We present the numerical simulation results of a model granular assembly formed by spherical particles with tIertzian interaction subjected to a simple shear in the athermal quasi-static limit. The stress-strain curve...We present the numerical simulation results of a model granular assembly formed by spherical particles with tIertzian interaction subjected to a simple shear in the athermal quasi-static limit. The stress-strain curve is shown to separate into smooth, elastic branches followed by a subsequent plastic event. Mode analysis shows that the lowest-frequency vibrational mode is more localized, and eigenvalues and participation ratios of low- frequency modes exhibit similar power-law behavior as the system approaches plastic instability, indicating that the nature of plastic events in the granular system is also a saddle node bifurcation. The analysis of projection and spatial structure shows that over 75% contributions to the non-affine displacement field at a plastic instability come from the lowest-frequency mode, and the lowest-frequency mode is strongly spatially correlated with local plastic rearrangements, inferring that the lowest-frequency mode could be used as a predictor for future plastic rearrangements in the disordered system jammed marginally.展开更多
By minimizing a thermodynamic-like potential, we unbiasedly sample the potential energy landscape of soft and frictionless spheres under a constant shear stress. We obtain zero-temperature jammed states under desired ...By minimizing a thermodynamic-like potential, we unbiasedly sample the potential energy landscape of soft and frictionless spheres under a constant shear stress. We obtain zero-temperature jammed states under desired shear stresses and investigate their mechanical properties as a function of the shear stress. As a comparison, we also obtain the jammed states from the quasistatic-shear sampling in which the shear stress is not well-controlled. Although the yield stresses determined by both samplings show the same power-law scaling with the compression from the jamming transition point J at zero temperature and shear stress, for finite size systems the quasistatic-shear sampling leads to a lower yield stress and a higher critical volume fraction at point J. The shear modulus of the jammed solids decreases with increasing shear stress. However, the shear modulus does not decay to zero at yielding. This discontinuous change of the shear modulus implies the discontinuous nature of the unjamming transition under nonzero shear stress, which is further verified by the observation of a discontinuous jump in the pressure from the jammed solids to the shear flows. The pressure jump decreases upon decompression and approaches zero at the critical-like point J, in analogy with the well-known phase transitions under an external field. The analysis of the force networks in the jammed solids reveals that the force distribution is more sensitive to the increase of the shear stress near point J. The force network anisotropy increases with increasing shear stress. The weak particle contacts near the average force and under large shear stresses it exhibit an asymmetric angle distribution.展开更多
Frozen state from jammed state is one of the most interesting aspects produced when simulating the multidirectional pedestrian flow of high density crowds. Cases of real life situations for such a phenomenon are not e...Frozen state from jammed state is one of the most interesting aspects produced when simulating the multidirectional pedestrian flow of high density crowds. Cases of real life situations for such a phenomenon are not exhaustively treated.Our observations in the Hajj crowd show that freezing transition does not occur very often. On the contrary, penetrating a jammed crowd is a common aspect. We believe the kindness of pedestrians facing others whose walking is blocked is a main factor in eliminating the frozen state as well as in relieving the jammed state. We refine the social force model by incorporating a new social force to enable the simulated pedestrians to mimic the real behavior observed in the Hajj area.Simulations are performed to validate the work qualitatively.展开更多
This paper studies the force network properties of marginally and deeply jammed packings of frictionless soft particlesfrom the perspective of complex network theory. We generate zero-temperature granular packings at ...This paper studies the force network properties of marginally and deeply jammed packings of frictionless soft particlesfrom the perspective of complex network theory. We generate zero-temperature granular packings at different pressures by minimizing the inter-particle potential energy. The force networks are constructed as nodes representing particles and links representing normal forces between the particles. Deeply jammed solids show remarkably different behavior from marginally jammed solids in their degree distribution, strength distribution, degree correlation, and clustering coefficient. Bimodal and multi-modal distributions emerge when the system enters the deep jamming region. The results also show that small and large particles can show different correlation behavior in this simple system.展开更多
In high-intensity electromagnetic warfare,radar systems are persistently subjected to multi-jammer attacks,including potentially novel unknown jamming types that may emerge exclusively under wartime conditions.These j...In high-intensity electromagnetic warfare,radar systems are persistently subjected to multi-jammer attacks,including potentially novel unknown jamming types that may emerge exclusively under wartime conditions.These jamming signals severely degrade radar detection performance.Precise recognition of these unknown and compound jamming signals is critical to enhancing the anti-jamming capabilities and overall reliability of radar systems.To address this challenge,this article proposes a novel open-set compound jamming cognition(OSCJC)method.The proposed method employs a detection-classification dual-network architecture,which not only overcomes the false alarm and misdetection issues of traditional closed-set recognition methods when dealing with unknown jamming but also effectively addresses the performance bottleneck of existing open-set recognition techniques focusing on single jamming scenarios in compound jamming environments.To achieve unknown jamming detection,we first employ a consistency labeling strategy to train the detection network using diverse known jamming samples.This strategy enables the network to acquire highly generalizable jamming features,thereby accurately localizing candidate regions for individual jamming components within compound jamming.Subsequently,we introduce contrastive learning to optimize the classification network,significantly enhancing both intra-class clustering and inter-class separability in the jamming feature space.This method not only improves the recognition accuracy of the classification network for known jamming types but also enhances its sensitivity to unknown jamming types.Simulations and experimental data are used to verify the effectiveness of the proposed OSCJC method.Compared with the state-of-the-art open-set recognition methods,the proposed method demonstrates superior recognition accuracy and enhanced environmental adaptability.展开更多
