运用CitespaceⅡ信息可视化图谱软件对"cyberspace" or "cyber warfare"研究文献数据进行分析,绘制了共引网络图谱,并依据图谱中关键节点文献的知识基础,对研究热点及趋势进行了初步探讨,得出国外研究的热点与前沿...运用CitespaceⅡ信息可视化图谱软件对"cyberspace" or "cyber warfare"研究文献数据进行分析,绘制了共引网络图谱,并依据图谱中关键节点文献的知识基础,对研究热点及趋势进行了初步探讨,得出国外研究的热点与前沿的相关结论,对"cyberspace" or "cyber warfare"的研究具有一定的参考价值。展开更多
Electronic warfare is a modern combat mode,in which predicting digital material consumption is a key for material requirements planning(MRP).In this paper,we introduce an insensitive loss function(ε) and propose a ε...Electronic warfare is a modern combat mode,in which predicting digital material consumption is a key for material requirements planning(MRP).In this paper,we introduce an insensitive loss function(ε) and propose a ε-SVR-based prediction approach.First,we quantify values of influencing factors of digital equipments in electronic warfare and a small-sample data on real consumption to form a real combat data set,and preprocess it to construct the sample space.Subsequently,we establish the ε-SVR-based prediction model based on "wartime influencing factors-material consumption" and perform model training.In case study,we give 8 historical battle events with battle damage data and predict 3 representative kinds of digital materials by using the proposed approach.The results illustrate its higher accuracy and more convenience compared with other current approaches.Taking data acquisition controller prediction as an example,our model has better prediction performance(RMSE=0.575 7,MAPE(%)=12.037 6 and R^2=0.996 0) compared with BP neural network model(RMSE=1.272 9,MAPE(%)=23.577 5 and R^2=0.980 3) and GM(1,1) model(RMSE=2.095 0,MAPE(%)=24.188 0 and R^2=0.946 6).The fact shows that the approach can be used to support decision-making for MRP in electronic warfare.展开更多
Focused energy delivery(FED) is a technique that can precisely bring energy to the specific region,which arouses wide attention in precision electronic warfare(PREW).This paper first proposes a joint optimization mode...Focused energy delivery(FED) is a technique that can precisely bring energy to the specific region,which arouses wide attention in precision electronic warfare(PREW).This paper first proposes a joint optimization model with respect to the locations of the array and the transmitted signals to improve the performance of FED.As the problem is nonconvex and NP-hard,particle swarm optimization(PSO) is adopted to solve the locations of the array,while designing the transmitted signals under a feasible array is considered as a unimodular quadratic program(UQP) subproblem to calculate the fitness criterion of PSO.In the PSO-UQP framework established,two methods are presented for the UQP subproblem,which are more efficient and more accurate respectively than previous works.Furthermore,a threshold value is set in the framework to determine which method to adopt to take full advantages of the methods above.Meanwhile,we obtain the maximum localization error that FED can tolerate,which is significant for implementing FED in practice.Simulation results are provided to demonstrate the effectiveness of the joint optimization algorithm,and the correctness of the maximum localization error derived.展开更多
Transmit waveform optimization is critical to radar system performance. There have been a fruit of achievements about waveform design in recent years. However, most of the existing methods are based on the assumption ...Transmit waveform optimization is critical to radar system performance. There have been a fruit of achievements about waveform design in recent years. However, most of the existing methods are based on the assumption that radar is smart and the target is dumb, which is not always reasonable in the modern electronic warfare. This paper focuses on the waveform design for radar and the extended target in the environment of electronic warfare. Three different countermeasure models between smart radar and dumb target, smart target and dumb radar, smart radar and smart target are proposed. Taking the signal-to-interferenceplus-noise ratio(SINR) as the metric, optimized waveforms for the first two scenarios are achieved by the general water-filling method in the presence of clutter. For the last case, the equilibrium between smart radar and smart target in the presence of clutter is given mathematically and the optimized solution is achieved through a novel two-step water-filling method on the basis of minmax theory. Simulation results under different power constraints show the power allocation strategies of radar and target and the output SINRs are analyzed.展开更多
