。仿真结果表明,在目标与无源假目标干扰的回波不混叠、目标与干扰噪声比3 dB条件下,识别无源假目标欺骗干扰的准确率超过90%,证明了该方法抗无源假目标干扰的有效性。 相似文献
4.
5.
全球卫星导航系统(Global Navigation Satellite System,GNSS)转发式欺骗干扰具有系统搭建容易、干扰实施方便、成本低等优点,目前已成为一种重要的GNSS欺骗方式。针对多峰值抗转发欺骗干扰检测算法,提出一种针对目标接收机GNSS时钟的转发式欺骗干扰方法。相比于传统转发式欺骗的各通道卫星信号时延一致的特点,该方法根据待欺骗接收机和转发式欺骗源的位置计算各卫星通道转发时延,使待欺骗目标接收到的GNSS欺骗信号的时延为伪码周期整数倍,并随时间自适应动态调整转发时延,使得欺骗检测失效,进一步欺骗静态目标接收机的GNSS时钟。模拟实验和仿真实验验证了该转发式欺骗方法的有效性。 相似文献
6.
针对实施机载合成孔径雷达(SAR)假目标欺骗干扰所需引导参数存在测量误差的问题,首先,分析了假目标欺骗干扰调制信号模型,并给出了干扰信号所需侦察参数;然后,分析了机载平台与信号参数误差对假目标的位置、幅度及分辨率的影响,指出了假目标在SAR图像中的“折叠”现象,并分析了产生原因;最后,对参数误差的影响进行了定量仿真分析。理论分析与仿真结果表明,SAR的定位误差与假目标的成像位置偏移量大致呈线性关系。当速度误差为2%、方位向定位误差为100 m时,假目标的方位向分辨率降低约1倍。 相似文献
7.
电子战是现代战争的重要组成部分。假雷达目标欺骗和反欺骗是电子战的一部分。前不久我国首次发现了假雷达目标的严重干扰,引起我国的重视。本文论述了假雷达目标欺骗与反欺骗的原理及方法。 相似文献
8.
从噪声干扰的原理出发,详细地分析了噪声干扰信号的产生并推导出干扰条件下的雷达最大作用距离的求解公式。仿真了目标和干扰机接收的信号强度随距离而变化的特征以及干扰有效辐射功率密度对雷达探测能力影响的相对效果。 相似文献
9.
10.
针对战机实施有源干扰时的射频隐身问题,分析了现有干扰功率
评估准则的不足,在雷达信号检测模型和侦察截获概率模型的基础上,讨论了“有效干扰”
对干扰功率的需求和射频隐身对干扰功率的限制,提出将有效干扰条件下的侦察截获概率作
为干扰信号的射频隐身特性表征因子,最后提出了一种结合目标雷达类型、接收信号功率以
及本机RCS起伏等因素的干扰功率自适应控制方法。通过对固定功率干扰与不同压制系数下
自适应功率干扰时雷达检测概率和侦察截获概率的仿真,表明自适应功率控制能够节约干扰
功率,在有效干扰的同时提高干扰的射频隐身能力。 相似文献
11.
Criminals often falsify their identities intentionally in order to deter police investigations. In this paper we focus on uncovering patterns of criminal identity deception observed through a case study performed at a local law enforcement agency. We define criminal identity deception based on an understanding of the various theories of deception. We interview a police detective expert and discuss the characteristics of criminal identity deception. A taxonomy for criminal identity deception was built to represent the different patterns that were identified in the case study. We also discuss methods currently employed by law enforcement agencies to detect deception. Police database systems contain little information that can help reveal deceptive identities. Thus, in order to identify deception, police officers rely mainly on investigation. Current methods for detecting deceptive criminal identities are neither effective nor efficient. Therefore we propose an automated solution to help solve this problem. 相似文献
12.
13.
14.
Where Did They Go Wrong? An Analysis of the Failure of Knowledgeable Internet Consumers to Detect Deception Over the Internet 总被引:2,自引:0,他引:2
Stefano Grazioli 《Group Decision and Negotiation》2004,13(2):149-172
This paper uses an information-processing model of deception detection to understand the reasons underlying Internet consumers' success and failure at detecting forms of intentional deception that occur on the Internet. Eighty MBA students visited either a real commercial site or a deceptive copycat (page-jacking) site. The deceptive site was identical to the clean site except that it contained six deceptive manipulations (e.g., forged favorable quotes from authoritative sources). This study compares the information processing behavior of four groups of subjects: those who detected the deception, those who missed it, those who correctly identified the real site as non-deceptive, and those who incorrectly believed that the real site was deceptive. It was found that (1) priming subjects to generate the hypothesis of deception weakly facilitates detection success, (2) competence at evaluating the hypothesis of deception is a strong differentiator between successful and unsuccessful detectors, and (3) successful detectors rely on assurance cues and heavily discount trust cues. Unsuccessful detectors do the opposite. 相似文献
15.
