期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
“Cyberspace” or “Cyber warfare”研究热点与趋势分析 被引量:1
1
作者 郑涛 李自力 +2 位作者 赵小强 郝烺超 谭跃进 《现代情报》 CSSCI 2013年第11期119-130,共12页
运用CitespaceⅡ信息可视化图谱软件对"cyberspace" or "cyber warfare"研究文献数据进行分析,绘制了共引网络图谱,并依据图谱中关键节点文献的知识基础,对研究热点及趋势进行了初步探讨,得出国外研究的热点与前沿... 运用CitespaceⅡ信息可视化图谱软件对"cyberspace" or "cyber warfare"研究文献数据进行分析,绘制了共引网络图谱,并依据图谱中关键节点文献的知识基础,对研究热点及趋势进行了初步探讨,得出国外研究的热点与前沿的相关结论,对"cyberspace" or "cyber warfare"的研究具有一定的参考价值。 展开更多
关键词 CitespaceⅡ CYBERSPACE CYBER warfare 网络空间 网络战 赛博空间 赛博战 研究热点 研究趋势
在线阅读 下载PDF
An approach for predicting digital material consumption in electronic warfare 被引量:6
2
作者 Xiong Li Xiao-dong Zhao Wei Pu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2020年第1期263-273,共11页
Electronic warfare is a modern combat mode,in which predicting digital material consumption is a key for material requirements planning(MRP).In this paper,we introduce an insensitive loss function(ε) and propose a ε... Electronic warfare is a modern combat mode,in which predicting digital material consumption is a key for material requirements planning(MRP).In this paper,we introduce an insensitive loss function(ε) and propose a ε-SVR-based prediction approach.First,we quantify values of influencing factors of digital equipments in electronic warfare and a small-sample data on real consumption to form a real combat data set,and preprocess it to construct the sample space.Subsequently,we establish the ε-SVR-based prediction model based on "wartime influencing factors-material consumption" and perform model training.In case study,we give 8 historical battle events with battle damage data and predict 3 representative kinds of digital materials by using the proposed approach.The results illustrate its higher accuracy and more convenience compared with other current approaches.Taking data acquisition controller prediction as an example,our model has better prediction performance(RMSE=0.575 7,MAPE(%)=12.037 6 and R^2=0.996 0) compared with BP neural network model(RMSE=1.272 9,MAPE(%)=23.577 5 and R^2=0.980 3) and GM(1,1) model(RMSE=2.095 0,MAPE(%)=24.188 0 and R^2=0.946 6).The fact shows that the approach can be used to support decision-making for MRP in electronic warfare. 展开更多
关键词 ELECTRONIC warfare SUPPORT VECTOR regression(SVR) Prediction model DECISION-MAKING
在线阅读 下载PDF
A joint optimization algorithm for focused energy delivery in precision electronic warfare 被引量:5
3
作者 Zhong-ping Yang Shu-ning Yang +3 位作者 Qing-song Zhou Jian-yun Zhang Zhi-hui Li Zhong-rui Huang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2022年第4期709-721,共13页
Focused energy delivery(FED) is a technique that can precisely bring energy to the specific region,which arouses wide attention in precision electronic warfare(PREW).This paper first proposes a joint optimization mode... Focused energy delivery(FED) is a technique that can precisely bring energy to the specific region,which arouses wide attention in precision electronic warfare(PREW).This paper first proposes a joint optimization model with respect to the locations of the array and the transmitted signals to improve the performance of FED.As the problem is nonconvex and NP-hard,particle swarm optimization(PSO) is adopted to solve the locations of the array,while designing the transmitted signals under a feasible array is considered as a unimodular quadratic program(UQP) subproblem to calculate the fitness criterion of PSO.In the PSO-UQP framework established,two methods are presented for the UQP subproblem,which are more efficient and more accurate respectively than previous works.Furthermore,a threshold value is set in the framework to determine which method to adopt to take full advantages of the methods above.Meanwhile,we obtain the maximum localization error that FED can tolerate,which is significant for implementing FED in practice.Simulation results are provided to demonstrate the effectiveness of the joint optimization algorithm,and the correctness of the maximum localization error derived. 展开更多
关键词 Focused energy delivery Localization error Particle swarm optimization Precision electronic warfare Unimodular quadratic program
在线阅读 下载PDF
Waveform design for radar and extended target in the environment of electronic warfare 被引量:4
4
作者 WANG Yuxi HUANG Guoce LI Wei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第1期48-57,共10页