The paper presents the possibilities of,and methods for,acquiring,analysing and processing optical signals in order to recognise,identify and counteract threats on the contemporary battleground.The main ways electroni...The paper presents the possibilities of,and methods for,acquiring,analysing and processing optical signals in order to recognise,identify and counteract threats on the contemporary battleground.The main ways electronic warfare is waged in the optical band of the electromagnetic wave spectrum have been formulated,including the acquisition of optical emitter signatures,as well as ultraviolet(UV)and thermal(IR)signatures.The physical parameters and values describing the emission of laser radiation are discussed,including their importance in terms of creating optical signatures.Moreover,it has been shown that in the transformation of optical signals into signatures,only their spectral and temporal parameters can be applied.This was confirmed in experimental part of the paper,which includes our own measurements of spectral and temporal emission characteristics for three types of binocular laser rangefinders.It has been further shown that through simple registration and quick analysis involving comparison of emission time parameters in the case of UV signatures in“solar-blind”band,various events can be identified quickly and faultlessly.The same is true for IR signatures,where the amplitudes of the recorded signal for several wavelengths are compared.This was confirmed experimentally for UV signatures by registering and then analyzing signals from several events during military exercises at a training ground,namely Rocket Propelled Grenade(RPG)launches and explosions after hitting targets,trinitrotoluene(TNT)explosions,firing armour-piercing,fin-stabilised,discarding sabots(APFSDS)or high explosive(HE)projectiles.The final section describes a proposed model database of emitters,created as a result of analysing and transforming the recorded signals into optical signatures.展开更多
NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward,which is a four levels system including the user ...NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward,which is a four levels system including the user level, the application level, the grid middleware layer and the resource level. In grid middleware layer,based on virtual hosting environment, a BEPL4WS grid service composition method is introduced. In addition, the NCW grid service model is built with the help of Eclipse-SDK-3.0.1 and Bpws4j.展开更多
An underwater acoustic warfare simulation system (UAWSS) with a structure of high level architecture (HLA) is studied based upon a previous research project. With the experience and lessons learned, some new concepts ...An underwater acoustic warfare simulation system (UAWSS) with a structure of high level architecture (HLA) is studied based upon a previous research project. With the experience and lessons learned, some new concepts are adopted in the implementation of UAWSS according to the essence of simulation and the objective of the system, among which are simulation synthetic environment, signal processing at other simulation nodes, decomposition of underwater sound channel, channel varying law and rules on system and parts evaluation, etc. Applications of these new ideas show that they are effective.展开更多
Cognitive bias,stemming from electronic measurement error and variability in human perception,exists in cognitive electronic warfare and affects the outcomes of conflicts.In this paper,the dynamic game approach is emp...Cognitive bias,stemming from electronic measurement error and variability in human perception,exists in cognitive electronic warfare and affects the outcomes of conflicts.In this paper,the dynamic game approach is employed to develop a model for cognitive bias induced by incomplete information and measurement errors in cognitive radar countermeasures.The payoffs for both parties are calculated using the radar's anti-jamming strategy matrix A and the jammer's jamming strategy matrix B.With perfect Bayesian equilibrium,a dynamic radar countermeasure model is established,and the impact of cognitive bias is analyzed.Drawing inspiration from the cognitive bias analysis method used in stock market trading,a cognitive bias model for cognitive radar countermeasures is introduced,and its correctness is mathematically proved.A gaming scenario involving the AN/SPY-1 radar and a smart jammer is set up to analyze the influence of cognitive bias on game outcomes.Simulation results validate the effectiveness of the proposed method.展开更多
Chemical warfare agents(CWAs)are extremely lethal substances used in warfare and terrorism,capable of causing permanent damage even in small doses,despite medical intervention.Therefore,detection,protection,and detoxi...Chemical warfare agents(CWAs)are extremely lethal substances used in warfare and terrorism,capable of causing permanent damage even in small doses,despite medical intervention.Therefore,detection,protection,and detoxification of CWAs are vital for the safety of first responders,military personnel,and civilians,driving significant research in this area.Herein,we designed and synthesized a poly(-diallyldimethylammonium chloride)(PDDA)mediated cupric oxide(CuO)functionalized activated carbon fabric(ACF),termed ACF@PDDA-CuO,as an adsorbent filter material for self-detoxifying chemical protective clothing.PDDA,a positively charged polyelectrolyte,effectively binds in-situ synthesized CuO to the negatively charged ACF surface,serving as a suitable binder.This study demonstrates the synergistic effects of PDDA-CuO