期刊文献+
共找到264篇文章
< 1 2 14 >
每页显示 20 50 100
OSCJC:An open-set compound jamming cognition method for radar systems in high-intensity electromagnetic warfare
1
作者 Kaixiang Zhang Jiaxiang Zhang +3 位作者 Xinrui Han Yilin Wang Bo Wang Quanhua Liu 《Defence Technology(防务技术)》 2026年第1期436-455,共20页
In high-intensity electromagnetic warfare,radar systems are persistently subjected to multi-jammer attacks,including potentially novel unknown jamming types that may emerge exclusively under wartime conditions.These j... In high-intensity electromagnetic warfare,radar systems are persistently subjected to multi-jammer attacks,including potentially novel unknown jamming types that may emerge exclusively under wartime conditions.These jamming signals severely degrade radar detection performance.Precise recognition of these unknown and compound jamming signals is critical to enhancing the anti-jamming capabilities and overall reliability of radar systems.To address this challenge,this article proposes a novel open-set compound jamming cognition(OSCJC)method.The proposed method employs a detection-classification dual-network architecture,which not only overcomes the false alarm and misdetection issues of traditional closed-set recognition methods when dealing with unknown jamming but also effectively addresses the performance bottleneck of existing open-set recognition techniques focusing on single jamming scenarios in compound jamming environments.To achieve unknown jamming detection,we first employ a consistency labeling strategy to train the detection network using diverse known jamming samples.This strategy enables the network to acquire highly generalizable jamming features,thereby accurately localizing candidate regions for individual jamming components within compound jamming.Subsequently,we introduce contrastive learning to optimize the classification network,significantly enhancing both intra-class clustering and inter-class separability in the jamming feature space.This method not only improves the recognition accuracy of the classification network for known jamming types but also enhances its sensitivity to unknown jamming types.Simulations and experimental data are used to verify the effectiveness of the proposed OSCJC method.Compared with the state-of-the-art open-set recognition methods,the proposed method demonstrates superior recognition accuracy and enhanced environmental adaptability. 展开更多
关键词 Radar compound jamming cognition Open-set recognition Detection-classification dual-network Time-frequency analysis Contrastive learning
在线阅读 下载PDF
Nonperiodic interrupted sampling repeater jamming suppression for inverse synthetic aperture radar 被引量:1
2
作者 WU Qihua ZHAO Feng +3 位作者 ZHAO Tiehua LIU Xiaobin XU Zhiming XIAO Shunping 《Journal of Systems Engineering and Electronics》 2025年第4期940-950,共11页
Nonperiodic interrupted sampling repeater jamming(ISRJ)against inverse synthetic aperture radar(ISAR)can obtain two-dimensional blanket jamming performance by joint fast and slow time domain interrupted modulation,whi... Nonperiodic interrupted sampling repeater jamming(ISRJ)against inverse synthetic aperture radar(ISAR)can obtain two-dimensional blanket jamming performance by joint fast and slow time domain interrupted modulation,which is obviously dif-ferent from the conventional multi-false-target deception jam-ming.In this paper,a suppression method against this kind of novel jamming is proposed based on inter-pulse energy function and compressed sensing theory.By utilizing the discontinuous property of the jamming in slow time domain,the unjammed pulse is separated using the intra-pulse energy function diffe-rence.Based on this,the two-dimensional orthogonal matching pursuit(2D-OMP)algorithm is proposed.Further,it is proposed to reconstruct the ISAR image with the obtained unjammed pulse sequence.The validity of the proposed method is demon-strated via the Yake-42 plane data simulations. 展开更多
关键词 jamming suppression compressed sensing(CS) interrupted sampling repeater jamming(ISRJ) energy function inverse synthetic aperture radar(ISAR).
