A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented i...A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented in this study.CAP can serve as a guiding principle to assist designers in comprehending the distinct roles fulfilled by each component.The CAP proposal comprises four functional layers,organized in a suggested hierarchy of materials.Particularly notable is the inclusion of a ceramic-composite principle,representing an advanced and innovative solution in the field of armor design.This paper showcases real-world defense industry applications,offering case studies that demonstrate the effectiveness of this advanced approach.CAP represents a significant milestone in the history of passive protection,marking an evolutionary leap in the field.This philosophical approach provides designers with a powerful toolset with which to enhance the protection capabilities of military vehicles,making them more resilient and better equipped to meet the challenges of modern warfare.展开更多
Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection ag...Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection agents were designed, which have the distributed architecture,cooperate with the agents in intrusion detection in a loose-coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self-protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network-based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and cannot apperceive the existence of network-based intrusion detection system. The communication between every part is secure. In the low layer, the packet streams are controlled to avoid the buffer leaks exist ing in some system service process and back-door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively.展开更多
A cued search algorithm with uncertain detection performance is proposed for phased array radars. Firstly, a target search model based on the information gain criterion is presented with known detection performance, a...A cued search algorithm with uncertain detection performance is proposed for phased array radars. Firstly, a target search model based on the information gain criterion is presented with known detection performance, and the statistical characteristic of the detection probability is calculated by using the fluctuant model of the target radar cross section (RCS). Secondly, when the detection probability is completely unknown, its probability density function is modeled with a beta distribution, and its posterior probability distribution with the radar observation is derived based on the Bayesian theory. Finally simulation results show that the cued search algorithm with a known RCS fluctuant model can achieve the best performance, and the algorithm with the detection probability modeled as a beta distribution is better than that with a random selected detection probability because the model parameters can be updated by the radar observation to approach to the real value of the detection probability.展开更多
This paper presents an investigation on the effect of JPEG compression on the similarity between the target image and the background,where the similarity is further used to determine the degree of clutter in the image...This paper presents an investigation on the effect of JPEG compression on the similarity between the target image and the background,where the similarity is further used to determine the degree of clutter in the image.Four new clutter metrics based on image quality assessment are introduced,among which the Haar wavelet-based perceptual similarity index,known as HaarPSI,provides the best target acquisition prediction results.It is shown that the similarity between the target and the background at the boundary between visually lossless and visually lossy compression does not change significantly compared to the case when an uncompressed image is used.In future work,through subjective tests,it is necessary to check whether this presence of compression at the threshold of just noticeable differences will affect the human target acquisition performance.Similarity values are compared with the results of subjective tests of the well-known target Search_2 database,where the degree of agreement between objective and subjective scores,measured through linear correlation,reached a value of 90%.展开更多
The high resolution radar target detection is addressed in the non-Gaussian clutter. An adaptive detector is derived for range-spread target based on a novel covariance matrix estimator. It is proved that the new dete...The high resolution radar target detection is addressed in the non-Gaussian clutter. An adaptive detector is derived for range-spread target based on a novel covariance matrix estimator. It is proved that the new detector is constant false alarm rate (CFAR) to both of the clutter covariance matrix structure and power level theoretically for match cases. The simulation results show that the new detector is almost CFAR for mismatch cases, and it outperforms the existing adaptive detector based on the sample covariance matrix. It also shows that the detection performance improves, as the number of pulses, the number of secondary data or the clutter spike increases. In addition, the derived detector is robust to different subsets, estimated clutter group sizes and correlations of clutter. Importantly, the number of iterations for practical application is just one.展开更多