Transmit waveform optimization is critical to radar system performance. There have been a fruit of achievements about waveform design in recent years. However, most of the existing methods are based on the assumption ... Transmit waveform optimization is critical to radar system performance. There have been a fruit of achievements about waveform design in recent years. However, most of the existing methods are based on the assumption that radar is smart and the target is dumb, which is not always reasonable in the modern electronic warfare. This paper focuses on the waveform design for radar and the extended target in the environment of electronic warfare. Three different countermeasure models between smart radar and dumb target, smart target and dumb radar, smart radar and smart target are proposed. Taking the signal-to-interferenceplus-noise ratio(SINR) as the metric, optimized waveforms for the first two scenarios are achieved by the general water-filling method in the presence of clutter. For the last case, the equilibrium between smart radar and smart target in the presence of clutter is given mathematically and the optimized solution is achieved through a novel two-step water-filling method on the basis of minmax theory. Simulation results under different power constraints show the power allocation strategies of radar and target and the output SINRs are analyzed. 展开更多
关键词 waveform design extended target electronic warfare CLUTTER water-filling method
在线阅读 下载PDF
Electronic warfare in the optical band:Main features,examples and selected measurement data 被引量:4
5
作者 Roman Ostrowski Artur Cywinski Marek Strzelec 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2021年第5期1636-1649,共14页
The paper presents the possibilities of,and methods for,acquiring,analysing and processing optical signals in order to recognise,identify and counteract threats on the contemporary battleground.The main ways electroni... The paper presents the possibilities of,and methods for,acquiring,analysing and processing optical signals in order to recognise,identify and counteract threats on the contemporary battleground.The main ways electronic warfare is waged in the optical band of the electromagnetic wave spectrum have been formulated,including the acquisition of optical emitter signatures,as well as ultraviolet(UV)and thermal(IR)signatures.The physical parameters and values describing the emission of laser radiation are discussed,including their importance in terms of creating optical signatures.Moreover,it has been shown that in the transformation of optical signals into signatures,only their spectral and temporal parameters can be applied.This was confirmed in experimental part of the paper,which includes our own measurements of spectral and temporal emission characteristics for three types of binocular laser rangefinders.It has been further shown that through simple registration and quick analysis involving comparison of emission time parameters in the case of UV signatures in“solar-blind”band,various events can be identified quickly and faultlessly.The same is true for IR signatures,where the amplitudes of the recorded signal for several wavelengths are compared.This was confirmed experimentally for UV signatures by registering and then analyzing signals from several events during military exercises at a training ground,namely Rocket Propelled Grenade(RPG)launches and explosions after hitting targets,trinitrotoluene(TNT)explosions,firing armour-piercing,fin-stabilised,discarding sabots(APFSDS)or high explosive(HE)projectiles.The final section describes a proposed model database of emitters,created as a result of analysing and transforming the recorded signals into optical signatures. 展开更多
关键词 OPTOELECTRONICS Electronic warfare Optical signature
在线阅读 下载PDF
Grid architecture model of network centric warfare 被引量:1
6
作者 Yan Tihua Wang Baoshu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第1期121-125,共5页
NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward,which is a four levels system including the user ... NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward,which is a four levels system including the user level, the application level, the grid middleware layer and the resource level. In grid middleware layer,based on virtual hosting environment, a BEPL4WS grid service composition method is introduced. In addition, the NCW grid service model is built with the help of Eclipse-SDK-3.0.1 and Bpws4j. 展开更多
关键词 network centric warfare OGSA grid service composition BPEL4WS.