functionalization on ACF,where PDDA treatment enhanced mechanical and comfort properties,and CuO crystal growth significantly improved detoxification efficacy against the CWA Nerve Agent Sarin.Comprehensive analyses,including FTIR,BET surface area analysis,SEM,EDS,TEM,STEM,TGA,XPS,and XRD,confirmed the uniform deposition of CuO and PDDA on the ACF surface.The Cu content on ACF@PDDA-CuO samples was measured via iodometric titration.The materials were evaluated for tensile strength,air permeability,water vapor permeability,nerve agent(Sarin)detoxification,and blister agent(Sulfur Mustard)breakthrough time to assess their applicability for protective clothing.The optimized PDDA-CuO on ACF detoxified 82.04%of Sarin within 18 h,compared to 25.22%by ACF alone,and enhanced tensile strength by 23.67%,air permeability by 24.63%,and water vapor permeability by 3.94%,while maintaining protection against Sulfur Mustard for 24 h.These findings indicate that ACF@PDDA-CuO is a promising candidate for CWA protective clothing,offering robust protection with enhanced comfort.展开更多
Tolerance sensitivity limits the practical application of the cross-eye jammer.Previous literature has demonstrated that retrodirective cross-eye jamming with multiple antenna elements possesses the advantage of loose...Tolerance sensitivity limits the practical application of the cross-eye jammer.Previous literature has demonstrated that retrodirective cross-eye jamming with multiple antenna elements possesses the advantage of loose tolerance requirements compared to traditional cross-eye jamming.However,the previous analysis was limited,because there are still some factors affecting the parameter tolerance of the multiple-element retrodirective cross-eye jamming(MRCJ)system and they have not been investigated completely,such as the loop difference,the baseline ratio and the jammer-to-signal ratio.This paper performs a comprehensive tolerance analysis of the MRCJ system with a nonuniformspacing linear array.Simulation results demonstrate the tolerance effects of the above influence factors and give reasonable advice for easing tolerance sensitivity.展开更多
The total cross-eye gain of multiple-element retrodirective cross-eye jamming(MRCJ) in the presence of the platform skin return is a distribution rather than a constant value, due to the random variation in the phase ...The total cross-eye gain of multiple-element retrodirective cross-eye jamming(MRCJ) in the presence of the platform skin return is a distribution rather than a constant value, due to the random variation in the phase of the skin return. Although the median value of the total cross-eye gain distribution had been analyzed in previous studies, the extreme values providing useful indications of the upper and lower bounds of the total cross-eye gain have not been analyzed until now. In this paper, the cumulative distribution function and the extreme values of the total cross-eye gain of MRCJ are derived. The angular error induced in threat monopulse radar as a figure of merit is used to analyze the performance of MRCJ system. Simulation results demonstrate the variation of the angular error and discuss the proper value of jamming-to-signal ratio(JSR) making the MRCJ system more effective in consideration of the whole distribution of the total cross-eye gain.展开更多
A joint two-dimensional(2D)direction-of-arrival(DOA)and radial Doppler frequency estimation method for the L-shaped array is proposed in this paper based on the compressive sensing(CS)framework.Revised from the conven...A joint two-dimensional(2D)direction-of-arrival(DOA)and radial Doppler frequency estimation method for the L-shaped array is proposed in this paper based on the compressive sensing(CS)framework.Revised from the conventional CS-based methods where the joint spatial-temporal parameters are characterized in one large scale matrix,three smaller scale matrices with independent azimuth,elevation and Doppler frequency are introduced adopting a separable observation model.Afterwards,the estimation is achieved by L1-norm minimization and the Bayesian CS algorithm.In addition,under the L-shaped array topology,the azimuth and elevation are separated yet coupled to the same radial Doppler frequency.Hence,the pair matching problem is solved with the aid of the radial Doppler frequency.Finally,numerical simulations corroborate the feasibility and validity of the proposed algorithm.展开更多
Monopulse radar is widely used in military.Jamming monopulse radar has always been a research hotspot in electronic warfare(EW).Cross-eye jamming has always been considered as the most effective measures to jam with m...Monopulse radar is widely used in military.Jamming monopulse radar has always been a research hotspot in electronic warfare(EW).Cross-eye jamming has always been considered as the most effective measures to jam with monopulse radar.In this paper, we propose a multi-group three-tuple crosseye jamming structure where each group contains three antenna elements with a definite phase and an amplitude relationship.Then, based on the principle of monopulse angle measurement, the error angle is deduced theoretically.Simulations show that such a multi-group three-tuple cross-eye jamming structure performs better than the multi-element cross-eye jamming structure previously proposed, and the analysis of the centroid shows that the centroid of the structure proposed in this paper is more widely distributed in space.展开更多
