Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective ...Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective of differential-linear(DL)cryptanalysis.Specifically,we present an automated search for the DL distinguishers of Ballet based on MILP/MIQCP.For the versions with block sizes of 128 and 256 bits,we obtain 16 and 22 rounds distinguishers with estimated correlations of 2^(-59.89)and 2^(-116.80),both of which are the publicly longest distinguishers.In addition,this study incorporates the complexity information of key-recovery attacks into the automated model,to search for the optimal key-recovery attack structures based on DL distinguishers.As a result,we mount the key-recovery attacks on 16-round Ballet-128/128,17-round Ballet-128/256,and 21-round Ballet-256/256.The data/time complexities for these attacks are 2^(108.36)/2^(120.36),2^(115.90)/2^(192),and 2^(227.62)/2^(240.67),respectively.展开更多
The Type-2 generalized Feistel structure is widely used in block cipher design.This work conducts a quantum key recovery attack on TWINE-80,a lightweight block cipher based on the improved Type-2 generalized Feistel s...The Type-2 generalized Feistel structure is widely used in block cipher design.This work conducts a quantum key recovery attack on TWINE-80,a lightweight block cipher based on the improved Type-2 generalized Feistel structure.By constructing a round function,a new 7-round quantum distinguisher for TWINE-80 is identified.Leveraging the reuse characteristics of round keys in the algorithm,three pairs of repeated round keys are discovered during the 5-round transformation process.Using Grover’s algorithm to search for partial round keys,a 17-round quantum key recovery attack on TWINE-80 is successfully implemented,with a time complexity of 296 and requiring 327 qubits.Compared to similar studies,this work reduces the time complexity by 26 and slightly decreases the required quantum resources by 12 qubits.展开更多
In the realm of missile defense systems,the self-sufficient maneuver capacity of missile swarms is pivotal for their survival.Through the analysis of the missile dynamics model,a time-efficient cooperative attack stra...In the realm of missile defense systems,the self-sufficient maneuver capacity of missile swarms is pivotal for their survival.Through the analysis of the missile dynamics model,a time-efficient cooperative attack strategy for missile swarm is proposed.Based on the distribution of the attackers and defenders,the collision avoidance against the defenders is considered during the attack process.By analyzing the geometric relationship between the relative velocity vector and relative position vector of the attackers and defenders,the collision avoidance constrains of attacking swarm are redefined.The key point is on adjusting the relative velocity vectors to fall outside the collision cone.This work facilitates high-precision attack toward the target while keeping safe missing distance between other attackers during collision avoidance process.By leveraging an innovative repulsion artificial function,a time-efficient cooperative attack strategy for missile swarm is obtained.Through rigorous simulation,the effectiveness of this cooperative attack strategy is substantiated.Furthermore,by employing Monte Carlo simulation,the success rate of the cooperative attack strategy is assessesed and the optimal configuration for the missile swarm is deduced.展开更多
In the field of calculating the attack area of air-to-air missiles in modern air combat scenarios,the limitations of existing research,including real-time calculation,accuracy efficiency trade-off,and the absence of t...In the field of calculating the attack area of air-to-air missiles in modern air combat scenarios,the limitations of existing research,including real-time calculation,accuracy efficiency trade-off,and the absence of the three-dimensional attack area model,restrict their practical applications.To address these issues,an improved backtracking algorithm is proposed to improve calculation efficiency.A significant reduction in solution time and maintenance of accuracy in the three-dimensional attack area are achieved by using the proposed algorithm.Furthermore,the age-layered population structure genetic programming(ALPS-GP)algorithm is introduced to determine an analytical polynomial model of the three-dimensional attack area,considering real-time requirements.The accuracy of the polynomial model is enhanced through the coefficient correction using an improved gradient descent algorithm.The study reveals a remarkable combination of high accuracy and efficient real-time computation,with a mean error of 91.89 m using the analytical polynomial model of the three-dimensional attack area solved in just 10^(-4)s,thus meeting the requirements of real-time combat scenarios.展开更多
A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on ...A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on feedback and feed-forward channels simultaneously with limited resource.The attacker aims at degrading the UAV CPS's estimation performance to the max while keeping stealthiness characterized by the Kullback-Leibler(K-L)divergence.The attacker is resource limited which can only attack part of sensors,and the attacked sensor as well as specific forms of attack signals at each instant should be considered by the attacker.Also,the sensor selection principle is investigated with respect to time invariant attack covariances.Additionally,the optimal switching attack strategies in regard to time variant attack covariances are modeled as a multi-agent Markov decision process(MDP)with hybrid discrete-continuous action space.Then,the multi-agent MDP is solved by utilizing the deep Multi-agent parameterized Q-networks(MAPQN)method.Ultimately,a quadrotor near hover system is used to validate the effectiveness of the results in the simulation section.展开更多