In this paper,the joint design of transmit and receive beamformers for transmit subaperturing multiple-input-multiple-output(TS-MIMO)radar is investigated,aiming to enhance its low probability of intercept(LPI)capabil...In this paper,the joint design of transmit and receive beamformers for transmit subaperturing multiple-input-multiple-output(TS-MIMO)radar is investigated,aiming to enhance its low probability of intercept(LPI)capability.The main objective is to simultaneously minimize the transmission power,suppress the transmit sidelobe levels,and minimize the probability of intercept,thus bolstering the LPI performance of the radar system while maintaining the desired target detection performance.An alternative optimization method is proposed to jointly optimize the transmit and receive beamformers,yielding an unified LPI optimization framework.Particularly,the proposed iterative algorithm based on the Lagrange duality theory for transmit beamforming is more efficient than the conventional convex optimization method.Numerical experiments highlight the effectiveness of the proposed approach in sidelobe suppression and computational efficiency.展开更多
Experiments are carried out in an "S-shaped" flume in the laboratory under both open flow and ice-jammed conditions to study the impacts of bridge piers in a bend channel on the variation of the water level. The var...Experiments are carried out in an "S-shaped" flume in the laboratory under both open flow and ice-jammed conditions to study the impacts of bridge piers in a bend channel on the variation of the water level. The variations of the water level under the ice jammed condition with bridge piers are compared to those without bridge piers in an 180° bend channel. Results indicate that the bridge piers in the S-shaped channel have obvious impacts on the ice accumulation and the water level. The increment of the water level with the presence of the bridge piers is less than that without the bridge piers in the channel. Different arrangements of the bridge piers result in different increments of the water level. When one bridge pier is installed in the straight section of the channel(between 2 bends) and another one at the bend apex(for a convex bank), the increment of the water level during the equilibrium ice jammed period is between that with a single bridge pier located in the straight section of the bend channel and that with a single bridge pier located at the bend apex. It is also shown that the increment of the water level during the equilibrium ice jammed period increases with the increase of the average thickness of the ice jams.展开更多
Nonperiodic interrupted sampling repeater jamming(ISRJ)against inverse synthetic aperture radar(ISAR)can obtain two-dimensional blanket jamming performance by joint fast and slow time domain interrupted modulation,whi...Nonperiodic interrupted sampling repeater jamming(ISRJ)against inverse synthetic aperture radar(ISAR)can obtain two-dimensional blanket jamming performance by joint fast and slow time domain interrupted modulation,which is obviously dif-ferent from the conventional multi-false-target deception jam-ming.In this paper,a suppression method against this kind of novel jamming is proposed based on inter-pulse energy function and compressed sensing theory.By utilizing the discontinuous property of the jamming in slow time domain,the unjammed pulse is separated using the intra-pulse energy function diffe-rence.Based on this,the two-dimensional orthogonal matching pursuit(2D-OMP)algorithm is proposed.Further,it is proposed to reconstruct the ISAR image with the obtained unjammed pulse sequence.The validity of the proposed method is demon-strated via the Yake-42 plane data simulations.展开更多
To overcome the challenges of poor real-time performance,limited scalability,and low intelligence in conventional jamming pattern recognition methods,this paper proposes a method based on Wavelet Packet Decomposition(...To overcome the challenges of poor real-time performance,limited scalability,and low intelligence in conventional jamming pattern recognition methods,this paper proposes a method based on Wavelet Packet Decomposition(WPD)and enhanced deep learning techniques.In the proposed method,an agent at the receiver processes the received signal using WPD to generate an initial Spectrogram Waterfall(SW),which is subsequently segmented using a sliding window to serve as the input for the jamming recognition network.The network employs a bilateral filter to preprocess the input SW,thereby enhancing the edge features of the jamming signals.To extract abstract features,depthwise separable convolution is utilized instead of traditional convolution,thereby reducing the network’s parameter count and enhancing real-time performance.A pyramid pooling layer is integrated before the fully connected layer to enable the network to process input SW of varying sizes,thus enhancing scalability.During network training,adaptive moment estimation is employed as the optimizer,allowing the network to dynamically adjust the learning rate and accelerate convergence.A comprehensive comparison between the proposed jamming recognition network and six other models is conducted,along with Ablation Experiments(AE)based on numerical simulations.Simulation results demonstrate that the proposed method based on WPD and enhanced deep learning achieves high-precision recognition of various jamming patterns while maintaining a favorable balance among prediction accuracy,network complexity,and prediction time.展开更多
In this paper,we examine an illegal wireless communication network consisting of an illegal user receiving illegal signals from an illegal station and propose an active reconfigurable intelligent surface(ARIS)-assiste...In this paper,we examine an illegal wireless communication network consisting of an illegal user receiving illegal signals from an illegal station and propose an active reconfigurable intelligent surface(ARIS)-assisted multi-antenna jamming(MAJ)scheme denoted by ARIS-MAJ to interfere with the illegal signal transmission.In order to strike a balance between the jamming performance and the energy consumption,we consider a so-called jamming energy efficiency(JEE)which is defined as the ratio of achievable rate reduced by the jamming system to the corresponding power consumption.We formulate an optimization problem to maximize the JEE for the proposed ARIS-MAJ scheme by jointly optimizing the jammer’s beamforming vector and ARIS’s reflecting coefficients under the constraint that the jamming power received at the illegal user is lower than the illegal user’s detection threshold.To address the non-convex optimization problem,we propose the Dinkelbach-based alternating optimization(AO)algorithm by applying the semidefinite relaxation(SDR)algorithm with Gaussian randomization method.Numerical results validate that the proposed ARIS-MAJ scheme outperforms the passive reconfigurable intelligent surface(PRIS)-assisted multi-antenna jamming(PRIS-MAJ)scheme and the conventional multiantenna jamming scheme without RIS(NRIS-MAJ)in terms of the JEE.展开更多