在线阅读 下载PDF
Jamming recognition method based on wavelet packet decomposition and improved deep learning 被引量:1
3
作者 Qi Wu Gang Li +4 位作者 Xiang Wang Hao Luo Lianghong Li Qianbin Chen Xiaorong Jing 《Digital Communications and Networks》 2025年第5期1469-1478,共10页
To overcome the challenges of poor real-time performance,limited scalability,and low intelligence in conventional jamming pattern recognition methods,this paper proposes a method based on Wavelet Packet Decomposition(... To overcome the challenges of poor real-time performance,limited scalability,and low intelligence in conventional jamming pattern recognition methods,this paper proposes a method based on Wavelet Packet Decomposition(WPD)and enhanced deep learning techniques.In the proposed method,an agent at the receiver processes the received signal using WPD to generate an initial Spectrogram Waterfall(SW),which is subsequently segmented using a sliding window to serve as the input for the jamming recognition network.The network employs a bilateral filter to preprocess the input SW,thereby enhancing the edge features of the jamming signals.To extract abstract features,depthwise separable convolution is utilized instead of traditional convolution,thereby reducing the network’s parameter count and enhancing real-time performance.A pyramid pooling layer is integrated before the fully connected layer to enable the network to process input SW of varying sizes,thus enhancing scalability.During network training,adaptive moment estimation is employed as the optimizer,allowing the network to dynamically adjust the learning rate and accelerate convergence.A comprehensive comparison between the proposed jamming recognition network and six other models is conducted,along with Ablation Experiments(AE)based on numerical simulations.Simulation results demonstrate that the proposed method based on WPD and enhanced deep learning achieves high-precision recognition of various jamming patterns while maintaining a favorable balance among prediction accuracy,network complexity,and prediction time. 展开更多
关键词 Wavelet packet decomposition Improved deep learning Spectrogram waterfall Pyramid pooling jamming recognition
在线阅读 下载PDF
Energy Efficiency Optimization for Active Reconfigurable Intelligent Surface Assisted Multi-Antenna Jamming Systems 被引量:1
4
作者 Qin Hao Zhu Jia +5 位作者 Zou Yulong Li Yizhi Lou Yulei Zhang Afei Hui Hao Qin Changjian 《China Communications》 2025年第6期44-56,共13页
In this paper,we examine an illegal wireless communication network consisting of an illegal user receiving illegal signals from an illegal station and propose an active reconfigurable intelligent surface(ARIS)-assiste... In this paper,we examine an illegal wireless communication network consisting of an illegal user receiving illegal signals from an illegal station and propose an active reconfigurable intelligent surface(ARIS)-assisted multi-antenna jamming(MAJ)scheme denoted by ARIS-MAJ to interfere with the illegal signal transmission.In order to strike a balance between the jamming performance and the energy consumption,we consider a so-called jamming energy efficiency(JEE)which is defined as the ratio of achievable rate reduced by the jamming system to the corresponding power consumption.We formulate an optimization problem to maximize the JEE for the proposed ARIS-MAJ scheme by jointly optimizing the jammer’s beamforming vector and ARIS’s reflecting coefficients under the constraint that the jamming power received at the illegal user is lower than the illegal user’s detection threshold.To address the non-convex optimization problem,we propose the Dinkelbach-based alternating optimization(AO)algorithm by applying the semidefinite relaxation(SDR)algorithm with Gaussian randomization method.Numerical results validate that the proposed ARIS-MAJ scheme outperforms the passive reconfigurable intelligent surface(PRIS)-assisted multi-antenna jamming(PRIS-MAJ)scheme and the conventional multiantenna jamming scheme without RIS(NRIS-MAJ)in terms of the JEE. 展开更多
