With the continuous application of new technologies in reconnaissance and attack, false camouflage plays a more important role in improving the survivability of targets, and the number of decoys plays a crucial role i...With the continuous application of new technologies in reconnaissance and attack, false camouflage plays a more important role in improving the survivability of targets, and the number of decoys plays a crucial role in the camouflaging effect. Based on the concept of cost-effectiveness ratio, according to the newly formulated Johnson criterion and the view of discovery and destruction, this paper proposes to take the identification probability as the probability of being destroyed and uses mathematical formulas to calculate the cost of a single use decoy. On this basis, a cost-effectiveness ratio model is established, with the product of the increase in the survival probability of the target and the cost of the target as the benefit, and the sum of the product of the probability of being destroyed and the cost of the decoy and the cost of a single use as the consumption cost. The model is calculated and analyzed, and the number of decoys that conform to the actual situation is obtained.展开更多
In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protoc...In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol,the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie's successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover,the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence(AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source.展开更多
Dynamic model of aerial towed decoy system is established and simulations are performed to research the dynamic characteristics of the system. Firstly, Kinetic equations based on spinor are built, where the cable is d...Dynamic model of aerial towed decoy system is established and simulations are performed to research the dynamic characteristics of the system. Firstly, Kinetic equations based on spinor are built, where the cable is discretized into a number of rigid segments while the decoy is modeled as a rigid body hinged on the cable. Then tension recurrence algorithm is developed to improve computational efficiency, which makes it possible to predict the dynamic response of aerial towed decoy system rapidly and accurately. Subsequently, the efficiency and validity of this algorithm are verified by comparison with Kane’s function and further validated by wind tunnel tests.Simulation results indicate that the distance between the towing point and the decoy’s center of gravity is suggested to be 5%–20% of the length of decoy body to ensure the stability of system.In up-risen maneuver process, the value of angular velocity is recommended to be less than0.10 rad/s to protect the cable from the aircraft exhaust jet. During the turning movement of aircraft, the cable’s extent of stretching outwards is proportional to the aircraft’s angular velocity.Meanwhile, the decoy, aircraft and missile form a triangle, which promotes the decoy’s performance.展开更多
In this paper,a missile terminal guidance law based on a new Deep Deterministic Policy Gradient(DDPG)algorithm is proposed to intercept a maneuvering target equipped with an infrared decoy.First,to deal with the issue...In this paper,a missile terminal guidance law based on a new Deep Deterministic Policy Gradient(DDPG)algorithm is proposed to intercept a maneuvering target equipped with an infrared decoy.First,to deal with the issue that the missile cannot accurately distinguish the target from the decoy,the energy center method is employed to obtain the equivalent energy center(called virtual target)of the target and decoy,and the model for the missile and the virtual decoy is established.Then,an improved DDPG algorithm is proposed based on a trusted-search strategy,which significantly increases the train efficiency of the previous DDPG algorithm.Furthermore,combining the established model,the network obtained by the improved DDPG algorithm and the reward function,an intelligent missile terminal guidance scheme is proposed.Specifically,a heuristic reward function is designed for training and learning in combat scenarios.Finally,the effectiveness and robustness of the proposed guidance law are verified by Monte Carlo tests,and the simulation results obtained by the proposed scheme and other methods are compared to further demonstrate its superior performance.展开更多
Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal deco...Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal decoy state protocol with a heralded single photon source (HSPS) for QKD is presented. The protocol is based on 4 states with different intensities. i.e. one signal state and three decoy states. The signal state is for generating keys; the decoy states are for detecting the eavesdropping and estimating the fraction of single-photon and two-photon pulses. We have discussed three cases of this protocol, i.e. the general case, the optimal case and the special case. Moreover, the final key rate over transmission distance is simulated. For the low dark count of the HSPS and the utilization of the two-photon pulses, our protocol has a higher key rate and a longer transmission distance than any other decoy state protocol.展开更多
Using super resolution direction of arrival(DOA) estimation algorithm to reduce the resolution angle is an effective method for passive radar seeker(PRS) to antagonize non-coherent radar decoy.Considering the powe...Using super resolution direction of arrival(DOA) estimation algorithm to reduce the resolution angle is an effective method for passive radar seeker(PRS) to antagonize non-coherent radar decoy.Considering the power and correlation property between radar and non-coherent decoy,an improved subspace DOA estimation method based on traditional subspace algorithm is proposed.Because this new method uses the invariance property of noise subspace,compared with traditional MUSIC algorithm,it shows not only better resolution in condition of closely spaced sources,but also superior performance in case of different power or partially correlated sources.Using this new method,PRS can distinguish radar and non-coherent decoy with good performance.Both the simulation result and the experimental data confirm the performance of the method.展开更多
文摘With the continuous application of new technologies in reconnaissance and attack, false camouflage plays a more important role in improving the survivability of targets, and the number of decoys plays a crucial role in the camouflaging effect. Based on the concept of cost-effectiveness ratio, according to the newly formulated Johnson criterion and the view of discovery and destruction, this paper proposes to take the identification probability as the probability of being destroyed and uses mathematical formulas to calculate the cost of a single use decoy. On this basis, a cost-effectiveness ratio model is established, with the product of the increase in the survival probability of the target and the cost of the target as the benefit, and the sum of the product of the probability of being destroyed and the cost of the decoy and the cost of a single use as the consumption cost. The model is calculated and analyzed, and the number of decoys that conform to the actual situation is obtained.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61271238 and 61475075)the Specialized Research Fund for the Doctoral Program of Higher Education of China(Grant No.20123223110003)+7 种基金the Natural Science Research Foundation for Universities of Jiangsu Province of China(Grant No.11KJA510002)the Open Research Fund of Key Laboratory of Broadband Wireless Communication and Sensor Network TechnologyMinistry of EducationChina(Grant No.NYKL2015011)the Innovation Program of Graduate Education of Jiangsu ProvinceChina(Grant No.KYLX0810)partially supported by Qinglan Project of Jiangsu ProvinceChina
文摘In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol,the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie's successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover,the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence(AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source.