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA...An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance.展开更多
In this study, experiments were carried out to investigate aerodynamic characteristics of a high-speed train on viaducts in turbulent crosswinds using a 1:25 scaled sectional model wind-tunnel testing. Pressure measur...In this study, experiments were carried out to investigate aerodynamic characteristics of a high-speed train on viaducts in turbulent crosswinds using a 1:25 scaled sectional model wind-tunnel testing. Pressure measurements of two typical sections, one train-head section and one train-body section, at the windward and leeward tracks were conducted under the smooth and turbulence flows with wind attack angles between-6° and 6°, and the corresponding aerodynamic force coefficients were also calculated using the integral method. The experimental results indicate that the track position affects the mean aerodynamic characteristics of the vehicle, especially for the train-body section. The fluctuating pressure coefficients at the leeward track are more significantly affected by the bridge interference compared to those at the windward track. The effect of turbulence on the train-head section is less than that on the train-body section. Additionally, the mean aerodynamic force coefficients are almost negatively correlated to wind attack angles, which is more prominent for vehicles at the leeward track. Moreover, the lateral force plays a critical role in determining the corresponding overturning moment, especially on the train-body section.展开更多
For the sake of understanding the deterioration behavior of concrete in actual railway tunnel structures subjected to aggressive sulfate medium in practice,detailed field investigations and tested analysis on sprayed ...For the sake of understanding the deterioration behavior of concrete in actual railway tunnel structures subjected to aggressive sulfate medium in practice,detailed field investigations and tested analysis on sprayed concrete linings of approximately 40-year-old railway tunnels in environments containing sulfate ion were carried out,respectively.The results show that the deterioration of concretes in the investigated area is serious,which involves complicated physicochemical process between the sulfate salt and concrete.Among them,the secondary sulfateminerals such as gypsum formation under very high concentration sulfate ion condition by accumulating and evaporation process dominate,followed by the crystallization of sulfate salt and formation of thaumasite.展开更多
According to the characteristic of cruise missiles,navigation point setting is simplified,and the principle of route planning for saturation attack and a concept of reference route are put forward.With the help of the...According to the characteristic of cruise missiles,navigation point setting is simplified,and the principle of route planning for saturation attack and a concept of reference route are put forward.With the help of the shortest-tangent idea in route-planning and the algorithm of back reasoning from targets,a reference route algorithm is built on the shortest range and threat avoidance.Then a route-flight-time algorithm is built on navigation points.Based on the conditions of multi-direction saturation attack,a route planning algorithm of multi-direction saturation attack is built on reference route,route-flight-time,and impact azimuth.Simulation results show that the algorithm can realize missiles fired in a salvo launch reaching the target simultaneously from different directions while avoiding threat.展开更多
Knowledge of impact conditions is critical to evaluating the terminal impact performance of a projectile.For a small caliber bullet,in-flight velocity has been precisely measured for decades using detection screens,bu...Knowledge of impact conditions is critical to evaluating the terminal impact performance of a projectile.For a small caliber bullet,in-flight velocity has been precisely measured for decades using detection screens,but accurately quantifying the orientation of the bullet on a target has been more challenging.This report introduces the Automated Small-Arms Photogrammetry(ASAP)analysis method used to measure,model,and predict the orientation of a small caliber bullet before reaching an impact surface.ASAP uses advanced hardware developed by Sydor Technologies to record a series of infrared digital photographs.Individual images(four orthogonal pairs)are processed using computer vision algorithms to quantify the orientation of the projectile and re-project its precise position and orientation into a three-dimensional muzzle-fixed coordinate system.An epicyclic motion model is fit to the measured data,and the epicyclic motion is extrapolated to the target location.Analysis results are fairly immediate and may be reviewed during testing.Prove-out demonstrations have shown that the impact-angle prediction capability is less than six hundredths of a degree for the 5.56 mm ball round tested.Keywords:Yaw,Terminal ballistics,Exterior ballistics,Test&evaluation,Computer vision,Image processing,Angle of展开更多