关键词 active reconfigurable intelligent surface(ARIS) beamforming optimization jamming energy efficiency(JEE)
在线阅读 下载PDF
PPA/TPU复合改性沥青在Jamming转变下的改性机理研究
5
作者 王青松 《城市建筑》 2025年第6期195-199,共5页
为研究多聚磷酸(PPA)与热塑性聚氨酯(TPU)复合改性沥青的改性机理及性能,对不同沥青试样采用红外光谱和扫描电镜试验分析其改性机理,用差示扫描量热和热重试验评价相转变后的热力学性质和热稳定性。结果表明:复合改性沥青的改性机理为... 为研究多聚磷酸(PPA)与热塑性聚氨酯(TPU)复合改性沥青的改性机理及性能,对不同沥青试样采用红外光谱和扫描电镜试验分析其改性机理,用差示扫描量热和热重试验评价相转变后的热力学性质和热稳定性。结果表明:复合改性沥青的改性机理为化学改性,反应产物氨基聚磷酸酯和微观结构的变化对Jamming转变的影响均有利于低温性能的改善;PPA使复合改性沥青较TPU改性沥青更接近均相体系,这种改变能降低复合改性沥青的玻璃化转变温度,但对热稳定性能不利。 展开更多
关键词 改性机理 jamming转变 微相分离
在线阅读 下载PDF
Dynamic Multi-Target Jamming Channel Allocation and Power Decision-Making in Wireless Communication Networks:A Multi-Agent Deep Reinforcement Learning Approach
6
作者 Peng Xiang Xu Hua +4 位作者 Qi Zisen Wang Dan Zhang Yue Rao Ning Gu Wanyi 《China Communications》 2025年第5期71-91,共21页
This paper studies the problem of jamming decision-making for dynamic multiple communication links in wireless communication networks(WCNs).We propose a novel jamming channel allocation and power decision-making(JCAPD... This paper studies the problem of jamming decision-making for dynamic multiple communication links in wireless communication networks(WCNs).We propose a novel jamming channel allocation and power decision-making(JCAPD)approach based on multi-agent deep reinforcement learning(MADRL).In high-dynamic and multi-target aviation communication environments,the rapid changes in channels make it difficult for sensors to accurately capture instantaneous channel state information.This poses a challenge to make centralized jamming decisions with single-agent deep reinforcement learning(DRL)approaches.In response,we design a distributed multi-agent decision architecture(DMADA).We formulate multi-jammer resource allocation as a multiagent Markov decision process(MDP)and propose a fingerprint-based double deep Q-Network(FBDDQN)algorithm for solving it.Each jammer functions as an agent that interacts with the environment in this framework.Through the design of a reasonable reward and training mechanism,our approach enables jammers to achieve distributed cooperation,significantly improving the jamming success rate while considering jamming power cost,and reducing the transmission rate of links.Our experimental results show the FBDDQN algorithm is superior to the baseline methods. 展开更多
关键词 jamming resource allocation JCAPD MADRL wireless communication countermeasure wireless communication networks
在线阅读 下载PDF
Robust Optimization Control for Cyber-Physical Systems Subject to Jamming Attack:A Nested Game Approach
7
作者 Min Shi Yuan Yuan 《IEEE/CAA Journal of Automatica Sinica》 2025年第6期1286-1288,共3页
Dear Editor,With the advances in computing and communication technologies,the cyber-physical system(CPS),has been used in lots of industrial fields,such as the urban water cycle,internet of things,and human-cyber syst... Dear Editor,With the advances in computing and communication technologies,the cyber-physical system(CPS),has been used in lots of industrial fields,such as the urban water cycle,internet of things,and human-cyber systems[1],[2],which has to face up to malicious cyber-attacks towards cyber communication of control commands.Specifically,jamming attack is regarded as one of the most common attacks of decreasing network performance.Game theory is widely regarded as a method of accurately describing the interaction between jamming attacker and legitimate user[3].In the cyber layer,the signal game model has been utilized to describe the transmission between the attacker and defender[4].However,most previous game theoretical researches are not feasible to meet the demands of industrial CPSs mainly due to the shared communication network nature.Specifically,it leads to incomplete information for players of game owing to various network-induced phenomena and employed communication protocols.In the physical layer,the secure control[5]and estimation[6]under attack detection have been studied for CPSs.However,these methods not only rely heavily on signals injection detection,but also have no access to smart attackers who launch covert attacks so that data receivers cannot observe the attack behaviour[7].Accordingly,the motivation arising here is to tackle the nested game problem for CPSs subject to jamming attack. 展开更多