To address the problem of the weak anti-noise and macro-trend extraction abilities of the current methods for identifying radar antenna scan type,a recognition method for radar antenna scan types based on limited pene...To address the problem of the weak anti-noise and macro-trend extraction abilities of the current methods for identifying radar antenna scan type,a recognition method for radar antenna scan types based on limited penetrable visibility graph(LPVG)is proposed.Firstly,seven types of radar antenna scans are analyzed,which include the circular scan,sector scan,helical scan,raster scan,conical scan,electromechanical hybrid scan and two-dimensional electronic scan.Then,the time series of the pulse amplitude in the radar reconnaissance receiver is converted into an LPVG network,and the feature parameters are extracted.Finally,the recognition result is obtained by using a support vector machine(SVM)classifier.The experimental results show that the recognition accuracy and noise resistance of this new method are improved,where the average recognition accuracy for radar antenna type is at least 90%when the signalto-noise ratio(SNR)is 5 dB and above.展开更多
Operation architecture plays a more important role in Network Centric Warfare(NGAV),which involves dynamic operation networks with complex properties.Thus,it is essential to investigate the operation architecture unde...Operation architecture plays a more important role in Network Centric Warfare(NGAV),which involves dynamic operation networks with complex properties.Thus,it is essential to investigate the operation architecture under the informatization condition within NCAW and find a proper network construction method to efficiently coordinate various functional modules on a particular situation,i.e.,the aerial combat.A new method integrating the physical level and functional level of NCW is proposed to establish the operation architecture,where the concept of network operation constraints unit and net constructing mechanisms are employed to avoid conflicts among different platforms.Meanwhile,we conduct simulations to assess the effectiveness and feasibility of the constructed operation architecture and analyze the influence of the network parameters.展开更多
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under s...Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical e military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical e military experts.Both the design and the results of the evaluation are revealed in this article.展开更多
The article presents problems related to mechanical protection of vehicles with different add-on armours against chemical,biological and radiological contamination.This applies to vehicles with additional passive,reac...The article presents problems related to mechanical protection of vehicles with different add-on armours against chemical,biological and radiological contamination.This applies to vehicles with additional passive,reactive and hybrid protection in the form of cassettes against piercing with anti-tank projectiles,piercing with their kinetic energy of impact,and as a result of chemical energy of shaped charges as well as explosively formed projectiles.It has been shown how increased ballistic protection of these vehicles at the same time reduces their decontaminability in various places of the vehicle due to the increased additional surface of the vehicle with cassettes.Prevention of contamination of these cassettes has been presented as a way of reducing hard to reach surface for decontamination and a method of insulating construction elements(stands),fixing these cassettes to the vehicle,from the environment to prevent contact with contaminated liquids and dusts.The selection of appropriate materials is shown,which may affect the improvement of the decontamination efficiency of the vehicle with such cassettes.This applies to the use of materials with low absorption of chemical warfare agents,which prevent the accumulation of large amounts of these agents on contaminated surfaces and improve the effectiveness of decontamination.It also shows how to ensure better access of the disinfectant to as much of the vehicle surface as possible,covered with cassettes that have been contaminated.It shows how a vehicle,in particular with such cassettes,can provide protection against radar detection when Radar Absorbent Material is used on vehicle cassettes.展开更多
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e...The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.展开更多
