In order to recognize the jamming pattern in anti-jamming, a novel fuzzy jamming recognition method based on statistic parameters of received signal’s power spectral density (PSD) is proposed. It exploits PSD’s shap...In order to recognize the jamming pattern in anti-jamming, a novel fuzzy jamming recognition method based on statistic parameters of received signal’s power spectral density (PSD) is proposed. It exploits PSD’s shape factor and skewness of received signal as classified characters of jamming pattern. After the mean center and variance of each jamming pattern are calculated by using some jamming samples, an exponential fuzzy membership function is used to calculate the membership value of the recognized sample. Finally, the jamming pattern of received signal is recognized by the maximum membership principle. The simulation results show that the proposed algorithm can recognize common eight jamming patterns accurately.展开更多
Threat-judgment is a complicated fuzzy inference problem. Up to now no relevant unified theory and measur-ing standard have been developed. It is very difficult to establish a threat-judgment model with high reliabili...Threat-judgment is a complicated fuzzy inference problem. Up to now no relevant unified theory and measur-ing standard have been developed. It is very difficult to establish a threat-judgment model with high reliability in the airdefense system for the naval warships. Air target threat level judgment is an important component in naval warship com-bat command decision-making systems. According to the threat level judgment of air targets during the air defense of sin-gle naval warship, a fuzzy pattern recognition model for judging the threat from air targets is established. Then an algo-rithm for identifying the parameters in the model is presented. The model has an adaptive feature and can dynamicallyupdate its parameters according to the state change of the attacking targets and the environment. The method presentedhere can be used for the air defense system threat judgment in the naval warships.展开更多
The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information ...The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain.展开更多
Based on rough similarity degree of rough sets and close degree of fuzzy sets, the definitions of rough similarity degree and rough close degree of rough fuzzy sets are given, which can be used to measure the similar ...Based on rough similarity degree of rough sets and close degree of fuzzy sets, the definitions of rough similarity degree and rough close degree of rough fuzzy sets are given, which can be used to measure the similar degree between two rough fuzzy sets. The properties and theorems are listed. Using the two new measures, the method of clustering in the rough fuzzy system can be obtained. After clustering, the new fuzzy sample can be recognized by the principle of maximal similarity degree.展开更多
This paper summarizes the research results dealing with washer and nut taxonomy and knowledge base design, making the use of fuzzy methodology. In particular, the theory of fuzzy membership functions, similarity matri...This paper summarizes the research results dealing with washer and nut taxonomy and knowledge base design, making the use of fuzzy methodology. In particular, the theory of fuzzy membership functions, similarity matrices, and the operation of fuzzy inference play important roles.A realistic set of 25 washers and nuts are employed to conduct extensive experiments and simulations.The investigation includes a complete demonstration of engineering design. The results obtained from this feasibility study are very encouraging indeed because they represent the lower bound with respect to performance, namely correctrecognition rate, of what fuzzy methodology can do. This lower bound shows high recognition rate even with noisy input patterns, robustness in terms of noise tolerance, and simplicity in hardware implementation. Possible future works are suggested in the conclusion.展开更多
基金Sponsored by National Nature Science Foundation of China ( 61072078)China Postdoctoral Science Foundation Funded Project ( 20090461426)Jiangsu Planned Projects for Postdoctoral Research Funds ( 0902039C)
文摘In order to recognize the jamming pattern in anti-jamming, a novel fuzzy jamming recognition method based on statistic parameters of received signal’s power spectral density (PSD) is proposed. It exploits PSD’s shape factor and skewness of received signal as classified characters of jamming pattern. After the mean center and variance of each jamming pattern are calculated by using some jamming samples, an exponential fuzzy membership function is used to calculate the membership value of the recognized sample. Finally, the jamming pattern of received signal is recognized by the maximum membership principle. The simulation results show that the proposed algorithm can recognize common eight jamming patterns accurately.
基金This project was supported by the National Defense Foundation of China(40108070103)
文摘Threat-judgment is a complicated fuzzy inference problem. Up to now no relevant unified theory and measur-ing standard have been developed. It is very difficult to establish a threat-judgment model with high reliability in the airdefense system for the naval warships. Air target threat level judgment is an important component in naval warship com-bat command decision-making systems. According to the threat level judgment of air targets during the air defense of sin-gle naval warship, a fuzzy pattern recognition model for judging the threat from air targets is established. Then an algo-rithm for identifying the parameters in the model is presented. The model has an adaptive feature and can dynamicallyupdate its parameters according to the state change of the attacking targets and the environment. The method presentedhere can be used for the air defense system threat judgment in the naval warships.
文摘The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain.
基金the Fujian Provincial Natural Science Foundation of China (Z0510492006J0391)
文摘Based on rough similarity degree of rough sets and close degree of fuzzy sets, the definitions of rough similarity degree and rough close degree of rough fuzzy sets are given, which can be used to measure the similar degree between two rough fuzzy sets. The properties and theorems are listed. Using the two new measures, the method of clustering in the rough fuzzy system can be obtained. After clustering, the new fuzzy sample can be recognized by the principle of maximal similarity degree.
文摘This paper summarizes the research results dealing with washer and nut taxonomy and knowledge base design, making the use of fuzzy methodology. In particular, the theory of fuzzy membership functions, similarity matrices, and the operation of fuzzy inference play important roles.A realistic set of 25 washers and nuts are employed to conduct extensive experiments and simulations.The investigation includes a complete demonstration of engineering design. The results obtained from this feasibility study are very encouraging indeed because they represent the lower bound with respect to performance, namely correctrecognition rate, of what fuzzy methodology can do. This lower bound shows high recognition rate even with noisy input patterns, robustness in terms of noise tolerance, and simplicity in hardware implementation. Possible future works are suggested in the conclusion.