This paper is concerned with the H∞ fault detection for continuous-time linear switched systems with its application to turntable systems.The solvability condition for a desired filter is established based on the pro...This paper is concerned with the H∞ fault detection for continuous-time linear switched systems with its application to turntable systems.The solvability condition for a desired filter is established based on the proposed sufficient condition.Based on the double channel scheme of the turntable control system,the turntable system can be modeled as a switched system.Finally,by taking the turntable system as a numerical example,the effectiveness of the proposed theory is well validated.展开更多
This paper is investigating the use of composite armour reinforced by nanomaterials, for the protection of light armoured(LAV) and medium armoured military vehicles(MAV), and the interaction between the composite mate...This paper is investigating the use of composite armour reinforced by nanomaterials, for the protection of light armoured(LAV) and medium armoured military vehicles(MAV), and the interaction between the composite materials and high-performance ballistic projectiles. Four armour materials, consisted of front hybrid fibre reinforced polymer cover layer, ceramic strike-face, fibre reinforced polymer intermediate layer and the metal matrix composite reinforced backplate, were manufactured and assembled by adhesive technology. The proposed laminated protection system is suitable for armoured ground vehicles;however, it could be used as armour on ground, air and naval platforms. The design of the protection system, including material selection and thickness, was elaborated depending on the performance requirements of Level 4 + STANAG 4569 military standard(projectile 14.5 mm × 114 mm API B32) and especially on a design philosophy which is analysed with the specifications. The backplate of this new composite is a hybrid material of Metal Matrix Composite(MMC) reinforced with carbon nanotubes(CNTs), manufactured with the use of powder metallurgy technique. The composite backplate material was morphologically, mechanically and chemically analysed. Results show that all plates are presenting high mechanical properties and ballistic characteristics, compared to commonly used armour plates. Real military ballistic tests according to AEP-STANAG 4569 were carried out for the total composite armour systems. After the ballistic tests, AA2024-CNT3 showed the best protection results, compared with the other plates(AA2024-CNT1 and AA2024-CNT2), with the projectile being unable to fully penetrate the composite plate.展开更多
This paper introduces the research status and present situation of application of Pt/Ta composite anode materials for cathodic protection in China. It also introduces the corrosion resistance, bending properties and e...This paper introduces the research status and present situation of application of Pt/Ta composite anode materials for cathodic protection in China. It also introduces the corrosion resistance, bending properties and electrochemical performance in seawater and freshwater of the Pt/Ta composite anode materials for cathodic protection. It points out that compared with other platinum composite anodes, the Pt/Ta composite anode has the advantage of small volume, light weight, big drainage rate, long service life, it possesses superiority to be used in the confluence environment of sea water and fresh water and in the medium condition of resistivity changes at all times.展开更多
To mitigate the deleterious effects of clutter and jammer, modern radars have adopted adaptive processing techniques such as constant false alarm rate(CFAR) detectors which are widely used to prevent clutter and noise...To mitigate the deleterious effects of clutter and jammer, modern radars have adopted adaptive processing techniques such as constant false alarm rate(CFAR) detectors which are widely used to prevent clutter and noise interference from saturating the radar’s display and preventing targets from being obscured.This paper concerns with the detection analysis of the novel version of CFAR schemes(cell-averaging generalized trimmed-mean,CATM) in the presence of additional outlying targets other than the target under research. The spurious targets as well as the tested one are assumed to be fluctuating in accordance with the χ~2-model with two-degrees of freedom. In this situation, the processor performance is enclosed by the swerling models(SWI and SWII). Between these bounds, there is an important class of target fluctuation which is known as moderately fluctuating targets. The detection of this class has many practical applications. Structure of the CATM detector is described briefly. Detection performances for optimal, CAM, CA, trimmed-mean(TM) and ordered-statistic(OS) CFAR strategies have been analyzed and compared for desired probability of false alarm and determined size of the reference window. False alarm rate performance of these processors has been evaluated for different strengths of interfering signal and the effect of correlation among the target returns on the detection and false alarm performances has also been studied. Our numerical results show that, with a proper choice of trimming parameters,the novel model CAM presents an ideal detection performance outweighing that of the Neyman-Pearson detector on condition that the tested target obeys the SWII model in its fluctuation. Although the new models CAS and CAM can be treated as special cases of the CATM algorithm, their multi-target performance is modest even it has an enhancement relative to that of the classical CAcheme. Additionally, they fail to maintain the false alarm rate constant when the operating environment is of type target multiplicity. Moreover, the non-coherent integration of M pulses ameliorates the processor performance either it operates in homogeneous or multi-target environment.展开更多