In this paper,the application of Non-Orthogonal Multiple Access(NOMA)is investigated in a multiple-input single-output network consisting of multiple legitimate users and a potential eavesdropper.To support secure tra...In this paper,the application of Non-Orthogonal Multiple Access(NOMA)is investigated in a multiple-input single-output network consisting of multiple legitimate users and a potential eavesdropper.To support secure transmissions from legitimate users,two NOMA Secrecy Sum Rate Transmit Beam Forming(NOMA-SSR-TBF)schemes are proposed to maximise the SSR of a Base Station(BS)with sufficient and insufficient transmit power.For BS with sufficient transmit power,an artificial jamming beamforming design scheme is proposed to disrupt the potential eavesdropping without impacting the legitimate transmissions.In addition,for BS with insufficient transmit power,a modified successive interference cancellation decoding sequence is used to reduce the impact of artificial jamming on legitimate transmissions.More specifically,iterative algorithm for the successive convex approximation are provided to jointly optimise the vectors of transmit beamforming and artificial jamming.Experimental results demonstrate that the proposed NOMA-SSR-TBF schemes outperforms the existing works,such as the maximized artificial jamming power scheme,the maximized artificial jamming power scheme with artificial jamming beamforming design and maximized secrecy sum rate scheme without artificial jamming beamforming design.展开更多
Soft actuators are inherently flexible and compliant,traits that enhance their adaptability to diverse environments and tasks.However,their low structural stiffness can lead to unpredictable and uncontrollable complex...Soft actuators are inherently flexible and compliant,traits that enhance their adaptability to diverse environments and tasks.However,their low structural stiffness can lead to unpredictable and uncontrollable complex deformations when substantial force is required,compromising their load-bearing capacity.This work proposes a novel method that uses gecko setae-inspired adhesives as interlayer films to construct a layer jamming structure to adjust the stiffness of soft actuators.The mechanical behavior of a single tilted microcylinder was analyzed using the energy method to determine the adhesion force of the adhesives.The gecko-inspired adhesive was designed under the guidance of the adhesion force model.Testing under various loads and directions revealed that the tilted characteristic of microcylinders can enhance the adhesion force in its grasping direction.The adhesive demonstrated excellent adhesion performance compared to other typical adhesives.A tunable stiffness actuator using gecko setae-inspired adhesives(TSAGA),was developed with these adhesives serving as interlayer films.The stiffness model of TSAGA was derived by analyzing its axial compression force.The results of stiffness test indicate that the adhesives serve as interlayer films can adjust the stiffness in response to applied load.TSAGA was compared with other typical soft actuators in order to evaluate the stiffness performance,and the results indicate that TSAGA exhibits the highest stiffness and the widest tunable stiffness range.This demonstrates the superior performance of the setae-inspired adhesives as interlayer films in terms of stiffness adjustment.展开更多
With the widespread application of com-munication technology in the non-terrestrial network(NTN),the issue of the insecure communication due to the inherent openness of the NTN is increasingly being recognized.Consequ...With the widespread application of com-munication technology in the non-terrestrial network(NTN),the issue of the insecure communication due to the inherent openness of the NTN is increasingly being recognized.Consequently,safeguarding com-munication information in the NTN has emerged as a critical challenge.To address this issue,we pro-pose a beamforming and horizontal trajectory joint op-timization method for unmanned aerial vehicle(UAV)covert communications in the NTN.First,we formu-late an optimization problem that considers constraints such as the transmitting power and the distance.More-over,we employ the integrated communication and jamming(ICAJ)signal as Alice’s transmitting signal,further protecting the content of communication in-formation.Next,we construct two subproblems,and we propose an alternate optimization(AO)algorithm based on quadratic transform and penalty term method to solve the proposed two subproblems.Simulation re-sults demonstrate that the proposed method is effective and has better performance than benchmarks.展开更多
Cashew processing in Côte d’Ivoire focuses only on the cashew nut, to the detriment of the apple. Only a very small proportion of the apple is processed into juice. The aim of this work is to enhance the value o...Cashew processing in Côte d’Ivoire focuses only on the cashew nut, to the detriment of the apple. Only a very small proportion of the apple is processed into juice. The aim of this work is to enhance the value of cashew apples by transforming them into jam. Specifically, the aim was first to characterize the sensory properties of cashew apple jam formulations using baobab powder as a source of pectin and then to optimise the formulations. A Box-Behken design with pH, Sugar, and Baobab as factors was used to model and characterize the jam sensory descriptors, and a multivariate analysis with SensomineR was used to characterize the jam formulations. The desirability function was used to optimise the formulations. The results show globally significant regressions at the 0.05 threshold for the sensory descriptors Gelling, Brilliance, Smell, Sweetness, and (-)Astringency, with the exception of (-)Salinity. The R2 coefficients are greater than 80%. The factors studied could have effects on the sensory descriptors of cashew jam formulations. The Baobab had the main effect on the gelling, smell, and astringency of the jams. Brilliance depended on the added sugar. A product effect (p < 0.001) was observed for the descriptors Smell, Gelling, Brilliance, and Sweetness, as these allowed the panelists to find differences between the formulations. Optimum jam formulation can be achieved with 51.56% sugar and 2.12% Baobab at a pH of 3.15. Cashew apple jam using Baobab offers opportunities to add value to apples that have long been abandoned in the field. It would be important to find conditions for prolonged storage of this jam.展开更多