The railway tunnel concrete lining exposed to sulfate-bearing groundwater beyond 40 years in southwest of China was investigated. Field investigation, sulfate ions content and corroded products analysis, macro/microsc...The railway tunnel concrete lining exposed to sulfate-bearing groundwater beyond 40 years in southwest of China was investigated. Field investigation, sulfate ions content and corroded products analysis, macro/microscopic test were carried out. Results show that under the tunnel concrete lining structure and its served environmental conditions, sulfate solutions permeate concrete lining and accumulate on windward-side of concrete lining, resulting in the increase of sulfate ions content on windward-side and the diffusion of sulfate ions from windward-side to waterward-side, which cause the concrete lining of windward-side damaged seriously but the waterward-side of concrete lining is still in perfect condition. It is confirmed that structural characteristic of tunnel and environmental conditions lead to physical attack with the leaching of concrete and sodium sulfate crystallization as well as chemical corrosion with formation of gypsum in high sulfate concentration and formation of thaumasite in proper temperature rather than formation of ettringite. These achievements can provide academic and technical supports for understanding the deterioration mechanism of concrete lining as well as constructing railway tunnel under sulfate attack.展开更多
This paper analyses the issue of impact time control of super-cavitation weapons impact fixed targets which mainly refer to the ships or submarines who lost power, but still have combat capability. Control over impact...This paper analyses the issue of impact time control of super-cavitation weapons impact fixed targets which mainly refer to the ships or submarines who lost power, but still have combat capability. Control over impact time constraints of guidance law(ITCG) is derived by using sliding mode control(SMC) and Lyapunov stability theorem. The expected impact time is realized by using the notion of attack process and estimated time-to-go to design sliding mode surface(SMS). ITCG contains equivalent and discontinuous guidance laws, once state variables arrive at SMS,the equivalent guidance law keeps the state variables on SMS,then the discontinuous guidance law enforces state variables to move and reach SMS. The singularity problem of ITCG is also analyzed. Theoretical analysis and numerical simulation results are given to test the effectiveness of ITCG designed in this paper.展开更多
The ever-changing battlefield environment requires the use of robust and adaptive technologies integrated into a reliable platform. Unmanned combat aerial vehicles(UCAVs) aim to integrate such advanced technologies wh...The ever-changing battlefield environment requires the use of robust and adaptive technologies integrated into a reliable platform. Unmanned combat aerial vehicles(UCAVs) aim to integrate such advanced technologies while increasing the tactical capabilities of combat aircraft. As a research object, common UCAV uses the neural network fitting strategy to obtain values of attack areas. However, this simple strategy cannot cope with complex environmental changes and autonomously optimize decision-making problems. To solve the problem, this paper proposes a new deep deterministic policy gradient(DDPG) strategy based on deep reinforcement learning for the attack area fitting of UCAVs in the future battlefield. Simulation results show that the autonomy and environmental adaptability of UCAVs in the future battlefield will be improved based on the new DDPG algorithm and the training process converges quickly. We can obtain the optimal values of attack areas in real time during the whole flight with the well-trained deep network.展开更多
In this paper, a practical decoupling control scheme for fighter aircraft is proposed to achieve high angle of attack(AOA)tracking and super maneuver action by utilizing the thrust vector technology. Firstly, a six de...In this paper, a practical decoupling control scheme for fighter aircraft is proposed to achieve high angle of attack(AOA)tracking and super maneuver action by utilizing the thrust vector technology. Firstly, a six degree-of-freedom(DOF) nonlinear model with 12 variables is given. Due to low sufficiency of the aerodynamic actuators at high AOA, a thrust vector model with rotatable engine nozzles is derived. Secondly, the active disturbance rejection control(ADRC) is used to realize a three-channel decoupling control such that a strong coupling between different channels can be treated as total disturbance, which is estimated by the designed extended state observer. The control surface allocation is implemented by the traditional daisy chain method. Finally,the effectiveness of the presented control strategy is demonstrated by some numerical simulation results.展开更多
In order to obtain the determining method of the installing angle and decrease the performance indices (cutting force and wearing rate) of the pick, the relationships among the installing angles (impact angle, inclina...In order to obtain the determining method of the installing angle and decrease the performance indices (cutting force and wearing rate) of the pick, the relationships among the installing angles (impact angle, inclination angle and the skew angle) were studied, and the static model of installing angles of the pick was built. The relationships among the impact angle, the tip angle of pick and the kinematics parameters of the pick were built, too. Moreover, the mechanic models of the maximum clearance angle and the wearing angle of the pick were set up. To research the relationships of the installing angles and the change law of the wearing angle along with the kinematics parameters, the simulation was done. In order to verify the correctness of the models, the cutting experiments were done by employing two picks with different pick tip angles. The results indicate that, the cutting force is the smallest when the direction of the resultant force of pick follows its axis, and the relationship derived among the installing angles should be satisfied. In addition, to decrease the cutting force and the wearing of the pick, the tip angle of pick should not be larger than the half of the difference between the minimum wearing angle and the impact angle of the pick, and the clearance angle must not be less than zero.展开更多
Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. T...Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called AA hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed AM hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a genetic defense against the AM hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the AM hoe Flooding attack efficiently.展开更多
This paper considers the problem of generating a flight trajectory for a single fixed-wing unmanned combat aerial vehicle (UCAV) performing an air-to-surface multi-target attack (A/SMTA) mission using satellite-gu...This paper considers the problem of generating a flight trajectory for a single fixed-wing unmanned combat aerial vehicle (UCAV) performing an air-to-surface multi-target attack (A/SMTA) mission using satellite-guided bombs. First, this problem is formulated as a variant of the traveling salesman problem (TSP), called the dynamic-constrained TSP with neighborhoods (DCT- SPN). Then, a hierarchical hybrid approach, which partitions the planning algorithm into a roadmap planning layer and an optimal control layer, is proposed to solve the DCTSPN. In the roadmap planning layer, a novel algorithm based on an updatable proba- bilistic roadmap (PRM) is presented, which operates by randomly sampling a finite set of vehicle states from continuous state space in order to reduce the complicated trajectory planning problem to planning on a finite directed graph. In the optimal control layer, a collision-free state-to-state trajectory planner based on the Gauss pseudospectral method is developed, which can generate both dynamically feasible and optimal flight trajectories. The entire process of solving a DCTSPN consists of two phases. First, in the offline preprocessing phase, the algorithm constructs a PRM, and then converts the original problem into a standard asymmet- ric TSP (ATSP). Second, in the online querying phase, the costs of directed edges in PRM are updated first, and a fast heuristic searching algorithm is then used to solve the ATSP. Numerical experiments indicate that the algorithm proposed in this paper can generate both feasible and near-optimal solutions quickly for online purposes.展开更多
The aim of this paper is to investigate the effect of nitrite intercalated Mg-Al layered double hydroxides(Mg-Al LDH-NO_(2))on mortar durability under the coexisting environment of Cl−and SO_(4)^(2-).Cl−and SO_(4)^(2-...The aim of this paper is to investigate the effect of nitrite intercalated Mg-Al layered double hydroxides(Mg-Al LDH-NO_(2))on mortar durability under the coexisting environment of Cl−and SO_(4)^(2-).Cl−and SO_(4)^(2-) binding properties of Mg-Al LDH-NO_(2) in simulated concrete pore solutions,Cl−and SO_(4)^(2-) diffusion properties of mortars with Mg-Al LDHNO 2 were examined.The steel corrosion and resistance of mortar against SO_(4)^(2-) attack were also evaluated.The results indicate that Mg-Al LDH-NO_(2) can effectively adsorb the Cl−and SO_(4)^(2-) in simulated concrete pore solution,and inhibit the diffusion of Cl−and SO_(4)^(2-) into cement mortars.The presence of SO_(4)^(2-) can greatly affect the uptake amount of Cl−,and there is a coupled effect of Cl−and SO_(4)^(2-) on their penetration into mortar specimens.In addition,Mg-Al LDH-NO_(2) can greatly upgrade the resistance of mortars against SO_(4)^(2-) attack and well prevent the steel from corrosion.However,Cl−will aggravate the SO_(4)^(2-) attack and SO_(4)^(2-) can initially decrease and then increase the steel corrosion.展开更多
基金National Natural Science Foundation of China(62272147,12471492,62072161,12401687)Shandong Provincial Natural Science Foundation(ZR2024QA205)+1 种基金Science and Technology on Communication Security Laboratory Foundation(6142103012207)Innovation Group Project of the Natural Science Foundation of Hubei Province of China(2023AFA021)。
文摘Ballet is one of the finalists of the block cipher project in the 2019 National Cryptographic Algorithm Design Competition.This study aims to conduct a comprehensive security evaluation of Ballet from the perspective of differential-linear(DL)cryptanalysis.Specifically,we present an automated search for the DL distinguishers of Ballet based on MILP/MIQCP.For the versions with block sizes of 128 and 256 bits,we obtain 16 and 22 rounds distinguishers with estimated correlations of 2^(-59.89)and 2^(-116.80),both of which are the publicly longest distinguishers.In addition,this study incorporates the complexity information of key-recovery attacks into the automated model,to search for the optimal key-recovery attack structures based on DL distinguishers.As a result,we mount the key-recovery attacks on 16-round Ballet-128/128,17-round Ballet-128/256,and 21-round Ballet-256/256.The data/time complexities for these attacks are 2^(108.36)/2^(120.36),2^(115.90)/2^(192),and 2^(227.62)/2^(240.67),respectively.