Signal modulation is an essential design factor for proximity detectors and directly affects the system's potential performance.In order to achieve the advantages of chaotic codes bi-phase modulation(CCBPM)and lin...Signal modulation is an essential design factor for proximity detectors and directly affects the system's potential performance.In order to achieve the advantages of chaotic codes bi-phase modulation(CCBPM)and linear frequency modulation(LFM) simultaneously,this paper designed a waveform which combined chaotic codes bi-phase modulation and linear frequency modulation(CCBPM-LFM) for proximity detectors.The CCBPM-LFM waveform was analyzed in the aspect of time delay resolution(TDR) and Doppler tolerance(DT) based on ambiguity function(AF).Then,a ranging method,which we called instant correlation harmonic demodulation(ICHD),was presented for the detector using the CCBPM-LFM waveform.By combining time domain instant correlation with harmonic demodulation,the ICHD solved the problem caused by combination modulation and made the most of the linear frequency modulation(LFM) harmonics and the correlation of chaotic codes.Finally,a prototype was implemented and ranging experiments were carried out.From the theoretical analysis and experimental results,the proximity detector used the CCBPM-LFM waveform has an outstanding detection performance.展开更多
处于改建阶段的智能变电站采样模式复杂,继电保护装置难以发现采样回路轻微异常,导致回路隐患暴露时间严重滞后。针对上述问题,分析改建时期智能变电站的采样模式和二次设备配置情况,提出基于同源录波数据比对的继电保护采样回路异常检...处于改建阶段的智能变电站采样模式复杂,继电保护装置难以发现采样回路轻微异常,导致回路隐患暴露时间严重滞后。针对上述问题,分析改建时期智能变电站的采样模式和二次设备配置情况,提出基于同源录波数据比对的继电保护采样回路异常检测方法。首先,利用双向编码器表征(bidirectional encoder representations from transformers,BERT)语言模型与余弦相似度算法,实现同源录波数据的通道匹配。然后,利用重采样技术和曼哈顿距离完成波形的采样频率统一与时域对齐。最后,基于动态时间规整(dynamic time warping,DTW)算法提出改进算法,并结合采样点偏移量共同设置采样回路的异常判据。算例分析表明,该方法可以完成录波数据的同源通道匹配,实现波形的一致性对齐,并且相比于传统DTW算法,改进DTW算法对异常状态识别的灵敏性和准确性更高。根据异常判据能够有效检测继电保护采样回路的异常状态,确保了智能变电站的安全可靠运行。展开更多
基金co-financed by the European Regional Development Fund of the European UnionGreek national funds through the Operational Program Competitiveness,Entrepreneurship and Innovation,under the call RESEARCH-CREATE-INNOVATE(project code:T1EDK-04429)。
文摘A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented in this study.CAP can serve as a guiding principle to assist designers in comprehending the distinct roles fulfilled by each component.The CAP proposal comprises four functional layers,organized in a suggested hierarchy of materials.Particularly notable is the inclusion of a ceramic-composite principle,representing an advanced and innovative solution in the field of armor design.This paper showcases real-world defense industry applications,offering case studies that demonstrate the effectiveness of this advanced approach.CAP represents a significant milestone in the history of passive protection,marking an evolutionary leap in the field.This philosophical approach provides designers with a powerful toolset with which to enhance the protection capabilities of military vehicles,making them more resilient and better equipped to meet the challenges of modern warfare.
文摘Static secure techniques, such as firewall, hierarchy filtering, distributed disposing,layer management, autonomy agent, secure communication, were introduced in distributed intrusion detection. The self-protection agents were designed, which have the distributed architecture,cooperate with the agents in intrusion detection in a loose-coupled manner, protect the security of intrusion detection system, and respond to the intrusion actively. A prototype self-protection agent was implemented by using the packet filter in operation system kernel. The results show that all the hosts with the part of network-based intrusion detection system and the whole intrusion detection system are invisible from the outside and network scanning, and cannot apperceive the existence of network-based intrusion detection system. The communication between every part is secure. In the low layer, the packet streams are controlled to avoid the buffer leaks exist ing in some system service process and back-door programs, so as to prevent users from misusing and vicious attack like Trojan Horse effectively.
基金supported by the National Natural Science Foundation of China (61372165)the Postdoctoral Science Foundation of China (201150M15462012T50874)
文摘A cued search algorithm with uncertain detection performance is proposed for phased array radars. Firstly, a target search model based on the information gain criterion is presented with known detection performance, and the statistical characteristic of the detection probability is calculated by using the fluctuant model of the target radar cross section (RCS). Secondly, when the detection probability is completely unknown, its probability density function is modeled with a beta distribution, and its posterior probability distribution with the radar observation is derived based on the Bayesian theory. Finally simulation results show that the cued search algorithm with a known RCS fluctuant model can achieve the best performance, and the algorithm with the detection probability modeled as a beta distribution is better than that with a random selected detection probability because the model parameters can be updated by the radar observation to approach to the real value of the detection probability.