在线阅读 下载PDF
New concepts and their applications in underwater acoustic warfare simulation system
7
作者 DONG Yangze~(1,2), YAO Lan~(2) 1) Shanghai Jiaotong University, Shanghai 200030, 2) Shanghai Marine Electronic Equipment Research Institute, Shanghai 200025) 《声学技术》 CSCD 2004年第S1期29-31,共3页
An underwater acoustic warfare simulation system (UAWSS) with a structure of high level architecture (HLA) is studied based upon a previous research project. With the experience and lessons learned, some new concepts ... An underwater acoustic warfare simulation system (UAWSS) with a structure of high level architecture (HLA) is studied based upon a previous research project. With the experience and lessons learned, some new concepts are adopted in the implementation of UAWSS according to the essence of simulation and the objective of the system, among which are simulation synthetic environment, signal processing at other simulation nodes, decomposition of underwater sound channel, channel varying law and rules on system and parts evaluation, etc. Applications of these new ideas show that they are effective. 展开更多
关键词 UNDERWATER ACOUSTIC DECOY SIMULATION UNDERWATER ACOUSTIC warfare SIMULATION HLA SIMULATION SYNTHETIC
在线阅读 下载PDF
A Radar Countermeasure Modeling Method Incorporating Cognitive Bias
8
作者 Wang Rui Li Xiangyang +2 位作者 Wang Dong Ma Hongguang Zhang Zhili 《系统仿真学报》 北大核心 2025年第4期1090-1101,共12页
Cognitive bias,stemming from electronic measurement error and variability in human perception,exists in cognitive electronic warfare and affects the outcomes of conflicts.In this paper,the dynamic game approach is emp... Cognitive bias,stemming from electronic measurement error and variability in human perception,exists in cognitive electronic warfare and affects the outcomes of conflicts.In this paper,the dynamic game approach is employed to develop a model for cognitive bias induced by incomplete information and measurement errors in cognitive radar countermeasures.The payoffs for both parties are calculated using the radar's anti-jamming strategy matrix A and the jammer's jamming strategy matrix B.With perfect Bayesian equilibrium,a dynamic radar countermeasure model is established,and the impact of cognitive bias is analyzed.Drawing inspiration from the cognitive bias analysis method used in stock market trading,a cognitive bias model for cognitive radar countermeasures is introduced,and its correctness is mathematically proved.A gaming scenario involving the AN/SPY-1 radar and a smart jammer is set up to analyze the influence of cognitive bias on game outcomes.Simulation results validate the effectiveness of the proposed method. 展开更多
关键词 cognitive electronic warfare cognitive bias radar countermeasure dynamic game perfect Bayesian equilibrium
在线阅读 下载PDF
One-pot synthesis of PDDA-mediated CuO-functionalized activated carbon fabric for sarin detoxification with enhanced strength and permeability for NBC protective clothing
9
作者 Himanshi Dhyani Ravindra V.Adivarekar +4 位作者 Vikas B.Thakare Suraj Bharati Ajay Dixit G.Raviraju Prabhat Garg 《Defence Technology(防务技术)》 2025年第6期67-82,共16页
Chemical warfare agents(CWAs)are extremely lethal substances used in warfare and terrorism,capable of causing permanent damage even in small doses,despite medical intervention.Therefore,detection,protection,and detoxi... Chemical warfare agents(CWAs)are extremely lethal substances used in warfare and terrorism,capable of causing permanent damage even in small doses,despite medical intervention.Therefore,detection,protection,and detoxification of CWAs are vital for the safety of first responders,military personnel,and civilians,driving significant research in this area.Herein,we designed and synthesized a poly(-diallyldimethylammonium chloride)(PDDA)mediated cupric oxide(CuO)functionalized activated carbon fabric(ACF),termed ACF@PDDA-CuO,as an adsorbent filter material for self-detoxifying chemical protective clothing.PDDA,a positively charged polyelectrolyte,effectively binds in-situ synthesized CuO to the negatively charged ACF surface,serving as a suitable binder.This study demonstrates the synergistic effects of PDDA-CuO functionalization on ACF,where PDDA treatment enhanced mechanical and comfort properties,and CuO crystal growth significantly improved detoxification efficacy against the CWA Nerve Agent Sarin.Comprehensive analyses,including FTIR,BET surface area analysis,SEM,EDS,TEM,STEM,TGA,XPS,and XRD,confirmed the uniform deposition of CuO and PDDA on the ACF surface.The Cu content on ACF@PDDA-CuO samples was measured via iodometric titration.The materials were evaluated for tensile strength,air permeability,water vapor permeability,nerve agent(Sarin)detoxification,and blister agent(Sulfur Mustard)breakthrough time to assess their applicability for protective clothing.The optimized PDDA-CuO on ACF detoxified 82.04%of Sarin within 18 h,compared to 25.22%by ACF alone,and enhanced tensile strength by 23.67%,air permeability by 24.63%,and water vapor permeability by 3.94%,while maintaining protection against Sulfur Mustard for 24 h.These findings indicate that ACF@PDDA-CuO is a promising candidate for CWA protective clothing,offering robust protection with enhanced comfort. 展开更多