This paper studies the problem of jamming decision-making for dynamic multiple communication links in wireless communication networks(WCNs).We propose a novel jamming channel allocation and power decision-making(JCAPD...This paper studies the problem of jamming decision-making for dynamic multiple communication links in wireless communication networks(WCNs).We propose a novel jamming channel allocation and power decision-making(JCAPD)approach based on multi-agent deep reinforcement learning(MADRL).In high-dynamic and multi-target aviation communication environments,the rapid changes in channels make it difficult for sensors to accurately capture instantaneous channel state information.This poses a challenge to make centralized jamming decisions with single-agent deep reinforcement learning(DRL)approaches.In response,we design a distributed multi-agent decision architecture(DMADA).We formulate multi-jammer resource allocation as a multiagent Markov decision process(MDP)and propose a fingerprint-based double deep Q-Network(FBDDQN)algorithm for solving it.Each jammer functions as an agent that interacts with the environment in this framework.Through the design of a reasonable reward and training mechanism,our approach enables jammers to achieve distributed cooperation,significantly improving the jamming success rate while considering jamming power cost,and reducing the transmission rate of links.Our experimental results show the FBDDQN algorithm is superior to the baseline methods.展开更多
Unmanned aerial vehicles(UAVs)are expected to be extensively applied in military and commercial fields,but the issues of information security and energy restrictions hinder such applications.To cope with these issues,...Unmanned aerial vehicles(UAVs)are expected to be extensively applied in military and commercial fields,but the issues of information security and energy restrictions hinder such applications.To cope with these issues,joint beamforming and cooperative jamming are promising physicallayer technologies,which are advantageous in improving data rate,energy efficiency(EE),and information security.In this paper,the information security and EE in multi-antenna UAV communications are jointly considered by formulating an optimization problem of secrecy EE maximization subject to secrecy rate and power constraints.The resulting optimization problem focuses on designing the transmit covariance matrices of confidential messages and artificial interference,and is solved in an iterative manner based on the optimization methods of fractional programming and successive convex approximation(SCA).Numerical simulation results demonstrate that the proposed algorithm achieves a significant gain in secrecy EE while satisfying the requirements of secrecy rate and maximum power.展开更多
Jamming suppression is traditionally achieved through the use of spatial filters based on array signal processing theory.In order to achieve better jamming suppression performance,many studies have applied blind sourc...Jamming suppression is traditionally achieved through the use of spatial filters based on array signal processing theory.In order to achieve better jamming suppression performance,many studies have applied blind source separation(BSS)to jamming suppression.BSS can achieve the separation and extraction of the individual source signals from the mixed signal received by the array.This paper proposes a perspective to recognize BSS as spatial band-pass filters(SBPFs)for jamming suppression applications.The theoretical derivation indicates that the processing of mixed signals by BSS can be perceived as the application of a set of SBPFs that gate the source signals at various angles.Simulations are performed using radar jamming suppression as an example.The simulation results suggest that BSS and SBPFs produce approximately the same effects.Simulation results are consistent with theoretical derivation results.展开更多
Dear Editor,With the advances in computing and communication technologies,the cyber-physical system(CPS),has been used in lots of industrial fields,such as the urban water cycle,internet of things,and human-cyber syst...Dear Editor,With the advances in computing and communication technologies,the cyber-physical system(CPS),has been used in lots of industrial fields,such as the urban water cycle,internet of things,and human-cyber systems[1],[2],which has to face up to malicious cyber-attacks towards cyber communication of control commands.Specifically,jamming attack is regarded as one of the most common attacks of decreasing network performance.Game theory is widely regarded as a method of accurately describing the interaction between jamming attacker and legitimate user[3].In the cyber layer,the signal game model has been utilized to describe the transmission between the attacker and defender[4].However,most previous game theoretical researches are not feasible to meet the demands of industrial CPSs mainly due to the shared communication network nature.Specifically,it leads to incomplete information for players of game owing to various network-induced phenomena and employed communication protocols.In the physical layer,the secure control[5]and estimation[6]under attack detection have been studied for CPSs.However,these methods not only rely heavily on signals injection detection,but also have no access to smart attackers who launch covert attacks so that data receivers cannot observe the attack behaviour[7].Accordingly,the motivation arising here is to tackle the nested game problem for CPSs subject to jamming attack.展开更多
基金Supported by the National Natural Science Foundation of China under Grant Nos 11272048 and 51239006the European Commission Marie Curie Actions under Grant No IRSES-294976
文摘We present the numerical simulation results of a model granular assembly formed by spherical particles with tIertzian interaction subjected to a simple shear in the athermal quasi-static limit. The stress-strain curve is shown to separate into smooth, elastic branches followed by a subsequent plastic event. Mode analysis shows that the lowest-frequency vibrational mode is more localized, and eigenvalues and participation ratios of low- frequency modes exhibit similar power-law behavior as the system approaches plastic instability, indicating that the nature of plastic events in the granular system is also a saddle node bifurcation. The analysis of projection and spatial structure shows that over 75% contributions to the non-affine displacement field at a plastic instability come from the lowest-frequency mode, and the lowest-frequency mode is strongly spatially correlated with local plastic rearrangements, inferring that the lowest-frequency mode could be used as a predictor for future plastic rearrangements in the disordered system jammed marginally.