文摘This paper presents an investigation on the effect of JPEG compression on the similarity between the target image and the background,where the similarity is further used to determine the degree of clutter in the image.Four new clutter metrics based on image quality assessment are introduced,among which the Haar wavelet-based perceptual similarity index,known as HaarPSI,provides the best target acquisition prediction results.It is shown that the similarity between the target and the background at the boundary between visually lossless and visually lossy compression does not change significantly compared to the case when an uncompressed image is used.In future work,through subjective tests,it is necessary to check whether this presence of compression at the threshold of just noticeable differences will affect the human target acquisition performance.Similarity values are compared with the results of subjective tests of the well-known target Search_2 database,where the degree of agreement between objective and subjective scores,measured through linear correlation,reached a value of 90%.
基金supported by Program for New Century Excellent Talents in University (05-0912)the National Natural Science Foundation of China (60672140)the Scientific Research Foundation of Naval Aeronautical and Astronautical University for Young Scholars(HYQN201013)
文摘The high resolution radar target detection is addressed in the non-Gaussian clutter. An adaptive detector is derived for range-spread target based on a novel covariance matrix estimator. It is proved that the new detector is constant false alarm rate (CFAR) to both of the clutter covariance matrix structure and power level theoretically for match cases. The simulation results show that the new detector is almost CFAR for mismatch cases, and it outperforms the existing adaptive detector based on the sample covariance matrix. It also shows that the detection performance improves, as the number of pulses, the number of secondary data or the clutter spike increases. In addition, the derived detector is robust to different subsets, estimated clutter group sizes and correlations of clutter. Importantly, the number of iterations for practical application is just one.
基金supported by the National Natural Science Foundation of China(60804002)the Natural Science Foundation of Heilongjiang Province of China(QC2009C58)+1 种基金the Program for New Century Excellent Talents in Universitythe Chinese National Post-doctor Science Foundation(20090460892)
文摘This paper is concerned with the H∞ fault detection for continuous-time linear switched systems with its application to turntable systems.The solvability condition for a desired filter is established based on the proposed sufficient condition.Based on the double channel scheme of the turntable control system,the turntable system can be modeled as a switched system.Finally,by taking the turntable system as a numerical example,the effectiveness of the proposed theory is well validated.
基金the Research and Development department of EODH SA and has been co-financed by the European Regional Development Fund of the European Union and Greek national funds through the Operational Program Competitiveness,Entrepreneurship and Innovation,under the call RESEARCH-CREATE-INNOVATE(project code:T1EDK-04429).
文摘This paper is investigating the use of composite armour reinforced by nanomaterials, for the protection of light armoured(LAV) and medium armoured military vehicles(MAV), and the interaction between the composite materials and high-performance ballistic projectiles. Four armour materials, consisted of front hybrid fibre reinforced polymer cover layer, ceramic strike-face, fibre reinforced polymer intermediate layer and the metal matrix composite reinforced backplate, were manufactured and assembled by adhesive technology. The proposed laminated protection system is suitable for armoured ground vehicles;however, it could be used as armour on ground, air and naval platforms. The design of the protection system, including material selection and thickness, was elaborated depending on the performance requirements of Level 4 + STANAG 4569 military standard(projectile 14.5 mm × 114 mm API B32) and especially on a design philosophy which is analysed with the specifications. The backplate of this new composite is a hybrid material of Metal Matrix Composite(MMC) reinforced with carbon nanotubes(CNTs), manufactured with the use of powder metallurgy technique. The composite backplate material was morphologically, mechanically and chemically analysed. Results show that all plates are presenting high mechanical properties and ballistic characteristics, compared to commonly used armour plates. Real military ballistic tests according to AEP-STANAG 4569 were carried out for the total composite armour systems. After the ballistic tests, AA2024-CNT3 showed the best protection results, compared with the other plates(AA2024-CNT1 and AA2024-CNT2), with the projectile being unable to fully penetrate the composite plate.