文摘The Type-2 generalized Feistel structure is widely used in block cipher design.This work conducts a quantum key recovery attack on TWINE-80,a lightweight block cipher based on the improved Type-2 generalized Feistel structure.By constructing a round function,a new 7-round quantum distinguisher for TWINE-80 is identified.Leveraging the reuse characteristics of round keys in the algorithm,three pairs of repeated round keys are discovered during the 5-round transformation process.Using Grover’s algorithm to search for partial round keys,a 17-round quantum key recovery attack on TWINE-80 is successfully implemented,with a time complexity of 296 and requiring 327 qubits.Compared to similar studies,this work reduces the time complexity by 26 and slightly decreases the required quantum resources by 12 qubits.
基金supported by the Intelligent Aerospace System Leading Innovation Team Program of Zhejiang(2022R01003).
文摘In the realm of missile defense systems,the self-sufficient maneuver capacity of missile swarms is pivotal for their survival.Through the analysis of the missile dynamics model,a time-efficient cooperative attack strategy for missile swarm is proposed.Based on the distribution of the attackers and defenders,the collision avoidance against the defenders is considered during the attack process.By analyzing the geometric relationship between the relative velocity vector and relative position vector of the attackers and defenders,the collision avoidance constrains of attacking swarm are redefined.The key point is on adjusting the relative velocity vectors to fall outside the collision cone.This work facilitates high-precision attack toward the target while keeping safe missing distance between other attackers during collision avoidance process.By leveraging an innovative repulsion artificial function,a time-efficient cooperative attack strategy for missile swarm is obtained.Through rigorous simulation,the effectiveness of this cooperative attack strategy is substantiated.Furthermore,by employing Monte Carlo simulation,the success rate of the cooperative attack strategy is assessesed and the optimal configuration for the missile swarm is deduced.
基金National Natural Science Foundation of China(62373187)Forward-looking Layout Special Projects(ILA220591A22)。
文摘In the field of calculating the attack area of air-to-air missiles in modern air combat scenarios,the limitations of existing research,including real-time calculation,accuracy efficiency trade-off,and the absence of the three-dimensional attack area model,restrict their practical applications.To address these issues,an improved backtracking algorithm is proposed to improve calculation efficiency.A significant reduction in solution time and maintenance of accuracy in the three-dimensional attack area are achieved by using the proposed algorithm.Furthermore,the age-layered population structure genetic programming(ALPS-GP)algorithm is introduced to determine an analytical polynomial model of the three-dimensional attack area,considering real-time requirements.The accuracy of the polynomial model is enhanced through the coefficient correction using an improved gradient descent algorithm.The study reveals a remarkable combination of high accuracy and efficient real-time computation,with a mean error of 91.89 m using the analytical polynomial model of the three-dimensional attack area solved in just 10^(-4)s,thus meeting the requirements of real-time combat scenarios.