关键词 decreasing network performancegame theory cyber physical systems signal game model robust optimization game theory industrial fields jamming attack urban water cycleinternet
在线阅读 下载PDF
Energy-efficient beamforming and full-duplex jamming for securing UAV communications
8
作者 WANG Dong XU Tengfei ZHENG Jing 《High Technology Letters》 2025年第4期415-422,共8页
Unmanned aerial vehicles(UAVs)are expected to be extensively applied in military and commercial fields,but the issues of information security and energy restrictions hinder such applications.To cope with these issues,... Unmanned aerial vehicles(UAVs)are expected to be extensively applied in military and commercial fields,but the issues of information security and energy restrictions hinder such applications.To cope with these issues,joint beamforming and cooperative jamming are promising physicallayer technologies,which are advantageous in improving data rate,energy efficiency(EE),and information security.In this paper,the information security and EE in multi-antenna UAV communications are jointly considered by formulating an optimization problem of secrecy EE maximization subject to secrecy rate and power constraints.The resulting optimization problem focuses on designing the transmit covariance matrices of confidential messages and artificial interference,and is solved in an iterative manner based on the optimization methods of fractional programming and successive convex approximation(SCA).Numerical simulation results demonstrate that the proposed algorithm achieves a significant gain in secrecy EE while satisfying the requirements of secrecy rate and maximum power. 展开更多
关键词 physical layer security unmanned aerial vehicle BEAMFORMING cooperative jamming
在线阅读 下载PDF
Beamforming Design for Integrated Communication and Jamming Systems with Unknown CSI:A Hybrid Data-Driven and Model-Based Approach
9
作者 Liu Jiteng Ding Guoru +2 位作者 Xu Yitao Wang Haichao Gu Jiangchun 《China Communications》 2025年第4期81-99,共19页
The integrated communication and jamming(ICAJ)system recently has been proposed to enable communication and jamming(C&J)to reinforce each other in one system.By exploiting the diversity gain of multiple input mult... The integrated communication and jamming(ICAJ)system recently has been proposed to enable communication and jamming(C&J)to reinforce each other in one system.By exploiting the diversity gain of multiple input multiple output(MIMO)technology,a specific implementation form of ICAJ system,called communication-aided collaborative jamming system,is designed to transmit C&J signals at the same time and frequency.Different from previous studies which overlook the jamming prior information acquisition process and assume that the prior information is perfect or with bounded error,this paper takes the non-cooperative characteristics of jamming and the consequent difficulty in prior information acquisition into consideration.To analyze the tradeoff between C&J,the integration metric is proposed and then the corresponding system design problem is formulated.However,the non-convexity of problem and the lack of jamming prior information make the optimization tricky.In this case,blind channel estimation(BCE)is introduced to obtain an approximate channel state information(CSI)without interacting with jamming targets and then the neural network embedded with system performance calculation model is developed to establish the correspondence between the estimated CSI and optimal beamforming design.Furthermore,a hybrid data-driven and model-based approach,blind channel estimation-deep learning(BCEDL),is proposed to accomplish the beamforming design based on unsupervised learning for ICAJ system in non-cooperative scenarios.The simulation results show that the BCE-DL algorithm outperforms the conventional algorithms in the presence of CSI estimation errors and is a flexible approach which takes the best of both data-driven and model-based methods to design the ICAJ system. 展开更多