关键词 Chemical warfare agents Activated carbon fabric Cupric oxide Poly(diallyldimethylammonium chloride) Catalytic degradation
在线阅读 下载PDF
网络中心战指挥控制决策分析 被引量:2
10
作者 吴延林 苏建新 周平 《兵工自动化》 2009年第2期67-68,80,共3页
网络中心战的指挥控制实质上是观察、判断、决策和行动循环的往复循环过程,指挥人员对同一战场态势的不同偏好决策作归一化处理后,一致化为其效用值矩阵,采用基于相对熵的群决策优化算法,得到指挥控制过程决策最优化方案。
关键词 网络中心战(NCW Network Centric warfare) 指挥控制 循环
在线阅读 下载PDF
Tolerance analysis of multiple-element linear retrodirective cross-eye jamming 被引量:9
11
作者 LIU Tianpeng WEI Xizhang +3 位作者 PENG Bo LIU Zhen SUN Bin GUAN Zhiqiang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第3期460-469,共10页
Tolerance sensitivity limits the practical application of the cross-eye jammer.Previous literature has demonstrated that retrodirective cross-eye jamming with multiple antenna elements possesses the advantage of loose... Tolerance sensitivity limits the practical application of the cross-eye jammer.Previous literature has demonstrated that retrodirective cross-eye jamming with multiple antenna elements possesses the advantage of loose tolerance requirements compared to traditional cross-eye jamming.However,the previous analysis was limited,because there are still some factors affecting the parameter tolerance of the multiple-element retrodirective cross-eye jamming(MRCJ)system and they have not been investigated completely,such as the loop difference,the baseline ratio and the jammer-to-signal ratio.This paper performs a comprehensive tolerance analysis of the MRCJ system with a nonuniformspacing linear array.Simulation results demonstrate the tolerance effects of the above influence factors and give reasonable advice for easing tolerance sensitivity. 展开更多
关键词 electronic warfare(EW) electronic countermeasure(ECM) cross-eye jamming radar active jamming TOLERANCE
在线阅读 下载PDF
Cross-eye gain distribution of multiple-element retrodirective cross-eye jamming 被引量:7
12
作者 YANG Degui LIANG Buge ZHAO Dangjun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第6期1170-1179,共10页
The total cross-eye gain of multiple-element retrodirective cross-eye jamming(MRCJ) in the presence of the platform skin return is a distribution rather than a constant value, due to the random variation in the phase ... The total cross-eye gain of multiple-element retrodirective cross-eye jamming(MRCJ) in the presence of the platform skin return is a distribution rather than a constant value, due to the random variation in the phase of the skin return. Although the median value of the total cross-eye gain distribution had been analyzed in previous studies, the extreme values providing useful indications of the upper and lower bounds of the total cross-eye gain have not been analyzed until now. In this paper, the cumulative distribution function and the extreme values of the total cross-eye gain of MRCJ are derived. The angular error induced in threat monopulse radar as a figure of merit is used to analyze the performance of MRCJ system. Simulation results demonstrate the variation of the angular error and discuss the proper value of jamming-to-signal ratio(JSR) making the MRCJ system more effective in consideration of the whole distribution of the total cross-eye gain. 展开更多
关键词 electronic warfare(EW) electronic countermeasures(ECM) cross-eye jamming monopulse radar angular deception jamming
在线阅读 下载PDF
Joint 2D DOA and Doppler frequency estimation for L-shaped array using compressive sensing 被引量:6
13
作者 WANG Shixin ZHAO Yuan +3 位作者 LAILA Ibrahim XIONG Ying WANG Jun TANG Bin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第1期28-36,共9页
A joint two-dimensional(2D)direction-of-arrival(DOA)and radial Doppler frequency estimation method for the L-shaped array is proposed in this paper based on the compressive sensing(CS)framework.Revised from the conven... A joint two-dimensional(2D)direction-of-arrival(DOA)and radial Doppler frequency estimation method for the L-shaped array is proposed in this paper based on the compressive sensing(CS)framework.Revised from the conventional CS-based methods where the joint spatial-temporal parameters are characterized in one large scale matrix,three smaller scale matrices with independent azimuth,elevation and Doppler frequency are introduced adopting a separable observation model.Afterwards,the estimation is achieved by L1-norm minimization and the Bayesian CS algorithm.In addition,under the L-shaped array topology,the azimuth and elevation are separated yet coupled to the same radial Doppler frequency.Hence,the pair matching problem is solved with the aid of the radial Doppler frequency.Finally,numerical simulations corroborate the feasibility and validity of the proposed algorithm. 展开更多