Lina Zhou Judee K. Burgoon Jay F. Nunamaker Doug Twitchell 《Group Decision and Negotiation》2004,13(1):81-106
The detection of deception is a promising but challenging task. A systematic discussion of automated Linguistics Based Cues (LBC) to deception has rarely been touched before. The experiment studied the effectiveness of automated LBC in the context of text-based asynchronous computer mediated communication (TA-CMC). Twenty-seven cues either extracted from the prior research or created for this study were clustered into nine linguistics constructs: quantity, diversity, complexity, specificity, expressivity, informality, affect, uncertainty, and nonimmediacy. A test of the selected LBC in a simulated TA-CMC experiment showed that: (1) a systematic analysis of linguistic information could be useful in the detection of deception; (2) some existing LBC were effective as expected, while some others turned out in the opposite direction to the prediction of the prior research; and (3) some newly discovered linguistic constructs and their component LBC were helpful in differentiating deception from truth. 相似文献
16.
When attempting to portray the attractiveness of a brand vis-à-vis its competitors, an ad may make global claims about superiority or specific claims about one or more attributes. A special case of latter is the piecemeal ad in which the advertised brand is compared to a competitor on one attribute, a different competitor on a second attribute, another competitor on a third attribute, and so on. The present research demonstrates the effectiveness of this technique and explores the parameters of its influence. We find that piecemeal messages are persuasive because they make seemingly strong claims in a believable manner. Consumer skepticism appears to arise only when conditions for scrutiny are very favorable. 相似文献
17.
In a recent paper that appeared in this journal Fritz Allhoff addresses the morality of bluffing in negotiations1. He focuses on cases in which people misstate their reservation price in negotiations, e.g., suppose that I am selling a house and tell a prospective buyer that $300,000 is absolutely the lowest price that I will accept, when I know that I would be willing to accept as little as $270,000 for the house rather than continue to try to sell it. Allhoff criticizes my (qualified) defense of bluffing in my paper Second Thoughts on Bluffing,2 and offers what he takes to be a more plausible defense of bluffing. Allhoffs criticisms rest on several serious misinterpretations of my views. He ascribes to me several arguments that I dont make. He also attributes to me an unqualified defense of bluffing that I explicitly reject. I briefly document this in Section 1. In Sections 2 and 3 I explain and criticize Allhoffs positive views about bluffing and the morality of bluffing.Thomas Carson is professor of philosophy at Loyola University Chicago. He is the author of Value and the Good Life and The Status of Morality. He is the co-editor of Moral Relativism and Morality and the Good Life. He is the author of numerous papers on ethical theory and business ethics and is a member of the editorial board of Business Ethics Quarterly and Journal of Business Ethics. He is currently working on a book entitled Lying and Deception: Theory and Practice. 相似文献
18.
Randi L. Sims 《Journal of Business Ethics》2002,35(1):27-34
As businesses become more global, the opportunities for employees to work with individuals from different cultures increase. Research in cross-cultural interactions has increased in response to such changes. This research study considers employee attitudes and perceived organizational support for the use of deception within the work environment. In this study, two types of deception have been considered; deception for personal gain and deception for the organization's benefit. The reported likelihood for committing these two types of deception for United States and Israeli employees was gathered. The results indicate that United States employees are more likely to deceive others for personal gain than the Israeli employees. In addition, the results indicate that United States employees were more likely to perceive organizational support for the use of deception for personal gain than were the Israeli employees. No differences between the two samples were found for personal or organizational support for deception for the organization's benefit. Differences are explained using Hofstede's (1991) theory of international cultures. 相似文献
19.
Deceitful when insecure: The effect of self-efficacy beliefs on the use of deception in negotiations
Filipe Sobral Gustavo Moreira Tavares Liliane Furtado Urszula Lagowska José Andrade Moura Neto 《Business ethics (Oxford, England)》2023,32(1):179-190
This article investigates if and how negotiators' self-efficacy beliefs affect their use of deception in negotiation. Specifically, we propose that self-efficacy can be interpreted as a threat to self-concept, which encourages individuals to temporarily bypass self-regulatory obstacles by morally disengaging their cognitive moral filters, thereby enabling them to use deception in negotiation. We test our hypotheses in three independent experimental studies involving an interactive negotiation simulation, totalizing 460 participants. We find that negotiators with low self-efficacy regarding their negotiation abilities are more likely to use deception than those with high self-efficacy beliefs. Furthermore, we find that moral disengagement mediates the effects of self-efficacy on deception. Our findings suggest that self-efficacy plays a key role in shaping negotiators' ethical behaviors and we identify the psychological mechanism underlying this relationship. 相似文献
20.
Blaine McCormick 《Journal of Business Ethics》2001,29(3):285-286
Sun Tzu's text of The Art of War remains a bestsellingand oft-referenced practioner's book. However, its generalizabilityto the current business environment is questionable. This reviewexamines two central tenets of the book – warfare anddeception – and critiques their relevance in lightof current business practice. 相似文献