关键词 blind channel estimation deep learning integrated communication and jamming(ICAJ) multiple input multiple output(MIMO)
在线阅读 下载PDF
Jamming suppression by blind source separation:from a perspective of spatial band-pass filters
10
作者 LIU Quanhua SUI Xinran +2 位作者 CHEN Xinliang LIANG Zhennan ZHU Rui 《Journal of Systems Engineering and Electronics》 2025年第5期1169-1176,共8页
Jamming suppression is traditionally achieved through the use of spatial filters based on array signal processing theory.In order to achieve better jamming suppression performance,many studies have applied blind sourc... Jamming suppression is traditionally achieved through the use of spatial filters based on array signal processing theory.In order to achieve better jamming suppression performance,many studies have applied blind source separation(BSS)to jamming suppression.BSS can achieve the separation and extraction of the individual source signals from the mixed signal received by the array.This paper proposes a perspective to recognize BSS as spatial band-pass filters(SBPFs)for jamming suppression applications.The theoretical derivation indicates that the processing of mixed signals by BSS can be perceived as the application of a set of SBPFs that gate the source signals at various angles.Simulations are performed using radar jamming suppression as an example.The simulation results suggest that BSS and SBPFs produce approximately the same effects.Simulation results are consistent with theoretical derivation results. 展开更多
关键词 blind source separation(BSS) jamming suppression spatial filtering
在线阅读 下载PDF
无线传感器网络中基于几何覆盖的Jamming攻击定位算法 被引量:9
11
作者 孙言强 王晓东 周兴铭 《通信学报》 EI CSCD 北大核心 2010年第11期10-16,共7页
提出一种基于几何覆盖理论的Jamming攻击定位(GCL,geometry-covering based localization)算法。GCL算法利用计算几何中的凸壳理论,特别是最小包容圆方法,对Jamming攻击者进行定位。理论证明了该算法的正确性和较低的时间复杂度(O(nlogn... 提出一种基于几何覆盖理论的Jamming攻击定位(GCL,geometry-covering based localization)算法。GCL算法利用计算几何中的凸壳理论,特别是最小包容圆方法,对Jamming攻击者进行定位。理论证明了该算法的正确性和较低的时间复杂度(O(nlogn));模拟实验表明,该算法在攻击者攻击范围、网络节点密度以及攻击者位置等度量值变化的情况下,比已有算法具有更好的定位准确度。 展开更多
关键词 无线传感器网络 jamming攻击 定位 最小包容圆
在线阅读 下载PDF
Sinusoidal FM Fuze's Channel Leak and Its Jamming Mechanism 被引量:1
12
作者 韩传钊 施聚生 崔占忠 《Journal of Beijing Institute of Technology》 EI CAS 1999年第4期392-397,共6页
Aim To get the theory base of designing FM fuze's jamming signal, its jamming mechanism was studied. Methods A sinusoidal FM fuze was analyzed in time domain and frequency domain and the concept of channel lea... Aim To get the theory base of designing FM fuze's jamming signal, its jamming mechanism was studied. Methods A sinusoidal FM fuze was analyzed in time domain and frequency domain and the concept of channel leak was presented. Results It was proved that information channel leak exists in FM fuze because of the nonlinear property of the mixer. The jamming signal was designed based on the channel leak and the jamming mechanism was analyzed in detail. Conclusion This kind of jamming signal can jam the sinusoidal FM fuzes effectively just depending on the jamming signal's feature itself. It's different from the traditional jamming way of simulating echo. Though the sinusoidal FM fuze was just analyzed, the principle is applicable to all FM fuzes. At the same time, it may be used as the reference for FM radar and communication countermeasures. 展开更多
关键词 FM fuze channel leak jamming mechanism jamming signal
在线阅读 下载PDF
Joint beamforming design for low probability of intercept in transmit subaperturing MIMO radar
13
作者 WU Jiale SHI Chenguang +1 位作者 WU Zhifeng ZHOU Jianjiang 《Journal of Systems Engineering and Electronics》 2026年第1期94-103,共10页