关键词 electronic warfare L-shaped array joint parameter estimation L1-norm minimization Bayesian compressive sensing(CS) pair matching
在线阅读 下载PDF
Performance analysis of multi-group three-tuple cross-eye jamming 被引量:3
14
作者 CHEN Jiabei SHI Qingzhan +2 位作者 HUANG Zhaoyu WANG Qingping YUAN Naichang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第1期80-90,共11页
Monopulse radar is widely used in military.Jamming monopulse radar has always been a research hotspot in electronic warfare(EW).Cross-eye jamming has always been considered as the most effective measures to jam with m... Monopulse radar is widely used in military.Jamming monopulse radar has always been a research hotspot in electronic warfare(EW).Cross-eye jamming has always been considered as the most effective measures to jam with monopulse radar.In this paper, we propose a multi-group three-tuple crosseye jamming structure where each group contains three antenna elements with a definite phase and an amplitude relationship.Then, based on the principle of monopulse angle measurement, the error angle is deduced theoretically.Simulations show that such a multi-group three-tuple cross-eye jamming structure performs better than the multi-element cross-eye jamming structure previously proposed, and the analysis of the centroid shows that the centroid of the structure proposed in this paper is more widely distributed in space. 展开更多
关键词 electronic warfare(EW) angular deception jamming cross-eye jamming three-tuple antenna array near field
在线阅读 下载PDF
Automatic radar antenna scan type recognition based on limited penetrable visibility graph 被引量:2
15
作者 LIU Songtao LEI Zhenshuo +1 位作者 GE Yang WEN Zhenming 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第2期437-446,共10页
To address the problem of the weak anti-noise and macro-trend extraction abilities of the current methods for identifying radar antenna scan type,a recognition method for radar antenna scan types based on limited pene... To address the problem of the weak anti-noise and macro-trend extraction abilities of the current methods for identifying radar antenna scan type,a recognition method for radar antenna scan types based on limited penetrable visibility graph(LPVG)is proposed.Firstly,seven types of radar antenna scans are analyzed,which include the circular scan,sector scan,helical scan,raster scan,conical scan,electromechanical hybrid scan and two-dimensional electronic scan.Then,the time series of the pulse amplitude in the radar reconnaissance receiver is converted into an LPVG network,and the feature parameters are extracted.Finally,the recognition result is obtained by using a support vector machine(SVM)classifier.The experimental results show that the recognition accuracy and noise resistance of this new method are improved,where the average recognition accuracy for radar antenna type is at least 90%when the signalto-noise ratio(SNR)is 5 dB and above. 展开更多
关键词 antenna scan type limited penetrable visibility graph(LPVG) support vector machine(SVM) cognitive electronic warfare
在线阅读 下载PDF
Research on construction of operation architecture based on complex network 被引量:1
16
作者 You Chen Xing Wang +2 位作者 Yuan-zhi Yang Cheng-wei Ruan Yi-peng Zhou 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2020年第1期232-241,共10页
Operation architecture plays a more important role in Network Centric Warfare(NGAV),which involves dynamic operation networks with complex properties.Thus,it is essential to investigate the operation architecture unde... Operation architecture plays a more important role in Network Centric Warfare(NGAV),which involves dynamic operation networks with complex properties.Thus,it is essential to investigate the operation architecture under the informatization condition within NCAW and find a proper network construction method to efficiently coordinate various functional modules on a particular situation,i.e.,the aerial combat.A new method integrating the physical level and functional level of NCW is proposed to establish the operation architecture,where the concept of network operation constraints unit and net constructing mechanisms are employed to avoid conflicts among different platforms.Meanwhile,we conduct simulations to assess the effectiveness and feasibility of the constructed operation architecture and analyze the influence of the network parameters. 展开更多
关键词 Operation ARCHITECTURE NETWORK centric warfare TOPOLOGY COMPLEX NETWORK
在线阅读 下载PDF
