The ever-changing battlefield environment requires the use of robust and adaptive technologies integrated into a reliable platform. Unmanned combat aerial vehicles(UCAVs) aim to integrate such advanced technologies wh...The ever-changing battlefield environment requires the use of robust and adaptive technologies integrated into a reliable platform. Unmanned combat aerial vehicles(UCAVs) aim to integrate such advanced technologies while increasing the tactical capabilities of combat aircraft. As a research object, common UCAV uses the neural network fitting strategy to obtain values of attack areas. However, this simple strategy cannot cope with complex environmental changes and autonomously optimize decision-making problems. To solve the problem, this paper proposes a new deep deterministic policy gradient(DDPG) strategy based on deep reinforcement learning for the attack area fitting of UCAVs in the future battlefield. Simulation results show that the autonomy and environmental adaptability of UCAVs in the future battlefield will be improved based on the new DDPG algorithm and the training process converges quickly. We can obtain the optimal values of attack areas in real time during the whole flight with the well-trained deep network.展开更多
This paper provides a calculating method which can be used in calculation of the kill probability attack area for every AAM. At first, attack area of AAM and kill probability of every characteristic point are obtained...This paper provides a calculating method which can be used in calculation of the kill probability attack area for every AAM. At first, attack area of AAM and kill probability of every characteristic point are obtained by combining trajectory calculation with kill probability calculation. Then, coordinates of a fire point relative to standard kill probability value in terms of standardization method are found. At last, equivalent kill probability curve equations are formulated by means of curve fitting method.展开更多
A new method called local accurate search is put forward to calculate the allowable area for air-to-surface missiles based on the conventional methods. Comparing with traditional methods, the local accurate search met...A new method called local accurate search is put forward to calculate the allowable area for air-to-surface missiles based on the conventional methods. Comparing with traditional methods, the local accurate search method can search the area online and reduce the time of search with the required precision. Combining the traditional flight range table with a model calculation method, the new method employs the local search to fred an accurate result, which will meet the fast-calculation requirements for attacking moving targets. In this way, the missiles are adapted for the complex warfare situation.展开更多
A definition of self-determined priority is used in airfight decision firstly. A scheme of grouping the whole fighters is introduced, and the principle of target assignment and fire control is designed. Based on the ...A definition of self-determined priority is used in airfight decision firstly. A scheme of grouping the whole fighters is introduced, and the principle of target assignment and fire control is designed. Based on the neutral network, the decision algorithm is derived and the whole coordinated decision system is simulated. Secondly an algorithm for missile-attacking area is described and its calculational result is obtained under initial conditions. Then the attacking of missile is realized by the proportion guidance. Finally, a multi-target attack system. The system includes airfight decision, estimation of missile attack area and calculation of missile attack procedure. A digital simulation demonstrates that the airfight decision algorithm is correct. The methods have important reference values for the study of fire control system of the fourth generation fighter.展开更多
Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smar...Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smart cities. Wireless vehicular communication is employed to improve traffic safety and to reduce traffic congestion. Each vehicle in the ad-hoc network achieves as a smart mobile node categorized by high mobility and forming of dynamic networks. As a result of the movement of vehicles in a continuous way, VANETs are vulnerable to many security threats so it requisites capable and secure communication. Unfortunately, Ad hoc networks are liable to varied attacks like Block Hole attacks and Grey Hole attacks, Denial of service attacks, etc. Among the most known attacks are the Black Hole attacks while the malicious vehicle is able to intercept the data and drops it without forwarding it to the cars. The main goal of our simulation is to analyze the performance impact of black hole attack in real time vehicular traffic in the Greater Detroit Area using NS-2 and SUMO (Simulation of Urban). The simulation will be with AODV protocol.展开更多