In this paper,the joint design of transmit and receive beamformers for transmit subaperturing multiple-input-multiple-output(TS-MIMO)radar is investigated,aiming to enhance its low probability of intercept(LPI)capabil... In this paper,the joint design of transmit and receive beamformers for transmit subaperturing multiple-input-multiple-output(TS-MIMO)radar is investigated,aiming to enhance its low probability of intercept(LPI)capability.The main objective is to simultaneously minimize the transmission power,suppress the transmit sidelobe levels,and minimize the probability of intercept,thus bolstering the LPI performance of the radar system while maintaining the desired target detection performance.An alternative optimization method is proposed to jointly optimize the transmit and receive beamformers,yielding an unified LPI optimization framework.Particularly,the proposed iterative algorithm based on the Lagrange duality theory for transmit beamforming is more efficient than the conventional convex optimization method.Numerical experiments highlight the effectiveness of the proposed approach in sidelobe suppression and computational efficiency. 展开更多
关键词 multiple-input-multiple-output(MIMO)radar BEAM-FORMING SUBARRAY low probability of intercept sidelobe suppression jamming
在线阅读 下载PDF
基于Jamming转变理论的沥青路面车辙演化机制 被引量:4
14
作者 赵晓康 张凯 +2 位作者 裴建中 张久鹏 计杰 《哈尔滨工业大学学报》 EI CAS CSCD 北大核心 2024年第9期150-160,共11页
沥青路面宏观车辙其实质是混合料细观结构演变的结果,为了深入理解路面车辙流变行为的发展过程,基于颗粒物质Jamming理论开展了沥青混合料车辙演化机制研究。采用图像处理技术构建了沥青混合料细观结构模型,基于时-温等效原理开展了车... 沥青路面宏观车辙其实质是混合料细观结构演变的结果,为了深入理解路面车辙流变行为的发展过程,基于颗粒物质Jamming理论开展了沥青混合料车辙演化机制研究。采用图像处理技术构建了沥青混合料细观结构模型,基于时-温等效原理开展了车辙仿真测试,分析了车辙变形过程中混合料宏细观结构的变化特征,探究了沥青路面Unjamming转变行为的影响规律与车辙演化机制。结果表明:Jamming理论可以很好地解释沥青路面的车辙演变全过程,车辙深度与沥青混合料颗粒的堵塞程度密切相关;随着加载时间和作用荷载的增加,混合料Jamming堵塞程度增大,车辙深度和面积分数也逐渐增加,并最终趋于稳定,颗粒体系Jammed态的转变受到了沥青砂浆和集料骨架共同作用的影响;随着测试温度升高,试件内部颗粒位移和位移差增大,混合料Jamming堵塞程度降低。沥青路面颗粒体系由稳定的Jammed态转变为不稳定的Unjammed态,是诱导路面车辙和泛油病害发生的内因,研究结果实现了Jamming理论在非晶体系中的应用,为深入理解沥青混合料的车辙演变行为提供了一种新的研究思路。 展开更多
关键词 道路工程 车辙演化 颗粒体系 jamming转变 细观结构
在线阅读 下载PDF
Prediction of TBM jamming risk in squeezing grounds using Bayesian and artificial neural networks 被引量:19
15
作者 Rohola Hasanpour Jamal Rostami +2 位作者 Jürgen Schmitt Yilmaz Ozcelik Babak Sohrabian 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2020年第1期21-31,共11页
This study presents an application of artificial neural network(ANN)and Bayesian network(BN)for evaluation of jamming risk of the shielded tunnel boring machines(TBMs)in adverse ground conditions such as squeezing gro... This study presents an application of artificial neural network(ANN)and Bayesian network(BN)for evaluation of jamming risk of the shielded tunnel boring machines(TBMs)in adverse ground conditions such as squeezing grounds.The analysis is based on database of tunneling cases by numerical modeling to evaluate the ground convergence and possibility of machine entrapment.The results of initial numerical analysis were verified in comparison with some case studies.A dataset was established by performing additional numerical modeling of various scenarios based on variation of the most critical parameters affecting shield jamming.This includes compressive strength and deformation modulus of rock mass,tunnel radius,shield length,shield thickness,in situ stresses,depth of over-excavation,and skin friction between shield and rock.Using the dataset,an ANN was trained to predict the contact pressures from a series of ground properties and machine parameters.Furthermore,the continuous and discretized BNs were used to analyze the risk of shield jamming.The results of these two different BN methods are compared to the field observations and summarized in this paper.The developed risk models can estimate the required thrust force in both cases.The BN models can also be used in the cases with incomplete geological and geomechanical properties. 展开更多
关键词 BAYESIAN network(BN) Artificial neural network(ANN) Shielded tunnel BORING machine(TBM) jamming RISK Numerical simulation SQUEEZING ground
在线阅读 下载PDF
A jamming method against bistatic SAR based on modulation theory 被引量:9
16
作者 RAN Jinhe LI Xiuhe SHEN Yang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2019年第3期504-510,共7页