基金supported by the National Natural Science Foundation of China(Grant No.21325418)the National Basic Research Program of China(GrantNo.2012CB821500)+1 种基金the Chinese Academy of Sciences 100-Talent Program(Grant No.2030020004)the Fundamental Research Funds for the Central Universities,China(Grant No.2340000034)
文摘By minimizing a thermodynamic-like potential, we unbiasedly sample the potential energy landscape of soft and frictionless spheres under a constant shear stress. We obtain zero-temperature jammed states under desired shear stresses and investigate their mechanical properties as a function of the shear stress. As a comparison, we also obtain the jammed states from the quasistatic-shear sampling in which the shear stress is not well-controlled. Although the yield stresses determined by both samplings show the same power-law scaling with the compression from the jamming transition point J at zero temperature and shear stress, for finite size systems the quasistatic-shear sampling leads to a lower yield stress and a higher critical volume fraction at point J. The shear modulus of the jammed solids decreases with increasing shear stress. However, the shear modulus does not decay to zero at yielding. This discontinuous change of the shear modulus implies the discontinuous nature of the unjamming transition under nonzero shear stress, which is further verified by the observation of a discontinuous jump in the pressure from the jammed solids to the shear flows. The pressure jump decreases upon decompression and approaches zero at the critical-like point J, in analogy with the well-known phase transitions under an external field. The analysis of the force networks in the jammed solids reveals that the force distribution is more sensitive to the increase of the shear stress near point J. The force network anisotropy increases with increasing shear stress. The weak particle contacts near the average force and under large shear stresses it exhibit an asymmetric angle distribution.
文摘Frozen state from jammed state is one of the most interesting aspects produced when simulating the multidirectional pedestrian flow of high density crowds. Cases of real life situations for such a phenomenon are not exhaustively treated.Our observations in the Hajj crowd show that freezing transition does not occur very often. On the contrary, penetrating a jammed crowd is a common aspect. We believe the kindness of pedestrians facing others whose walking is blocked is a main factor in eliminating the frozen state as well as in relieving the jammed state. We refine the social force model by incorporating a new social force to enable the simulated pedestrians to mimic the real behavior observed in the Hajj area.Simulations are performed to validate the work qualitatively.
基金supported by the National Natural Science Foundation of China (Grant No. 11034010)
文摘This paper studies the force network properties of marginally and deeply jammed packings of frictionless soft particlesfrom the perspective of complex network theory. We generate zero-temperature granular packings at different pressures by minimizing the inter-particle potential energy. The force networks are constructed as nodes representing particles and links representing normal forces between the particles. Deeply jammed solids show remarkably different behavior from marginally jammed solids in their degree distribution, strength distribution, degree correlation, and clustering coefficient. Bimodal and multi-modal distributions emerge when the system enters the deep jamming region. The results also show that small and large particles can show different correlation behavior in this simple system.
文摘In high-intensity electromagnetic warfare,radar systems are persistently subjected to multi-jammer attacks,including potentially novel unknown jamming types that may emerge exclusively under wartime conditions.These jamming signals severely degrade radar detection performance.Precise recognition of these unknown and compound jamming signals is critical to enhancing the anti-jamming capabilities and overall reliability of radar systems.To address this challenge,this article proposes a novel open-set compound jamming cognition(OSCJC)method.The proposed method employs a detection-classification dual-network architecture,which not only overcomes the false alarm and misdetection issues of traditional closed-set recognition methods when dealing with unknown jamming but also effectively addresses the performance bottleneck of existing open-set recognition techniques focusing on single jamming scenarios in compound jamming environments.To achieve unknown jamming detection,we first employ a consistency labeling strategy to train the detection network using diverse known jamming samples.This strategy enables the network to acquire highly generalizable jamming features,thereby accurately localizing candidate regions for individual jamming components within compound jamming.Subsequently,we introduce contrastive learning to optimize the classification network,significantly enhancing both intra-class clustering and inter-class separability in the jamming feature space.This method not only improves the recognition accuracy of the classification network for known jamming types but also enhances its sensitivity to unknown jamming types.Simulations and experimental data are used to verify the effectiveness of the proposed OSCJC method.Compared with the state-of-the-art open-set recognition methods,the proposed method demonstrates superior recognition accuracy and enhanced environmental adaptability.