Decision support model for effects estimation and proportionality assessment for targeting in cyber operations 被引量:1
17
作者 C.Maathuis W.Pieters J.van den Berg 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2021年第2期352-374,共23页
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under s... Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical e military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical e military experts.Both the design and the results of the evaluation are revealed in this article. 展开更多
关键词 Cyber operations Cyber warfare Cyber weapons Artificial intelligence Fuzzy logic TARGETING
在线阅读 下载PDF
Protection of armoured vehicles against chemical, biological and radiological contamination 被引量:1
18
作者 Adam Wisniewski Jacek Pirszel 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2021年第2期384-392,共9页
The article presents problems related to mechanical protection of vehicles with different add-on armours against chemical,biological and radiological contamination.This applies to vehicles with additional passive,reac... The article presents problems related to mechanical protection of vehicles with different add-on armours against chemical,biological and radiological contamination.This applies to vehicles with additional passive,reactive and hybrid protection in the form of cassettes against piercing with anti-tank projectiles,piercing with their kinetic energy of impact,and as a result of chemical energy of shaped charges as well as explosively formed projectiles.It has been shown how increased ballistic protection of these vehicles at the same time reduces their decontaminability in various places of the vehicle due to the increased additional surface of the vehicle with cassettes.Prevention of contamination of these cassettes has been presented as a way of reducing hard to reach surface for decontamination and a method of insulating construction elements(stands),fixing these cassettes to the vehicle,from the environment to prevent contact with contaminated liquids and dusts.The selection of appropriate materials is shown,which may affect the improvement of the decontamination efficiency of the vehicle with such cassettes.This applies to the use of materials with low absorption of chemical warfare agents,which prevent the accumulation of large amounts of these agents on contaminated surfaces and improve the effectiveness of decontamination.It also shows how to ensure better access of the disinfectant to as much of the vehicle surface as possible,covered with cassettes that have been contaminated.It shows how a vehicle,in particular with such cassettes,can provide protection against radar detection when Radar Absorbent Material is used on vehicle cassettes. 展开更多
关键词 Protection of ERA CBR defence Chemical warfare agents Vehicle decontamination Radar absorbent material Additive manufacturing
在线阅读 下载PDF
A framework of force of information influence and application for C4KISR system
19
作者 MAO Shaojie DIAO Lianwang +6 位作者 SUN Yu WANG Heng YI Kan XU Xin MAO Xiaobin ZHANG Kecheng SHENG Long 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期430-443,共14页
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e... The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture. 展开更多
关键词 information warfare command control communications computer KILL intelligence surveillance reconnaissance(C4KISR)system information circulation force of information influence information entropy
在线阅读 下载PDF
Posterior Cramer-Rao lower bounds for bearing-only tracking
20
作者 Guo Lei Tang Bin Liu Gang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第1期27-32,共6页
In the state estimation of passive tracking systems, the traditional approximate expression for the Cramero-Rao lower bound (CRLB) does not take two factors into consideration, that is, measurement origin uncertaint... In the state estimation of passive tracking systems, the traditional approximate expression for the Cramero-Rao lower bound (CRLB) does not take two factors into consideration, that is, measurement origin uncertainty aad state noise. Such treatment is only valid in ideal situation but it is not feasible in actual situation. In this article, considering the two factors, the posterior Cramer-Rao lower bound (PCRLB) recursion expression for the error of bearing-only tracking is derived. Then, further analysis is carried out on the PCRLB. According to the final result, there are four main parameters that play a role in the performance of the PCRLB, that is, measurement noise, detection probability, state noise and clutter density, amongst which the first two have greater impact on the performance of the PCRLB than the others. 展开更多
关键词 electronic warfare target passive tracking PCRLB target state estimation
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部