This paper focuses on the jamming problem of bistatic synthetic aperture radar (BiSAR), and a jamming method against BiSAR based on modulation theory is proposed. The proposed jamming method modulates the BiSAR signal... This paper focuses on the jamming problem of bistatic synthetic aperture radar (BiSAR), and a jamming method against BiSAR based on modulation theory is proposed. The proposed jamming method modulates the BiSAR signal with the cosinusoidal phase to generate multi-false targets in range, and further rotates the jammer to generate multi-false targets in azimuth. The range multi-false targets and azimuth multi-false targets form the two-dimensional cover jamming or deception jamming, which can protect the important targets efficiently. The number of false targets, the interval of false targets, and the jamming square can be adjusted flexibly by setting different range jamming parameters and azimuth jamming parameters. The jamming performance and the choosing criteria of jamming parameters are also discussed. Finally, the simulated data verify the effectiveness of the jamming method. 展开更多
关键词 BISTATIC SYNTHETIC APERTURE radar (BiSAR) cosinusoidal phase COVER jamming MICRO-MOTION modulation
在线阅读 下载PDF
Examining the effect of adverse geological conditions on jamming of a single shielded TBM in Uluabat tunnel using numerical modeling 被引量:14
17
作者 Rohola Hasanpour Jürgen Schmitt +1 位作者 Yilmaz Ozcelik Jamal Rostami 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2017年第6期1112-1122,共11页
Severe shield jamming events have been reported during excavation of Uluabat tunnel through adverse geological conditions, which resulted in several stoppages at advancing a single shielded tunnel boring machine(TBM).... Severe shield jamming events have been reported during excavation of Uluabat tunnel through adverse geological conditions, which resulted in several stoppages at advancing a single shielded tunnel boring machine(TBM). To study the jamming mechanism, three-dimensional(3D) simulation of the machine and surrounding ground was implemented using the finite difference code FLAC3D. Numerical analyses were performed for three sections along the tunnel with a higher risk for entrapment due to the combination of overburden and geological conditions. The computational results including longitudinal displacement contours and ground pressure profiles around the shield allow a better understanding of ground behavior within the excavation. Furthermore, they allow realistically assessing the impact of adverse geological conditions on shield jamming. The calculated thrust forces, which are required to move the machine forward, are in good agreement with field observations and measurements. It also proves that the numerical analysis can effectively be used for evaluating the effect of adverse geological environment on TBM entrapments and can be applied to prediction of loads on the shield and preestimating of the required thrust force during excavation through adverse ground conditions. 展开更多
关键词 Single shielded tunnel boring machine(TBM) Numerical modeling Shield jamming Squeezing ground Uluabat tunnel
在线阅读 下载PDF
Deceptive jamming suppression in multistatic radar based on coherent clustering 被引量:14
18
作者 ABDALLA Ahmed AHMED Mohaned Giess Shokrallah +2 位作者 ZHAO Yuan XIONG Ying TANG Bin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第2期269-277,共9页