文摘This paper introduces the research status and present situation of application of Pt/Ta composite anode materials for cathodic protection in China. It also introduces the corrosion resistance, bending properties and electrochemical performance in seawater and freshwater of the Pt/Ta composite anode materials for cathodic protection. It points out that compared with other platinum composite anodes, the Pt/Ta composite anode has the advantage of small volume, light weight, big drainage rate, long service life, it possesses superiority to be used in the confluence environment of sea water and fresh water and in the medium condition of resistivity changes at all times.
文摘To mitigate the deleterious effects of clutter and jammer, modern radars have adopted adaptive processing techniques such as constant false alarm rate(CFAR) detectors which are widely used to prevent clutter and noise interference from saturating the radar’s display and preventing targets from being obscured.This paper concerns with the detection analysis of the novel version of CFAR schemes(cell-averaging generalized trimmed-mean,CATM) in the presence of additional outlying targets other than the target under research. The spurious targets as well as the tested one are assumed to be fluctuating in accordance with the χ~2-model with two-degrees of freedom. In this situation, the processor performance is enclosed by the swerling models(SWI and SWII). Between these bounds, there is an important class of target fluctuation which is known as moderately fluctuating targets. The detection of this class has many practical applications. Structure of the CATM detector is described briefly. Detection performances for optimal, CAM, CA, trimmed-mean(TM) and ordered-statistic(OS) CFAR strategies have been analyzed and compared for desired probability of false alarm and determined size of the reference window. False alarm rate performance of these processors has been evaluated for different strengths of interfering signal and the effect of correlation among the target returns on the detection and false alarm performances has also been studied. Our numerical results show that, with a proper choice of trimming parameters,the novel model CAM presents an ideal detection performance outweighing that of the Neyman-Pearson detector on condition that the tested target obeys the SWII model in its fluctuation. Although the new models CAS and CAM can be treated as special cases of the CATM algorithm, their multi-target performance is modest even it has an enhancement relative to that of the classical CAcheme. Additionally, they fail to maintain the false alarm rate constant when the operating environment is of type target multiplicity. Moreover, the non-coherent integration of M pulses ameliorates the processor performance either it operates in homogeneous or multi-target environment.
基金supported by the State Key Program of Basic Research of China under Grant No.613196the National Natural Science Foundation of China under Grant No.61673066。
文摘Signal modulation is an essential design factor for proximity detectors and directly affects the system's potential performance.In order to achieve the advantages of chaotic codes bi-phase modulation(CCBPM)and linear frequency modulation(LFM) simultaneously,this paper designed a waveform which combined chaotic codes bi-phase modulation and linear frequency modulation(CCBPM-LFM) for proximity detectors.The CCBPM-LFM waveform was analyzed in the aspect of time delay resolution(TDR) and Doppler tolerance(DT) based on ambiguity function(AF).Then,a ranging method,which we called instant correlation harmonic demodulation(ICHD),was presented for the detector using the CCBPM-LFM waveform.By combining time domain instant correlation with harmonic demodulation,the ICHD solved the problem caused by combination modulation and made the most of the linear frequency modulation(LFM) harmonics and the correlation of chaotic codes.Finally,a prototype was implemented and ranging experiments were carried out.From the theoretical analysis and experimental results,the proximity detector used the CCBPM-LFM waveform has an outstanding detection performance.
文摘处于改建阶段的智能变电站采样模式复杂,继电保护装置难以发现采样回路轻微异常,导致回路隐患暴露时间严重滞后。针对上述问题,分析改建时期智能变电站的采样模式和二次设备配置情况,提出基于同源录波数据比对的继电保护采样回路异常检测方法。首先,利用双向编码器表征(bidirectional encoder representations from transformers,BERT)语言模型与余弦相似度算法,实现同源录波数据的通道匹配。然后,利用重采样技术和曼哈顿距离完成波形的采样频率统一与时域对齐。最后,基于动态时间规整(dynamic time warping,DTW)算法提出改进算法,并结合采样点偏移量共同设置采样回路的异常判据。算例分析表明,该方法可以完成录波数据的同源通道匹配,实现波形的一致性对齐,并且相比于传统DTW算法,改进DTW算法对异常状态识别的灵敏性和准确性更高。根据异常判据能够有效检测继电保护采样回路的异常状态,确保了智能变电站的安全可靠运行。