In the state estimation of passive tracking systems, the traditional approximate expression for the Cramero-Rao lower bound (CRLB) does not take two factors into consideration, that is, measurement origin uncertaint...In the state estimation of passive tracking systems, the traditional approximate expression for the Cramero-Rao lower bound (CRLB) does not take two factors into consideration, that is, measurement origin uncertainty aad state noise. Such treatment is only valid in ideal situation but it is not feasible in actual situation. In this article, considering the two factors, the posterior Cramer-Rao lower bound (PCRLB) recursion expression for the error of bearing-only tracking is derived. Then, further analysis is carried out on the PCRLB. According to the final result, there are four main parameters that play a role in the performance of the PCRLB, that is, measurement noise, detection probability, state noise and clutter density, amongst which the first two have greater impact on the performance of the PCRLB than the others.展开更多
文摘运用CitespaceⅡ信息可视化图谱软件对"cyberspace" or "cyber warfare"研究文献数据进行分析,绘制了共引网络图谱,并依据图谱中关键节点文献的知识基础,对研究热点及趋势进行了初步探讨,得出国外研究的热点与前沿的相关结论,对"cyberspace" or "cyber warfare"的研究具有一定的参考价值。
基金funded by National Natural Science Foundation of China(grant number 61473311,70901075)Natural Science Foundation of Beijing Municipality(grant number 9142017)military projects funded by the Chinese Army。
文摘Electronic warfare is a modern combat mode,in which predicting digital material consumption is a key for material requirements planning(MRP).In this paper,we introduce an insensitive loss function(ε) and propose a ε-SVR-based prediction approach.First,we quantify values of influencing factors of digital equipments in electronic warfare and a small-sample data on real consumption to form a real combat data set,and preprocess it to construct the sample space.Subsequently,we establish the ε-SVR-based prediction model based on "wartime influencing factors-material consumption" and perform model training.In case study,we give 8 historical battle events with battle damage data and predict 3 representative kinds of digital materials by using the proposed approach.The results illustrate its higher accuracy and more convenience compared with other current approaches.Taking data acquisition controller prediction as an example,our model has better prediction performance(RMSE=0.575 7,MAPE(%)=12.037 6 and R^2=0.996 0) compared with BP neural network model(RMSE=1.272 9,MAPE(%)=23.577 5 and R^2=0.980 3) and GM(1,1) model(RMSE=2.095 0,MAPE(%)=24.188 0 and R^2=0.946 6).The fact shows that the approach can be used to support decision-making for MRP in electronic warfare.
基金Anhui Provincial Natural Science Foundation(Project for Youth:1908085QF252)Research Program of National University of Defense Technology(ZK19-10)。
文摘Focused energy delivery(FED) is a technique that can precisely bring energy to the specific region,which arouses wide attention in precision electronic warfare(PREW).This paper first proposes a joint optimization model with respect to the locations of the array and the transmitted signals to improve the performance of FED.As the problem is nonconvex and NP-hard,particle swarm optimization(PSO) is adopted to solve the locations of the array,while designing the transmitted signals under a feasible array is considered as a unimodular quadratic program(UQP) subproblem to calculate the fitness criterion of PSO.In the PSO-UQP framework established,two methods are presented for the UQP subproblem,which are more efficient and more accurate respectively than previous works.Furthermore,a threshold value is set in the framework to determine which method to adopt to take full advantages of the methods above.Meanwhile,we obtain the maximum localization error that FED can tolerate,which is significant for implementing FED in practice.Simulation results are provided to demonstrate the effectiveness of the joint optimization algorithm,and the correctness of the maximum localization error derived.
基金supported by the National Natural Science Foundation of China(61302153)the Aeronautical Science Foundation of China(20160196001)
文摘Transmit waveform optimization is critical to radar system performance. There have been a fruit of achievements about waveform design in recent years. However, most of the existing methods are based on the assumption that radar is smart and the target is dumb, which is not always reasonable in the modern electronic warfare. This paper focuses on the waveform design for radar and the extended target in the environment of electronic warfare. Three different countermeasure models between smart radar and dumb target, smart target and dumb radar, smart radar and smart target are proposed. Taking the signal-to-interferenceplus-noise ratio(SINR) as the metric, optimized waveforms for the first two scenarios are achieved by the general water-filling method in the presence of clutter. For the last case, the equilibrium between smart radar and smart target in the presence of clutter is given mathematically and the optimized solution is achieved through a novel two-step water-filling method on the basis of minmax theory. Simulation results under different power constraints show the power allocation strategies of radar and target and the output SINRs are analyzed.