This paper proposes a suppression method of the deceptive false target(FT) produced by digital radio frequency memory(DRFM) in a multistatic radar system. The simulated deceptive false targets from DRFM cannot be easi... This paper proposes a suppression method of the deceptive false target(FT) produced by digital radio frequency memory(DRFM) in a multistatic radar system. The simulated deceptive false targets from DRFM cannot be easily discriminated and suppressed with traditional radar systems. Therefore, multistatic radar has attracted considerable interest as it provides improved performance against deception jamming due to several separated receivers. This paper first investigates the received signal model in the presence of multiple false targets in all receivers of the multistatic radar. Then, obtain the propagation time delays of the false targets based on the cross-correlation test of the received signals in different receivers. In doing so, local-density-based spatial clustering of applications with noise(LDBSCAN) is proposed to discriminate the FTs from the physical targets(PTs) after compensating the FTs time delays, where the FTs are approximately coincident with one position, while PTs possess small dispersion.Numerical simulations are carried out to demonstrate the feasibility and validness of the proposed method. 展开更多
关键词 multistatic radar clustering analysis electronic counter-countermeasure(ECCM) deceptive jamming
在线阅读 下载PDF
Repeater jamming suppression method for pulse Doppler fuze based on identity recognition and chaotic encryption 被引量:9
19
作者 Jian Dai Xin-hong Hao +2 位作者 Qiang Liu Xiao-peng Yan Ping Li 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2021年第3期1002-1012,共11页
Pulse Doppler(PD) fuze is widely used in current battlefield. However, with the threat of repeater jamming, especially digital radio frequency memory technology, the deficiency in the anti-repeater jamming of a tradit... Pulse Doppler(PD) fuze is widely used in current battlefield. However, with the threat of repeater jamming, especially digital radio frequency memory technology, the deficiency in the anti-repeater jamming of a traditional PD fuze increasingly emerges. Therefore, a repeater jamming suppression method for a PD fuze based on identity(ID) recognition and chaotic encryption is proposed. Every fuze has its own ID which is encrypted with different chaotic binary sequences in every pulse period of the transmitted signal. The thumbtack-shaped ambiguity function shows a good resolution and distance cutoff characteristic. The ability of anti-repeater jamming is emphatically analyzed, and the results at different signal-to-noise ratio(SNR) show a strong anti-repeater jamming ability and range resolution that the proposed method possesses. Furthermore, the anti-repeater jamming ability is influenced by processing gain, bit error rate(BER) and correlation function. The simulation result validates the theoretical analysis, it shows the proposed method can significantly improve the anti-repeater jamming ability of a PD fuze. 展开更多
关键词 Pulse Doppler fuze ID Chaotic binary code ENCRYPTION Repeater jamming
在线阅读 下载PDF
Tolerance analysis of multiple-element linear retrodirective cross-eye jamming 被引量:9
20
作者 LIU Tianpeng WEI Xizhang +3 位作者 PENG Bo LIU Zhen SUN Bin GUAN Zhiqiang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第3期460-469,共10页
Tolerance sensitivity limits the practical application of the cross-eye jammer.Previous literature has demonstrated that retrodirective cross-eye jamming with multiple antenna elements possesses the advantage of loose... Tolerance sensitivity limits the practical application of the cross-eye jammer.Previous literature has demonstrated that retrodirective cross-eye jamming with multiple antenna elements possesses the advantage of loose tolerance requirements compared to traditional cross-eye jamming.However,the previous analysis was limited,because there are still some factors affecting the parameter tolerance of the multiple-element retrodirective cross-eye jamming(MRCJ)system and they have not been investigated completely,such as the loop difference,the baseline ratio and the jammer-to-signal ratio.This paper performs a comprehensive tolerance analysis of the MRCJ system with a nonuniformspacing linear array.Simulation results demonstrate the tolerance effects of the above influence factors and give reasonable advice for easing tolerance sensitivity. 展开更多
关键词 electronic warfare(EW) electronic countermeasure(ECM) cross-eye jamming radar active jamming TOLERANCE
在线阅读 下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部