文摘Dynamic model of aerial towed decoy system is established and simulations are performed to research the dynamic characteristics of the system. Firstly, Kinetic equations based on spinor are built, where the cable is discretized into a number of rigid segments while the decoy is modeled as a rigid body hinged on the cable. Then tension recurrence algorithm is developed to improve computational efficiency, which makes it possible to predict the dynamic response of aerial towed decoy system rapidly and accurately. Subsequently, the efficiency and validity of this algorithm are verified by comparison with Kane’s function and further validated by wind tunnel tests.Simulation results indicate that the distance between the towing point and the decoy’s center of gravity is suggested to be 5%–20% of the length of decoy body to ensure the stability of system.In up-risen maneuver process, the value of angular velocity is recommended to be less than0.10 rad/s to protect the cable from the aircraft exhaust jet. During the turning movement of aircraft, the cable’s extent of stretching outwards is proportional to the aircraft’s angular velocity.Meanwhile, the decoy, aircraft and missile form a triangle, which promotes the decoy’s performance.
基金supported by the National Natural Science Foundation of China(Nos.61973253 and 62006192)。
文摘In this paper,a missile terminal guidance law based on a new Deep Deterministic Policy Gradient(DDPG)algorithm is proposed to intercept a maneuvering target equipped with an infrared decoy.First,to deal with the issue that the missile cannot accurately distinguish the target from the decoy,the energy center method is employed to obtain the equivalent energy center(called virtual target)of the target and decoy,and the model for the missile and the virtual decoy is established.Then,an improved DDPG algorithm is proposed based on a trusted-search strategy,which significantly increases the train efficiency of the previous DDPG algorithm.Furthermore,combining the established model,the network obtained by the improved DDPG algorithm and the reward function,an intelligent missile terminal guidance scheme is proposed.Specifically,a heuristic reward function is designed for training and learning in combat scenarios.Finally,the effectiveness and robustness of the proposed guidance law are verified by Monte Carlo tests,and the simulation results obtained by the proposed scheme and other methods are compared to further demonstrate its superior performance.
基金Project supported by the National Natural Science Foundation of China (Grant No 60578055)the State Key Development Program for Basic Research of China (Grant No 2007CB307001)
文摘Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal decoy state protocol with a heralded single photon source (HSPS) for QKD is presented. The protocol is based on 4 states with different intensities. i.e. one signal state and three decoy states. The signal state is for generating keys; the decoy states are for detecting the eavesdropping and estimating the fraction of single-photon and two-photon pulses. We have discussed three cases of this protocol, i.e. the general case, the optimal case and the special case. Moreover, the final key rate over transmission distance is simulated. For the low dark count of the HSPS and the utilization of the two-photon pulses, our protocol has a higher key rate and a longer transmission distance than any other decoy state protocol.
文摘Using super resolution direction of arrival(DOA) estimation algorithm to reduce the resolution angle is an effective method for passive radar seeker(PRS) to antagonize non-coherent radar decoy.Considering the power and correlation property between radar and non-coherent decoy,an improved subspace DOA estimation method based on traditional subspace algorithm is proposed.Because this new method uses the invariance property of noise subspace,compared with traditional MUSIC algorithm,it shows not only better resolution in condition of closely spaced sources,but also superior performance in case of different power or partially correlated sources.Using this new method,PRS can distinguish radar and non-coherent decoy with good performance.Both the simulation result and the experimental data confirm the performance of the method.