ARP-based Distributed Denial of Service (DDoS) attacks due to ARP-storms can happen in local area networks where many computer systems are infected by worms such as Code Red or by DDoS agents. In ARP attack, the DDoS ...ARP-based Distributed Denial of Service (DDoS) attacks due to ARP-storms can happen in local area networks where many computer systems are infected by worms such as Code Red or by DDoS agents. In ARP attack, the DDoS agents constantly send a barrage of ARP requests to the gateway, or to a victim computer within the same sub-network, and tie up the resource of attacked gateway or host. In this paper, we set to measure the impact of ARP-attack on resource exhaustion of computers in a local area network. Based on attack experiments, we measure the exhaustion of processing and memory resources of a victim computer and also other computers, which are located on the same network as the victim computer. Interestingly enough, it is observed that an ARP-attack not only exhausts resource of the victim computer but also significantly exhausts processing resource of other non-victim computers, which happen to be located on the same local area network as the victim computer.展开更多
Salt attack performance of magnesium oxychloride cement(MOC) in brine was investigated from the viewpoints of strength development and strength coefficient. Microstructure was studied using quantitative X-ray diffract...Salt attack performance of magnesium oxychloride cement(MOC) in brine was investigated from the viewpoints of strength development and strength coefficient. Microstructure was studied using quantitative X-ray diffraction(QXRD), thermogravimetry(TG) and scanning electron microscopy(SEM). The results show that MOC mortars have outstanding salt attack performance after aging brine and raw brine immersion. The salt attack coefficients of MOC mortars are higher than 0.8, which is qualified for application in saline soil and salt lake area. The reason is that salt brine solution enters into the voids of MOC and plays a role of toughening and strengthening in the MOC.展开更多
为应对可再生能源大量并网和网络传输安全问题,研究了异构多区域电力系统HMAPSs(heterogeneous multi-area power systems)在切换网络攻击下的的负荷频率控制。首先,提出了一种带有能量受限的具有非周期拒绝服务DoS(denial of service)...为应对可再生能源大量并网和网络传输安全问题,研究了异构多区域电力系统HMAPSs(heterogeneous multi-area power systems)在切换网络攻击下的的负荷频率控制。首先,提出了一种带有能量受限的具有非周期拒绝服务DoS(denial of service)攻击和随机虚假数据注入FDI(false data injection)攻击在时间域上切换的切换网络攻击模型。接着,设计了一种基于确认ACK(acknowledgement)机制的弹性事件触发方案。进一步,通过Lyapunov稳定性理论和切换系统方法,导出了切换网络攻击下HMAPSs的均方指数稳定性判据。最后,仿真实验结果验证了所提方法的有效性。展开更多
基金supported by the Key Laboratory of Defense Science and Technology Foundation of Luoyang Electro-optical Equipment Research Institute(6142504200108)。
文摘The ever-changing battlefield environment requires the use of robust and adaptive technologies integrated into a reliable platform. Unmanned combat aerial vehicles(UCAVs) aim to integrate such advanced technologies while increasing the tactical capabilities of combat aircraft. As a research object, common UCAV uses the neural network fitting strategy to obtain values of attack areas. However, this simple strategy cannot cope with complex environmental changes and autonomously optimize decision-making problems. To solve the problem, this paper proposes a new deep deterministic policy gradient(DDPG) strategy based on deep reinforcement learning for the attack area fitting of UCAVs in the future battlefield. Simulation results show that the autonomy and environmental adaptability of UCAVs in the future battlefield will be improved based on the new DDPG algorithm and the training process converges quickly. We can obtain the optimal values of attack areas in real time during the whole flight with the well-trained deep network.
文摘This paper provides a calculating method which can be used in calculation of the kill probability attack area for every AAM. At first, attack area of AAM and kill probability of every characteristic point are obtained by combining trajectory calculation with kill probability calculation. Then, coordinates of a fire point relative to standard kill probability value in terms of standardization method are found. At last, equivalent kill probability curve equations are formulated by means of curve fitting method.
文摘A new method called local accurate search is put forward to calculate the allowable area for air-to-surface missiles based on the conventional methods. Comparing with traditional methods, the local accurate search method can search the area online and reduce the time of search with the required precision. Combining the traditional flight range table with a model calculation method, the new method employs the local search to fred an accurate result, which will meet the fast-calculation requirements for attacking moving targets. In this way, the missiles are adapted for the complex warfare situation.
