期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
A tensile wearable SHF antenna with efficient communication in defense beacon technology
1
作者 Pooja Naresh Bhatt Rashmi Pandhare 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第11期198-210,共13页
The study projects a flexible and compact wearable pear-shaped Super High Frequency(SHF)antenna that can provide detailed location recognition and tracking applicable to defense beacon technology.This mini aperture wi... The study projects a flexible and compact wearable pear-shaped Super High Frequency(SHF)antenna that can provide detailed location recognition and tracking applicable to defense beacon technology.This mini aperture with electrical dimensions of 0.12λ_(0)×0.22λ_(0)×0.01λ_(0)attains a vast bandwidth over 3.1-34.5 GHz Super High Frequency(SHF)frequency band at S_(11)≤-10 dB,peak gain of 7.14 dBi and proportionately homogeneous radiation pattern.The fractional bandwidth(%BW)acquired is 168%that envelopes diversified frequency spectrum inclusive of X band specifically targeted to all kinds of defense and military operations.The proposed antenna can be worn on a soldier's uniform and hence the Specific Absorption Rate simulation is accomplished.The Peak SAR Value over 1 g of tissue is 1.48 W/kg and for 10 g of tissue is 0.27 W/kg well under the safety standards.The flexibility is proven by analyzing the full electromagnetic simulations for various bending conditions.Time response analysis is attained with its Fidelity Factor and Group Delay.Communication excellence is determined using Link Budget Analysis and it is seen that margin at 100 Mbps is 62 m and at 200 Mbps is 59 m.Prototype is fabricated along with experimental validation.All the results show harmony in shaping the antenna to provide critical situational awareness and data sharing capabilities required in defense beacon technology for location identification. 展开更多
关键词 COMPACT defense beacon technology Link budget SAR Time domain WEARABLE
在线阅读 下载PDF
Scientific issues and critical technologies in planetary defense
2
作者 Qinkun CHENG Wei ZHANG 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2024年第11期24-65,共42页
In history,the Earth has encountered frequent and massive impacts.Until today,it is still a collided target for Potentially Hazardous Objects(PHOs),gradually making planetary defense a concerned and important research... In history,the Earth has encountered frequent and massive impacts.Until today,it is still a collided target for Potentially Hazardous Objects(PHOs),gradually making planetary defense a concerned and important research topic in the field of aerospace science.Against this background,this work clarifies and discusses some important scientific issues and various critical technologies of planetary defense.First,the current status of planetary defense research is summarized.Subsequently,the classification and characteristics of PHOs are introduced,focusing on their potential impact on planetary defense and related scientific research issues.For the purpose of protecting the Earth and maintaining space safety,the monitoring and characterization,deflection,and mitigation of PHOs have basically occupied all the attention of planetary defense researchers.Therefore,the critical technologies in planetary defense are discussed from these three aspects,and are also compared and analyzed in depth.Based on the current research progress in planetary defense,the challenges for planetary defense are discussed,and future development directions are also analyzed.Finally,a summary of the entire study is provided. 展开更多
关键词 Small celestial body Potentially hazardous object(PHO) Near-Earth asteroid(NEA) Planetary defense technology Space robot
原文传递
Soliciting Contributions for "Symposium on Defense Science and Technology Management 2008"
3
《Defence Technology(防务技术)》 SCIE EI CAS 2008年第2期F0003-F0003,共1页
"Symposium on Defense Science and Technology Management 2008",sponsored by China Ordnance Society and Beijing Institute of Technology,and undertaken by Management and Economy College,Beijing Institute of Tec... "Symposium on Defense Science and Technology Management 2008",sponsored by China Ordnance Society and Beijing Institute of Technology,and undertaken by Management and Economy College,Beijing Institute of Technology,will be held in Beijing Institute of Technology in the last ten-day period 展开更多
关键词 Symposium on defense Science and technology Management 2008 Soliciting Contributions for
在线阅读 下载PDF
Research on Cyberspace Mimic Defense Based on Dynamic Heterogeneous Redundancy Mechanism 被引量:1
4
作者 Junjie Xu 《Journal of Computer and Communications》 2021年第7期1-7,共7页