基金the National Center for Research and Development in Poland for grant No.DOB-1-6/1/PS/2014:“Laser Systems for Directed Energy Weapon,Laser Systems for Non-LethalWeapon”,which provided a proportion of the funds needed to conduct this research.
文摘The paper presents the possibilities of,and methods for,acquiring,analysing and processing optical signals in order to recognise,identify and counteract threats on the contemporary battleground.The main ways electronic warfare is waged in the optical band of the electromagnetic wave spectrum have been formulated,including the acquisition of optical emitter signatures,as well as ultraviolet(UV)and thermal(IR)signatures.The physical parameters and values describing the emission of laser radiation are discussed,including their importance in terms of creating optical signatures.Moreover,it has been shown that in the transformation of optical signals into signatures,only their spectral and temporal parameters can be applied.This was confirmed in experimental part of the paper,which includes our own measurements of spectral and temporal emission characteristics for three types of binocular laser rangefinders.It has been further shown that through simple registration and quick analysis involving comparison of emission time parameters in the case of UV signatures in“solar-blind”band,various events can be identified quickly and faultlessly.The same is true for IR signatures,where the amplitudes of the recorded signal for several wavelengths are compared.This was confirmed experimentally for UV signatures by registering and then analyzing signals from several events during military exercises at a training ground,namely Rocket Propelled Grenade(RPG)launches and explosions after hitting targets,trinitrotoluene(TNT)explosions,firing armour-piercing,fin-stabilised,discarding sabots(APFSDS)or high explosive(HE)projectiles.The final section describes a proposed model database of emitters,created as a result of analysing and transforming the recorded signals into optical signatures.
文摘NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward,which is a four levels system including the user level, the application level, the grid middleware layer and the resource level. In grid middleware layer,based on virtual hosting environment, a BEPL4WS grid service composition method is introduced. In addition, the NCW grid service model is built with the help of Eclipse-SDK-3.0.1 and Bpws4j.
文摘An underwater acoustic warfare simulation system (UAWSS) with a structure of high level architecture (HLA) is studied based upon a previous research project. With the experience and lessons learned, some new concepts are adopted in the implementation of UAWSS according to the essence of simulation and the objective of the system, among which are simulation synthetic environment, signal processing at other simulation nodes, decomposition of underwater sound channel, channel varying law and rules on system and parts evaluation, etc. Applications of these new ideas show that they are effective.
文摘Cognitive bias,stemming from electronic measurement error and variability in human perception,exists in cognitive electronic warfare and affects the outcomes of conflicts.In this paper,the dynamic game approach is employed to develop a model for cognitive bias induced by incomplete information and measurement errors in cognitive radar countermeasures.The payoffs for both parties are calculated using the radar's anti-jamming strategy matrix A and the jammer's jamming strategy matrix B.With perfect Bayesian equilibrium,a dynamic radar countermeasure model is established,and the impact of cognitive bias is analyzed.Drawing inspiration from the cognitive bias analysis method used in stock market trading,a cognitive bias model for cognitive radar countermeasures is introduced,and its correctness is mathematically proved.A gaming scenario involving the AN/SPY-1 radar and a smart jammer is set up to analyze the influence of cognitive bias on game outcomes.Simulation results validate the effectiveness of the proposed method.
基金Defence Research and Development Establishment(DRDE),DRDO,Gwalior-474002,(India)for his keen interestencouragement.The DRDE accession number for this manuscript is DRDE-IREC-130-28/03/2024.