基金supported by the National Natural Science Foundation of China(62271247)the Natural Science Foundation of Jiangsu Province(BK20240181)+4 种基金the Dreams Foundation of Jianghuai Advance Technology Center(2023-ZM01D001)the National Aerospace Science Foundation of China(20220055052001)the Qing Lan Project of Jiangsu Provincethe Fund of Prospective Layout of Scientific Research for Nanjing University of Aeronautics and Astronauticsthe Key Laboratory of Radar Imaging and Microwave Photonics(Nanjing University of Aeronautics and Astronautics),Ministry of Education。
文摘In this paper,the joint design of transmit and receive beamformers for transmit subaperturing multiple-input-multiple-output(TS-MIMO)radar is investigated,aiming to enhance its low probability of intercept(LPI)capability.The main objective is to simultaneously minimize the transmission power,suppress the transmit sidelobe levels,and minimize the probability of intercept,thus bolstering the LPI performance of the radar system while maintaining the desired target detection performance.An alternative optimization method is proposed to jointly optimize the transmit and receive beamformers,yielding an unified LPI optimization framework.Particularly,the proposed iterative algorithm based on the Lagrange duality theory for transmit beamforming is more efficient than the conventional convex optimization method.Numerical experiments highlight the effectiveness of the proposed approach in sidelobe suppression and computational efficiency.
基金Project supported by the National Natural Science Foundation of China(Grant No.51379054)
文摘Experiments are carried out in an "S-shaped" flume in the laboratory under both open flow and ice-jammed conditions to study the impacts of bridge piers in a bend channel on the variation of the water level. The variations of the water level under the ice jammed condition with bridge piers are compared to those without bridge piers in an 180° bend channel. Results indicate that the bridge piers in the S-shaped channel have obvious impacts on the ice accumulation and the water level. The increment of the water level with the presence of the bridge piers is less than that without the bridge piers in the channel. Different arrangements of the bridge piers result in different increments of the water level. When one bridge pier is installed in the straight section of the channel(between 2 bends) and another one at the bend apex(for a convex bank), the increment of the water level during the equilibrium ice jammed period is between that with a single bridge pier located in the straight section of the bend channel and that with a single bridge pier located at the bend apex. It is also shown that the increment of the water level during the equilibrium ice jammed period increases with the increase of the average thickness of the ice jams.
基金supported by the National Natural Science Foundation of China(62001481,61890542,62071475)the Natural Science Foundation of Hunan Province(2022JJ40561)the Research Program of National University of Defense Technology(ZK22-46).
文摘Nonperiodic interrupted sampling repeater jamming(ISRJ)against inverse synthetic aperture radar(ISAR)can obtain two-dimensional blanket jamming performance by joint fast and slow time domain interrupted modulation,which is obviously dif-ferent from the conventional multi-false-target deception jam-ming.In this paper,a suppression method against this kind of novel jamming is proposed based on inter-pulse energy function and compressed sensing theory.By utilizing the discontinuous property of the jamming in slow time domain,the unjammed pulse is separated using the intra-pulse energy function diffe-rence.Based on this,the two-dimensional orthogonal matching pursuit(2D-OMP)algorithm is proposed.Further,it is proposed to reconstruct the ISAR image with the obtained unjammed pulse sequence.The validity of the proposed method is demon-strated via the Yake-42 plane data simulations.
基金supported by National Natural Science Foundation of China under Grant U23A20279China Electronics Tian’ao Innovation Theory and Technology Group Fund under Grand 20221193-04-04.
文摘To overcome the challenges of poor real-time performance,limited scalability,and low intelligence in conventional jamming pattern recognition methods,this paper proposes a method based on Wavelet Packet Decomposition(WPD)and enhanced deep learning techniques.In the proposed method,an agent at the receiver processes the received signal using WPD to generate an initial Spectrogram Waterfall(SW),which is subsequently segmented using a sliding window to serve as the input for the jamming recognition network.The network employs a bilateral filter to preprocess the input SW,thereby enhancing the edge features of the jamming signals.To extract abstract features,depthwise separable convolution is utilized instead of traditional convolution,thereby reducing the network’s parameter count and enhancing real-time performance.A pyramid pooling layer is integrated before the fully connected layer to enable the network to process input SW of varying sizes,thus enhancing scalability.During network training,adaptive moment estimation is employed as the optimizer,allowing the network to dynamically adjust the learning rate and accelerate convergence.A comprehensive comparison between the proposed jamming recognition network and six other models is conducted,along with Ablation Experiments(AE)based on numerical simulations.Simulation results demonstrate that the proposed method based on WPD and enhanced deep learning achieves high-precision recognition of various jamming patterns while maintaining a favorable balance among prediction accuracy,network complexity,and prediction time.
基金supported in part by the National Natural Science Foundation of China under Grant 62071253,Grant 62371252 and Grant 62271268in part by the Jiangsu Provincial Key Research and Development Program under Grant BE2022800in part by the Jiangsu Provincial 333 Talent Project.
文摘In this paper,we examine an illegal wireless communication network consisting of an illegal user receiving illegal signals from an illegal station and propose an active reconfigurable intelligent surface(ARIS)-assisted multi-antenna jamming(MAJ)scheme denoted by ARIS-MAJ to interfere with the illegal signal transmission.In order to strike a balance between the jamming performance and the energy consumption,we consider a so-called jamming energy efficiency(JEE)which is defined as the ratio of achievable rate reduced by the jamming system to the corresponding power consumption.We formulate an optimization problem to maximize the JEE for the proposed ARIS-MAJ scheme by jointly optimizing the jammer’s beamforming vector and ARIS’s reflecting coefficients under the constraint that the jamming power received at the illegal user is lower than the illegal user’s detection threshold.To address the non-convex optimization problem,we propose the Dinkelbach-based alternating optimization(AO)algorithm by applying the semidefinite relaxation(SDR)algorithm with Gaussian randomization method.Numerical results validate that the proposed ARIS-MAJ scheme outperforms the passive reconfigurable intelligent surface(PRIS)-assisted multi-antenna jamming(PRIS-MAJ)scheme and the conventional multiantenna jamming scheme without RIS(NRIS-MAJ)in terms of the JEE.