文摘A security issue with multi-sensor unmanned aerial vehicle(UAV)cyber physical systems(CPS)from the viewpoint of a false data injection(FDI)attacker is investigated in this paper.The FDI attacker can employ attacks on feedback and feed-forward channels simultaneously with limited resource.The attacker aims at degrading the UAV CPS's estimation performance to the max while keeping stealthiness characterized by the Kullback-Leibler(K-L)divergence.The attacker is resource limited which can only attack part of sensors,and the attacked sensor as well as specific forms of attack signals at each instant should be considered by the attacker.Also,the sensor selection principle is investigated with respect to time invariant attack covariances.Additionally,the optimal switching attack strategies in regard to time variant attack covariances are modeled as a multi-agent Markov decision process(MDP)with hybrid discrete-continuous action space.Then,the multi-agent MDP is solved by utilizing the deep Multi-agent parameterized Q-networks(MAPQN)method.Ultimately,a quadrotor near hover system is used to validate the effectiveness of the results in the simulation section.
基金supported by the National Natural Science Foundation of China(60373109)Ministry of Science and Technologyof China and the National Commercial Cryptography Application Technology Architecture and Application DemonstrationProject(2008BAA22B02).
文摘An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance.
基金Projects(51808563,51925808)supported by the National Natural Science Foundation of ChinaProject(KLWRTBMC18-03)supported by the Open Research Fund of the Key Laboratory of Wind Resistance Technology of Bridges of ChinaProject(2017YFB1201204)supported by the National Key R&D Program of China。
文摘In this study, experiments were carried out to investigate aerodynamic characteristics of a high-speed train on viaducts in turbulent crosswinds using a 1:25 scaled sectional model wind-tunnel testing. Pressure measurements of two typical sections, one train-head section and one train-body section, at the windward and leeward tracks were conducted under the smooth and turbulence flows with wind attack angles between-6° and 6°, and the corresponding aerodynamic force coefficients were also calculated using the integral method. The experimental results indicate that the track position affects the mean aerodynamic characteristics of the vehicle, especially for the train-body section. The fluctuating pressure coefficients at the leeward track are more significantly affected by the bridge interference compared to those at the windward track. The effect of turbulence on the train-head section is less than that on the train-body section. Additionally, the mean aerodynamic force coefficients are almost negatively correlated to wind attack angles, which is more prominent for vehicles at the leeward track. Moreover, the lateral force plays a critical role in determining the corresponding overturning moment, especially on the train-body section.
基金Project(2008G025-C) supported by the Ministry of Railway of ChinaProject(50708114) supported by the National Natural Science Foundation of China
文摘For the sake of understanding the deterioration behavior of concrete in actual railway tunnel structures subjected to aggressive sulfate medium in practice,detailed field investigations and tested analysis on sprayed concrete linings of approximately 40-year-old railway tunnels in environments containing sulfate ion were carried out,respectively.The results show that the deterioration of concretes in the investigated area is serious,which involves complicated physicochemical process between the sulfate salt and concrete.Among them,the secondary sulfateminerals such as gypsum formation under very high concentration sulfate ion condition by accumulating and evaporation process dominate,followed by the crystallization of sulfate salt and formation of thaumasite.
基金supported by the Aeronautical Science Foundation of China (20085584010)
文摘According to the characteristic of cruise missiles,navigation point setting is simplified,and the principle of route planning for saturation attack and a concept of reference route are put forward.With the help of the shortest-tangent idea in route-planning and the algorithm of back reasoning from targets,a reference route algorithm is built on the shortest range and threat avoidance.Then a route-flight-time algorithm is built on navigation points.Based on the conditions of multi-direction saturation attack,a route planning algorithm of multi-direction saturation attack is built on reference route,route-flight-time,and impact azimuth.Simulation results show that the algorithm can realize missiles fired in a salvo launch reaching the target simultaneously from different directions while avoiding threat.