文摘Chemical warfare agents(CWAs)are extremely lethal substances used in warfare and terrorism,capable of causing permanent damage even in small doses,despite medical intervention.Therefore,detection,protection,and detoxification of CWAs are vital for the safety of first responders,military personnel,and civilians,driving significant research in this area.Herein,we designed and synthesized a poly(-diallyldimethylammonium chloride)(PDDA)mediated cupric oxide(CuO)functionalized activated carbon fabric(ACF),termed ACF@PDDA-CuO,as an adsorbent filter material for self-detoxifying chemical protective clothing.PDDA,a positively charged polyelectrolyte,effectively binds in-situ synthesized CuO to the negatively charged ACF surface,serving as a suitable binder.This study demonstrates the synergistic effects of PDDA-CuO functionalization on ACF,where PDDA treatment enhanced mechanical and comfort properties,and CuO crystal growth significantly improved detoxification efficacy against the CWA Nerve Agent Sarin.Comprehensive analyses,including FTIR,BET surface area analysis,SEM,EDS,TEM,STEM,TGA,XPS,and XRD,confirmed the uniform deposition of CuO and PDDA on the ACF surface.The Cu content on ACF@PDDA-CuO samples was measured via iodometric titration.The materials were evaluated for tensile strength,air permeability,water vapor permeability,nerve agent(Sarin)detoxification,and blister agent(Sulfur Mustard)breakthrough time to assess their applicability for protective clothing.The optimized PDDA-CuO on ACF detoxified 82.04%of Sarin within 18 h,compared to 25.22%by ACF alone,and enhanced tensile strength by 23.67%,air permeability by 24.63%,and water vapor permeability by 3.94%,while maintaining protection against Sulfur Mustard for 24 h.These findings indicate that ACF@PDDA-CuO is a promising candidate for CWA protective clothing,offering robust protection with enhanced comfort.
基金the National Natural Science Foundation of China(61801488,61921001,61601008).
文摘Tolerance sensitivity limits the practical application of the cross-eye jammer.Previous literature has demonstrated that retrodirective cross-eye jamming with multiple antenna elements possesses the advantage of loose tolerance requirements compared to traditional cross-eye jamming.However,the previous analysis was limited,because there are still some factors affecting the parameter tolerance of the multiple-element retrodirective cross-eye jamming(MRCJ)system and they have not been investigated completely,such as the loop difference,the baseline ratio and the jammer-to-signal ratio.This paper performs a comprehensive tolerance analysis of the MRCJ system with a nonuniformspacing linear array.Simulation results demonstrate the tolerance effects of the above influence factors and give reasonable advice for easing tolerance sensitivity.
基金supported by the Weapons and Equipment Research Foundation of China(304070102)
文摘The total cross-eye gain of multiple-element retrodirective cross-eye jamming(MRCJ) in the presence of the platform skin return is a distribution rather than a constant value, due to the random variation in the phase of the skin return. Although the median value of the total cross-eye gain distribution had been analyzed in previous studies, the extreme values providing useful indications of the upper and lower bounds of the total cross-eye gain have not been analyzed until now. In this paper, the cumulative distribution function and the extreme values of the total cross-eye gain of MRCJ are derived. The angular error induced in threat monopulse radar as a figure of merit is used to analyze the performance of MRCJ system. Simulation results demonstrate the variation of the angular error and discuss the proper value of jamming-to-signal ratio(JSR) making the MRCJ system more effective in consideration of the whole distribution of the total cross-eye gain.
文摘A joint two-dimensional(2D)direction-of-arrival(DOA)and radial Doppler frequency estimation method for the L-shaped array is proposed in this paper based on the compressive sensing(CS)framework.Revised from the conventional CS-based methods where the joint spatial-temporal parameters are characterized in one large scale matrix,three smaller scale matrices with independent azimuth,elevation and Doppler frequency are introduced adopting a separable observation model.Afterwards,the estimation is achieved by L1-norm minimization and the Bayesian CS algorithm.In addition,under the L-shaped array topology,the azimuth and elevation are separated yet coupled to the same radial Doppler frequency.Hence,the pair matching problem is solved with the aid of the radial Doppler frequency.Finally,numerical simulations corroborate the feasibility and validity of the proposed algorithm.