基金supported in part by the Natural Science Foundation of Fujian Province under Grant 2022J01169the Local Science and Technology Development of Fujian Province under Grant 2021L3010+3 种基金the Key Project of Science and Technology Innovation of Fujian Province under Grant 2021G02006the National Natural Science Foundation of China under Grants 61971360 and 62271420the National Natural Science Foundation of China under Grant 62071247the Urban Carbon Neutral Science and Technology Innovation Fund Project of Beijing University of Technology ($040000514122607$)。
文摘In this paper,the application of Non-Orthogonal Multiple Access(NOMA)is investigated in a multiple-input single-output network consisting of multiple legitimate users and a potential eavesdropper.To support secure transmissions from legitimate users,two NOMA Secrecy Sum Rate Transmit Beam Forming(NOMA-SSR-TBF)schemes are proposed to maximise the SSR of a Base Station(BS)with sufficient and insufficient transmit power.For BS with sufficient transmit power,an artificial jamming beamforming design scheme is proposed to disrupt the potential eavesdropping without impacting the legitimate transmissions.In addition,for BS with insufficient transmit power,a modified successive interference cancellation decoding sequence is used to reduce the impact of artificial jamming on legitimate transmissions.More specifically,iterative algorithm for the successive convex approximation are provided to jointly optimise the vectors of transmit beamforming and artificial jamming.Experimental results demonstrate that the proposed NOMA-SSR-TBF schemes outperforms the existing works,such as the maximized artificial jamming power scheme,the maximized artificial jamming power scheme with artificial jamming beamforming design and maximized secrecy sum rate scheme without artificial jamming beamforming design.
基金supported by Jiangsu Special Project for Frontier Leading Base Technology(Grant Nos.BK20192004)Fundamental Research Funds for Central Universities(Grant Nos.B240201190)+3 种基金Changzhou Social Development Science and Technology Support Project(Grant Nos.CE20225037)Changzhou Science and Technology Project(Grant Nos.CM20223014)Suzhou Key Industrial Technology Innovation Forward-Looking Application Research Project(Grant Nos.SYG202143)Changzhou Science and Technology Project(Grant Nos.CJ20241061).
文摘Soft actuators are inherently flexible and compliant,traits that enhance their adaptability to diverse environments and tasks.However,their low structural stiffness can lead to unpredictable and uncontrollable complex deformations when substantial force is required,compromising their load-bearing capacity.This work proposes a novel method that uses gecko setae-inspired adhesives as interlayer films to construct a layer jamming structure to adjust the stiffness of soft actuators.The mechanical behavior of a single tilted microcylinder was analyzed using the energy method to determine the adhesion force of the adhesives.The gecko-inspired adhesive was designed under the guidance of the adhesion force model.Testing under various loads and directions revealed that the tilted characteristic of microcylinders can enhance the adhesion force in its grasping direction.The adhesive demonstrated excellent adhesion performance compared to other typical adhesives.A tunable stiffness actuator using gecko setae-inspired adhesives(TSAGA),was developed with these adhesives serving as interlayer films.The stiffness model of TSAGA was derived by analyzing its axial compression force.The results of stiffness test indicate that the adhesives serve as interlayer films can adjust the stiffness in response to applied load.TSAGA was compared with other typical soft actuators in order to evaluate the stiffness performance,and the results indicate that TSAGA exhibits the highest stiffness and the widest tunable stiffness range.This demonstrates the superior performance of the setae-inspired adhesives as interlayer films in terms of stiffness adjustment.
基金supported in part by the National Natural Science Foundation of China under Grant U2441250 and 62231027in part by Natural Science Basic Research Programof Shaanxi under Grant 2024JC-JCQN-63+2 种基金in part by InnovationCapability Support Program of Shaanxi under Grant2024RS-CXTD-01in part by New Technology Research University Cooperation Project under Grant SKX242010031in part by the FundamentalResearch Funds for the Central Universities and theInnovation Fund of Xidian University under GrantYJSJ25007.
文摘With the widespread application of com-munication technology in the non-terrestrial network(NTN),the issue of the insecure communication due to the inherent openness of the NTN is increasingly being recognized.Consequently,safeguarding com-munication information in the NTN has emerged as a critical challenge.To address this issue,we pro-pose a beamforming and horizontal trajectory joint op-timization method for unmanned aerial vehicle(UAV)covert communications in the NTN.First,we formu-late an optimization problem that considers constraints such as the transmitting power and the distance.More-over,we employ the integrated communication and jamming(ICAJ)signal as Alice’s transmitting signal,further protecting the content of communication in-formation.Next,we construct two subproblems,and we propose an alternate optimization(AO)algorithm based on quadratic transform and penalty term method to solve the proposed two subproblems.Simulation re-sults demonstrate that the proposed method is effective and has better performance than benchmarks.