With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target sy... With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target system and cannot resist advanced persistent threats. To solve the situation that cyberspace security is easy to attack and difficult to defend, Chinese experts on cyberspace security proposed an innovative theory called mimic defense, it is an active defense technology that employs “Dynamic, Heterogeneous, Redundant” architecture to defense attacks. This article first briefly describes the classic network defense technology and Moving Target Defense (MTD). Next, it mainly explains in detail the principles of the mimic defense based on the DHR architecture and analyzes the attack surface of DHR architecture. This article also includes applications of mimic defense technology, such as mimic routers, and mimic web defense systems. Finally, it briefly summarizes the existing research on mimic defense, expounds the problems that need to be solved in mimic defense, and looks forward to the future development of mimic defense. 展开更多
关键词 Cyberspace Mimic defense Dynamic Heterogeneous Redundancy Structure defense technology Network Security
在线阅读 下载PDF
INSTRUCTIONS FOR AUTHORS
5
《Journal of Systems Engineering and Electronics》 2025年第2期F0003-F0003,共1页
Aims and scope Journal of Systems Engineering and Electronics,keeping abreast with the development trend of science and technology worldwide,reports the latest developments and achievements in both theoretical and pra... Aims and scope Journal of Systems Engineering and Electronics,keeping abreast with the development trend of science and technology worldwide,reports the latest developments and achievements in both theoretical and practical aspects of systems engineering,electronics and related research areas.The journal welcomes high quality original papers from a wide range of countries.The scope of the journal includes systems engineering,military systems,electronic technology,defense electronic technology,control theory and practice,software algorithm and simulation,reliability,computer development and application,and other topics in all related fields. 展开更多
关键词 high quality original papers control theory systems engineeringnilitary defense electronic technology systems engineering ELECTRONICS systems engineeringelectronics software algorithm
在线阅读 下载PDF
Symbol RFID Technology to be Deployed at United States Defense Logistics Agency's Distribution Centers Worldwide
6
作者 Symbol XR400 Fixed Readers to Support Department of Defense RFID Initiative 《射频世界》 2006年第5期76-76,共1页
Symbol Technologies, Inc., The Enterprise Mobility Company, today announced that it had been selected by ODIN technologies, the leader in the physics of RFID testing, software and deployment, to support its recent con... Symbol Technologies, Inc., The Enterprise Mobility Company, today announced that it had been selected by ODIN technologies, the leader in the physics of RFID testing, software and deployment, to support its recent contract win with the United States Defense Logistics Agency (DLA), the United States Department of Defense’s (DoD) logistics combat support agency that provides supplies and services to America’s military forces worldwide. 展开更多
关键词 RFID Symbol RFID technology to be Deployed at United States defense Logistics Agency’s Distribution Centers Worldwide DLA
原文传递
Luring cooperative capture guidance strategy for the pursuit—evasion game under incomplete target information
7
作者 Wenxue Chen Yudong Hu +1 位作者 Changsheng Gao Wuxing Jing 《Astrodynamics》 CSCD 2024年第4期675-688,共14页
In this work,we attempt to investigate a luring cooperative guidance strategy for three-player inducer–defender–attacker engagement with field-of-view(FOV)and overload constraints against an attacker with speed adva... In this work,we attempt to investigate a luring cooperative guidance strategy for three-player inducer–defender–attacker engagement with field-of-view(FOV)and overload constraints against an attacker with speed advantages under incomplete information.We formulate the three-player inducer–defender–attacker engagement problem as the pursuit–evasion(defender–attacker)game problem.On this basis,an analytical luring cooperative guidance strategy based on backstepping control is proposed to facilitate the defender with zero overloads intercepting the attacker.Additionally,under incomplete information,we offer a parameter delay design approach to delay the unknown parameters and state design.Afterward,an improved adaptive update law is devised to address the incomplete information.The proposed luring cooperative guidance,which incorporates backstepping control and an improved adaptive update law,can guarantee that the defender captures the attacker with zero overloads under luring by the inducer.Additionally,the proposed design adopts the directed communication topology network structure.Finally,we also execute simulations that demonstrate the effectiveness of the designed luring cooperative guidance strategy and reveal that it can be extended to double-hierarchical interception and four-on-two engagement interception. 展开更多
关键词 adaptive backstepping luring defense technology overload constraint field-of-view(FOV)constraint missile guidance distributed cooperative
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部