文摘Knowledge of impact conditions is critical to evaluating the terminal impact performance of a projectile.For a small caliber bullet,in-flight velocity has been precisely measured for decades using detection screens,but accurately quantifying the orientation of the bullet on a target has been more challenging.This report introduces the Automated Small-Arms Photogrammetry(ASAP)analysis method used to measure,model,and predict the orientation of a small caliber bullet before reaching an impact surface.ASAP uses advanced hardware developed by Sydor Technologies to record a series of infrared digital photographs.Individual images(four orthogonal pairs)are processed using computer vision algorithms to quantify the orientation of the projectile and re-project its precise position and orientation into a three-dimensional muzzle-fixed coordinate system.An epicyclic motion model is fit to the measured data,and the epicyclic motion is extrapolated to the target location.Analysis results are fairly immediate and may be reviewed during testing.Prove-out demonstrations have shown that the impact-angle prediction capability is less than six hundredths of a degree for the 5.56 mm ball round tested.Keywords:Yaw,Terminal ballistics,Exterior ballistics,Test&evaluation,Computer vision,Image processing,Angle of
基金Project(51108463) supported by the National Natural Science Foundation of ChinaProject(11B041) supported by Scientific Research Fund of Hunan Provincial Education Department of ChinaProject(NCET-10-0839) supported by Ministry Education of China
文摘The railway tunnel concrete lining exposed to sulfate-bearing groundwater beyond 40 years in southwest of China was investigated. Field investigation, sulfate ions content and corroded products analysis, macro/microscopic test were carried out. Results show that under the tunnel concrete lining structure and its served environmental conditions, sulfate solutions permeate concrete lining and accumulate on windward-side of concrete lining, resulting in the increase of sulfate ions content on windward-side and the diffusion of sulfate ions from windward-side to waterward-side, which cause the concrete lining of windward-side damaged seriously but the waterward-side of concrete lining is still in perfect condition. It is confirmed that structural characteristic of tunnel and environmental conditions lead to physical attack with the leaching of concrete and sodium sulfate crystallization as well as chemical corrosion with formation of gypsum in high sulfate concentration and formation of thaumasite in proper temperature rather than formation of ettringite. These achievements can provide academic and technical supports for understanding the deterioration mechanism of concrete lining as well as constructing railway tunnel under sulfate attack.
基金supported by the National Natural Science Foundation of China(5137917651679201)
文摘This paper analyses the issue of impact time control of super-cavitation weapons impact fixed targets which mainly refer to the ships or submarines who lost power, but still have combat capability. Control over impact time constraints of guidance law(ITCG) is derived by using sliding mode control(SMC) and Lyapunov stability theorem. The expected impact time is realized by using the notion of attack process and estimated time-to-go to design sliding mode surface(SMS). ITCG contains equivalent and discontinuous guidance laws, once state variables arrive at SMS,the equivalent guidance law keeps the state variables on SMS,then the discontinuous guidance law enforces state variables to move and reach SMS. The singularity problem of ITCG is also analyzed. Theoretical analysis and numerical simulation results are given to test the effectiveness of ITCG designed in this paper.
基金supported by the Key Laboratory of Defense Science and Technology Foundation of Luoyang Electro-optical Equipment Research Institute(6142504200108)。
文摘The ever-changing battlefield environment requires the use of robust and adaptive technologies integrated into a reliable platform. Unmanned combat aerial vehicles(UCAVs) aim to integrate such advanced technologies while increasing the tactical capabilities of combat aircraft. As a research object, common UCAV uses the neural network fitting strategy to obtain values of attack areas. However, this simple strategy cannot cope with complex environmental changes and autonomously optimize decision-making problems. To solve the problem, this paper proposes a new deep deterministic policy gradient(DDPG) strategy based on deep reinforcement learning for the attack area fitting of UCAVs in the future battlefield. Simulation results show that the autonomy and environmental adaptability of UCAVs in the future battlefield will be improved based on the new DDPG algorithm and the training process converges quickly. We can obtain the optimal values of attack areas in real time during the whole flight with the well-trained deep network.
基金supported by the National Natural Science Foundation of China(61973175,61973172)。
文摘In this paper, a practical decoupling control scheme for fighter aircraft is proposed to achieve high angle of attack(AOA)tracking and super maneuver action by utilizing the thrust vector technology. Firstly, a six degree-of-freedom(DOF) nonlinear model with 12 variables is given. Due to low sufficiency of the aerodynamic actuators at high AOA, a thrust vector model with rotatable engine nozzles is derived. Secondly, the active disturbance rejection control(ADRC) is used to realize a three-channel decoupling control such that a strong coupling between different channels can be treated as total disturbance, which is estimated by the designed extended state observer. The control surface allocation is implemented by the traditional daisy chain method. Finally,the effectiveness of the presented control strategy is demonstrated by some numerical simulation results.
