Schleher D C. Electronic Warfare in The Information Age[J]. London: Artech House, 1999: 201-292.[2]王跃鹏, 黄建冲. 基于DRFM的雷达综合欺骗干扰. 电子对抗, 2005, 5: 1-5.[3]Pace P E, Fouts D J, and Ekestorm S, et al.. Digital false-target image synthesiser for countering ISAR[J].IEE Proc.-Radar Sonar Navigation.2002, 149(5):248-257[4]Berger S. Digital radio frequency memory linear range gate stealer spectrum[J]. IEEE Trans. on AES, 2003, 39(2): 725-735.[5]Adler E and Viverios E, et al.. Direct digital synthesis application for radar development[C]. IEEE Int. Radar Conf., Washington, DC, May 1995: 224-226.[6]周国富, 姬国良. 一种新的数字射频存贮器非均匀相位量化方法[J]. 电子学报, 1994, 22(3): 90-92.[7]杨小牛, 楼才义, 等. 软件无线电原理及应用[M]. 北京:电子工业出版社, 2001, 第2章第1节.[8]王雪松, 刘建成, 等. 间歇采样转发干扰的数学原理[J]. 中国科学, 2006, 36(8): 891-901.[9]Papoulis A. Signal Analysis[M]. New York: McGraw-Hill book co., 1977.[10]刘建成, 刘忠, 等. 基于群延迟的前移干扰研究[J]. 自然科学进展, 2006, 16(12): 122-128.[11]Hlawatsch F, and Boudreaux-bartels G F. Linear and quadratic time-frequency signal representations[J]. IEEE SP Magazine, 1992, 9(4): 21-67.
|