文摘Cashew processing in Côte d’Ivoire focuses only on the cashew nut, to the detriment of the apple. Only a very small proportion of the apple is processed into juice. The aim of this work is to enhance the value of cashew apples by transforming them into jam. Specifically, the aim was first to characterize the sensory properties of cashew apple jam formulations using baobab powder as a source of pectin and then to optimise the formulations. A Box-Behken design with pH, Sugar, and Baobab as factors was used to model and characterize the jam sensory descriptors, and a multivariate analysis with SensomineR was used to characterize the jam formulations. The desirability function was used to optimise the formulations. The results show globally significant regressions at the 0.05 threshold for the sensory descriptors Gelling, Brilliance, Smell, Sweetness, and (-)Astringency, with the exception of (-)Salinity. The R2 coefficients are greater than 80%. The factors studied could have effects on the sensory descriptors of cashew jam formulations. The Baobab had the main effect on the gelling, smell, and astringency of the jams. Brilliance depended on the added sugar. A product effect (p < 0.001) was observed for the descriptors Smell, Gelling, Brilliance, and Sweetness, as these allowed the panelists to find differences between the formulations. Optimum jam formulation can be achieved with 51.56% sugar and 2.12% Baobab at a pH of 3.15. Cashew apple jam using Baobab offers opportunities to add value to apples that have long been abandoned in the field. It would be important to find conditions for prolonged storage of this jam.
基金supported in part by the National Natural Science Foundation of China(No.61906156).
文摘This paper studies the problem of jamming decision-making for dynamic multiple communication links in wireless communication networks(WCNs).We propose a novel jamming channel allocation and power decision-making(JCAPD)approach based on multi-agent deep reinforcement learning(MADRL).In high-dynamic and multi-target aviation communication environments,the rapid changes in channels make it difficult for sensors to accurately capture instantaneous channel state information.This poses a challenge to make centralized jamming decisions with single-agent deep reinforcement learning(DRL)approaches.In response,we design a distributed multi-agent decision architecture(DMADA).We formulate multi-jammer resource allocation as a multiagent Markov decision process(MDP)and propose a fingerprint-based double deep Q-Network(FBDDQN)algorithm for solving it.Each jammer functions as an agent that interacts with the environment in this framework.Through the design of a reasonable reward and training mechanism,our approach enables jammers to achieve distributed cooperation,significantly improving the jamming success rate while considering jamming power cost,and reducing the transmission rate of links.Our experimental results show the FBDDQN algorithm is superior to the baseline methods.
基金Supported by the National Natural Science Foundation of China(No.61871401).
文摘Unmanned aerial vehicles(UAVs)are expected to be extensively applied in military and commercial fields,but the issues of information security and energy restrictions hinder such applications.To cope with these issues,joint beamforming and cooperative jamming are promising physicallayer technologies,which are advantageous in improving data rate,energy efficiency(EE),and information security.In this paper,the information security and EE in multi-antenna UAV communications are jointly considered by formulating an optimization problem of secrecy EE maximization subject to secrecy rate and power constraints.The resulting optimization problem focuses on designing the transmit covariance matrices of confidential messages and artificial interference,and is solved in an iterative manner based on the optimization methods of fractional programming and successive convex approximation(SCA).Numerical simulation results demonstrate that the proposed algorithm achieves a significant gain in secrecy EE while satisfying the requirements of secrecy rate and maximum power.
基金supported by the National Natural Science Foundation of China(6237104662201048)the Natural Science Foundation of Chongqing,China(cstc2020jcyj-msxmX0260).
文摘Jamming suppression is traditionally achieved through the use of spatial filters based on array signal processing theory.In order to achieve better jamming suppression performance,many studies have applied blind source separation(BSS)to jamming suppression.BSS can achieve the separation and extraction of the individual source signals from the mixed signal received by the array.This paper proposes a perspective to recognize BSS as spatial band-pass filters(SBPFs)for jamming suppression applications.The theoretical derivation indicates that the processing of mixed signals by BSS can be perceived as the application of a set of SBPFs that gate the source signals at various angles.Simulations are performed using radar jamming suppression as an example.The simulation results suggest that BSS and SBPFs produce approximately the same effects.Simulation results are consistent with theoretical derivation results.
基金supported by the National Natural Science Foundation of China(62173136)the Natural Science Foundation of Hunan Province(2020JJ2013,2021JJ50047).
文摘Dear Editor,With the advances in computing and communication technologies,the cyber-physical system(CPS),has been used in lots of industrial fields,such as the urban water cycle,internet of things,and human-cyber systems[1],[2],which has to face up to malicious cyber-attacks towards cyber communication of control commands.Specifically,jamming attack is regarded as one of the most common attacks of decreasing network performance.Game theory is widely regarded as a method of accurately describing the interaction between jamming attacker and legitimate user[3].In the cyber layer,the signal game model has been utilized to describe the transmission between the attacker and defender[4].However,most previous game theoretical researches are not feasible to meet the demands of industrial CPSs mainly due to the shared communication network nature.Specifically,it leads to incomplete information for players of game owing to various network-induced phenomena and employed communication protocols.In the physical layer,the secure control[5]and estimation[6]under attack detection have been studied for CPSs.However,these methods not only rely heavily on signals injection detection,but also have no access to smart attackers who launch covert attacks so that data receivers cannot observe the attack behaviour[7].Accordingly,the motivation arising here is to tackle the nested game problem for CPSs subject to jamming attack.