文摘A definition of self-determined priority is used in airfight decision firstly. A scheme of grouping the whole fighters is introduced, and the principle of target assignment and fire control is designed. Based on the neutral network, the decision algorithm is derived and the whole coordinated decision system is simulated. Secondly an algorithm for missile-attacking area is described and its calculational result is obtained under initial conditions. Then the attacking of missile is realized by the proportion guidance. Finally, a multi-target attack system. The system includes airfight decision, estimation of missile attack area and calculation of missile attack procedure. A digital simulation demonstrates that the airfight decision algorithm is correct. The methods have important reference values for the study of fire control system of the fourth generation fighter.
文摘Vehicular Ad-hoc Networks (VANETs) technology has recently emerged, and gaining significant attention from the research because it is promising technologies related to Intelligent Transportation System (ITSs) and smart cities. Wireless vehicular communication is employed to improve traffic safety and to reduce traffic congestion. Each vehicle in the ad-hoc network achieves as a smart mobile node categorized by high mobility and forming of dynamic networks. As a result of the movement of vehicles in a continuous way, VANETs are vulnerable to many security threats so it requisites capable and secure communication. Unfortunately, Ad hoc networks are liable to varied attacks like Block Hole attacks and Grey Hole attacks, Denial of service attacks, etc. Among the most known attacks are the Black Hole attacks while the malicious vehicle is able to intercept the data and drops it without forwarding it to the cars. The main goal of our simulation is to analyze the performance impact of black hole attack in real time vehicular traffic in the Greater Detroit Area using NS-2 and SUMO (Simulation of Urban). The simulation will be with AODV protocol.
文摘ARP-based Distributed Denial of Service (DDoS) attacks due to ARP-storms can happen in local area networks where many computer systems are infected by worms such as Code Red or by DDoS agents. In ARP attack, the DDoS agents constantly send a barrage of ARP requests to the gateway, or to a victim computer within the same sub-network, and tie up the resource of attacked gateway or host. In this paper, we set to measure the impact of ARP-attack on resource exhaustion of computers in a local area network. Based on attack experiments, we measure the exhaustion of processing and memory resources of a victim computer and also other computers, which are located on the same network as the victim computer. Interestingly enough, it is observed that an ARP-attack not only exhausts resource of the victim computer but also significantly exhausts processing resource of other non-victim computers, which happen to be located on the same local area network as the victim computer.
基金Funded by the Special Project Major Project for the Transformation of Scientific and Technological Achievements of Qinghai Province(Nos.2019-GX-165 and 2018-NN-152)Youth Innovation Promotion Association CAS(Nos.2019423 and 2018467)the National Natural Science Foundation of China(No.U1507120).
文摘Salt attack performance of magnesium oxychloride cement(MOC) in brine was investigated from the viewpoints of strength development and strength coefficient. Microstructure was studied using quantitative X-ray diffraction(QXRD), thermogravimetry(TG) and scanning electron microscopy(SEM). The results show that MOC mortars have outstanding salt attack performance after aging brine and raw brine immersion. The salt attack coefficients of MOC mortars are higher than 0.8, which is qualified for application in saline soil and salt lake area. The reason is that salt brine solution enters into the voids of MOC and plays a role of toughening and strengthening in the MOC.
文摘为应对可再生能源大量并网和网络传输安全问题,研究了异构多区域电力系统HMAPSs(heterogeneous multi-area power systems)在切换网络攻击下的的负荷频率控制。首先,提出了一种带有能量受限的具有非周期拒绝服务DoS(denial of service)攻击和随机虚假数据注入FDI(false data injection)攻击在时间域上切换的切换网络攻击模型。接着,设计了一种基于确认ACK(acknowledgement)机制的弹性事件触发方案。进一步,通过Lyapunov稳定性理论和切换系统方法,导出了切换网络攻击下HMAPSs的均方指数稳定性判据。最后,仿真实验结果验证了所提方法的有效性。