文摘Monopulse radar is widely used in military.Jamming monopulse radar has always been a research hotspot in electronic warfare(EW).Cross-eye jamming has always been considered as the most effective measures to jam with monopulse radar.In this paper, we propose a multi-group three-tuple crosseye jamming structure where each group contains three antenna elements with a definite phase and an amplitude relationship.Then, based on the principle of monopulse angle measurement, the error angle is deduced theoretically.Simulations show that such a multi-group three-tuple cross-eye jamming structure performs better than the multi-element cross-eye jamming structure previously proposed, and the analysis of the centroid shows that the centroid of the structure proposed in this paper is more widely distributed in space.
基金supported by the China Postdoctoral Science Foundation(2015M572694,2016T90979).
文摘To address the problem of the weak anti-noise and macro-trend extraction abilities of the current methods for identifying radar antenna scan type,a recognition method for radar antenna scan types based on limited penetrable visibility graph(LPVG)is proposed.Firstly,seven types of radar antenna scans are analyzed,which include the circular scan,sector scan,helical scan,raster scan,conical scan,electromechanical hybrid scan and two-dimensional electronic scan.Then,the time series of the pulse amplitude in the radar reconnaissance receiver is converted into an LPVG network,and the feature parameters are extracted.Finally,the recognition result is obtained by using a support vector machine(SVM)classifier.The experimental results show that the recognition accuracy and noise resistance of this new method are improved,where the average recognition accuracy for radar antenna type is at least 90%when the signalto-noise ratio(SNR)is 5 dB and above.
基金fully supported by a grant from the National Natural Science Foundation of China(No.61472443)。
文摘Operation architecture plays a more important role in Network Centric Warfare(NGAV),which involves dynamic operation networks with complex properties.Thus,it is essential to investigate the operation architecture under the informatization condition within NCAW and find a proper network construction method to efficiently coordinate various functional modules on a particular situation,i.e.,the aerial combat.A new method integrating the physical level and functional level of NCW is proposed to establish the operation architecture,where the concept of network operation constraints unit and net constructing mechanisms are employed to avoid conflicts among different platforms.Meanwhile,we conduct simulations to assess the effectiveness and feasibility of the constructed operation architecture and analyze the influence of the network parameters.
文摘Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical e military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical e military experts.Both the design and the results of the evaluation are revealed in this article.
文摘The article presents problems related to mechanical protection of vehicles with different add-on armours against chemical,biological and radiological contamination.This applies to vehicles with additional passive,reactive and hybrid protection in the form of cassettes against piercing with anti-tank projectiles,piercing with their kinetic energy of impact,and as a result of chemical energy of shaped charges as well as explosively formed projectiles.It has been shown how increased ballistic protection of these vehicles at the same time reduces their decontaminability in various places of the vehicle due to the increased additional surface of the vehicle with cassettes.Prevention of contamination of these cassettes has been presented as a way of reducing hard to reach surface for decontamination and a method of insulating construction elements(stands),fixing these cassettes to the vehicle,from the environment to prevent contact with contaminated liquids and dusts.The selection of appropriate materials is shown,which may affect the improvement of the decontamination efficiency of the vehicle with such cassettes.This applies to the use of materials with low absorption of chemical warfare agents,which prevent the accumulation of large amounts of these agents on contaminated surfaces and improve the effectiveness of decontamination.It also shows how to ensure better access of the disinfectant to as much of the vehicle surface as possible,covered with cassettes that have been contaminated.It shows how a vehicle,in particular with such cassettes,can provide protection against radar detection when Radar Absorbent Material is used on vehicle cassettes.
基金supported by the Natural Science Foundation Research Plan of Shanxi Province (2023JCQN0728)。
文摘The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
文摘In the state estimation of passive tracking systems, the traditional approximate expression for the Cramero-Rao lower bound (CRLB) does not take two factors into consideration, that is, measurement origin uncertainty aad state noise. Such treatment is only valid in ideal situation but it is not feasible in actual situation. In this article, considering the two factors, the posterior Cramer-Rao lower bound (PCRLB) recursion expression for the error of bearing-only tracking is derived. Then, further analysis is carried out on the PCRLB. According to the final result, there are four main parameters that play a role in the performance of the PCRLB, that is, measurement noise, detection probability, state noise and clutter density, amongst which the first two have greater impact on the performance of the PCRLB than the others.