基金Project(51005232) supported by the National Natural Science Foundation of ChinaProject(20100481176) supported by the China Postdoctoral Science Foundation+1 种基金Project(201104583) supported by the China Postdoctoral Special FundProject(1101106c) supported by Jiangsu Postdoctoral Foundation, China
文摘In order to obtain the determining method of the installing angle and decrease the performance indices (cutting force and wearing rate) of the pick, the relationships among the installing angles (impact angle, inclination angle and the skew angle) were studied, and the static model of installing angles of the pick was built. The relationships among the impact angle, the tip angle of pick and the kinematics parameters of the pick were built, too. Moreover, the mechanic models of the maximum clearance angle and the wearing angle of the pick were set up. To research the relationships of the installing angles and the change law of the wearing angle along with the kinematics parameters, the simulation was done. In order to verify the correctness of the models, the cutting experiments were done by employing two picks with different pick tip angles. The results indicate that, the cutting force is the smallest when the direction of the resultant force of pick follows its axis, and the relationship derived among the installing angles should be satisfied. In addition, to decrease the cutting force and the wearing of the pick, the tip angle of pick should not be larger than the half of the difference between the minimum wearing angle and the impact angle of the pick, and the clearance angle must not be less than zero.
基金This project was supported by the National"863"High Technology Development Programof China (2003AA148010) Key Technologies R&D Programof China (2002DA103A03 -07)
文摘Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called AA hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed AM hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a genetic defense against the AM hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the AM hoe Flooding attack efficiently.
文摘This paper considers the problem of generating a flight trajectory for a single fixed-wing unmanned combat aerial vehicle (UCAV) performing an air-to-surface multi-target attack (A/SMTA) mission using satellite-guided bombs. First, this problem is formulated as a variant of the traveling salesman problem (TSP), called the dynamic-constrained TSP with neighborhoods (DCT- SPN). Then, a hierarchical hybrid approach, which partitions the planning algorithm into a roadmap planning layer and an optimal control layer, is proposed to solve the DCTSPN. In the roadmap planning layer, a novel algorithm based on an updatable proba- bilistic roadmap (PRM) is presented, which operates by randomly sampling a finite set of vehicle states from continuous state space in order to reduce the complicated trajectory planning problem to planning on a finite directed graph. In the optimal control layer, a collision-free state-to-state trajectory planner based on the Gauss pseudospectral method is developed, which can generate both dynamically feasible and optimal flight trajectories. The entire process of solving a DCTSPN consists of two phases. First, in the offline preprocessing phase, the algorithm constructs a PRM, and then converts the original problem into a standard asymmet- ric TSP (ATSP). Second, in the online querying phase, the costs of directed edges in PRM are updated first, and a fast heuristic searching algorithm is then used to solve the ATSP. Numerical experiments indicate that the algorithm proposed in this paper can generate both feasible and near-optimal solutions quickly for online purposes.
基金Project(51478164)supported by the National Natural Science Foundation of ChinaProject(BK20181306)supported by Natural Science Foundation of Jiangsu Province,China。
文摘The aim of this paper is to investigate the effect of nitrite intercalated Mg-Al layered double hydroxides(Mg-Al LDH-NO_(2))on mortar durability under the coexisting environment of Cl−and SO_(4)^(2-).Cl−and SO_(4)^(2-) binding properties of Mg-Al LDH-NO_(2) in simulated concrete pore solutions,Cl−and SO_(4)^(2-) diffusion properties of mortars with Mg-Al LDHNO 2 were examined.The steel corrosion and resistance of mortar against SO_(4)^(2-) attack were also evaluated.The results indicate that Mg-Al LDH-NO_(2) can effectively adsorb the Cl−and SO_(4)^(2-) in simulated concrete pore solution,and inhibit the diffusion of Cl−and SO_(4)^(2-) into cement mortars.The presence of SO_(4)^(2-) can greatly affect the uptake amount of Cl−,and there is a coupled effect of Cl−and SO_(4)^(2-) on their penetration into mortar specimens.In addition,Mg-Al LDH-NO_(2) can greatly upgrade the resistance of mortars against SO_(4)^(2-) attack and well prevent the steel from corrosion.However,Cl−will aggravate the SO_(4)^(2-) attack and SO_(4)^(2-) can initially decrease and then increase the steel corrosion.