在目标-攻击弹-防御弹群(target-attacker-defenders,TADs)系统中,防御弹群通过与目标(载机)异构协同、弹群间同构协同以保护载机并降低单弹脱靶的风险。针对TADs系统在二维平面下的协同主动防御模型进行了研究,采用机/弹协同和防御弹...在目标-攻击弹-防御弹群(target-attacker-defenders,TADs)系统中,防御弹群通过与目标(载机)异构协同、弹群间同构协同以保护载机并降低单弹脱靶的风险。针对TADs系统在二维平面下的协同主动防御模型进行了研究,采用机/弹协同和防御弹群协同的两层制导策略。在机弹协同方面,防御弹领弹与载机进行异构协同,考虑载机及防御弹领弹的机动能力限制,采用协同视线制导律(cooperative line of sight guidance,CLOSG)分别得到载机和防御弹领弹的制导指令;在防御弹群协同方面,考虑单弹计算能力约束,拦截时间约束和加速度约束,设计出基于分布式模型预测控制(distributed model predictive control,DMPC)的算法实现弹群从弹和防御弹领弹协同同时抵达并拦截攻击弹。仿真结果表明,多防御弹协同一致拦截制导算法能够实现TADs系统中载机和防御弹群的异构协同主动防御,并实现防御弹群的一致性同时拦截,以降低单弹脱靶的风险。展开更多
As to oppositional, multi-objective and hierarchical characteristic of air formation to ground attackdefends campaign, and using dynamic space state model of military campaign, this article establishes a principal and...As to oppositional, multi-objective and hierarchical characteristic of air formation to ground attackdefends campaign, and using dynamic space state model of military campaign, this article establishes a principal and subordinate hierarchical interactive decision-making way, the Nash-Stackelberg-Nash model, to solve the problems in military operation, and find out the associated best strategy in hierarchical dynamic decision-making. The simulating result indicate that when applying the model to air formation to ground attack-defends decision-making system, it can solve the problems of two hierarchies, dynamic oppositional decision-making favorably, and reach preferable effect in battle. It proves that the model can provide an effective way for analyzing a battle,展开更多
The GB/T 27930-2015 protocol is the communication protocol between the non-vehicle-mounted charger and the battery management system (BMS) stipulated by the state. However, as the protocol adopts the way of broadcast ...The GB/T 27930-2015 protocol is the communication protocol between the non-vehicle-mounted charger and the battery management system (BMS) stipulated by the state. However, as the protocol adopts the way of broadcast communication and plaintext to transmit data, the data frame does not contain the source address and the destination address, making the Electric Vehicle (EV) vulnerable to replay attack in the charging process. In order to verify the security problems of the protocol, this paper uses 27,655 message data in the complete charging process provided by Shanghai Thaisen electric company, and analyzes these actual data frames one by one with the program written by C++. In order to enhance the security of the protocol, Rivest-Shamir-Adleman (RSA) digital signature and adding random numbers are proposed to resist replay attack. Under the experimental environment of Eclipse, the normal charging of electric vehicles, RSA digital signature and random number defense are simulated. Experimental results show that RSA digital signature cannot resist replay attack, and adding random numbers can effectively enhance the ability of EV to resist replay attack during charging.展开更多
Newly developed Al2O3-Si3N4 composite refractories used for blast furnace is introduced in this work. Al2O3-Si3N4 composite refractories attacked by alkali vapor and blast furnace slag was investigated. High performan...Newly developed Al2O3-Si3N4 composite refractories used for blast furnace is introduced in this work. Al2O3-Si3N4 composite refractories attacked by alkali vapor and blast furnace slag was investigated. High performance Al2O3-Si3N4 composite refractories was produced and used at both 2560m^3 blast furnaces of Tan-gsteel and No. 5 blast furnace of Shaosteel.展开更多
Since the Modbus RTU wired communication protocol of Siemens variable frequency motors is unstable and lacks a protection mechanism, there is a risk of user information leakage. Aiming at the problems of insufficient ...Since the Modbus RTU wired communication protocol of Siemens variable frequency motors is unstable and lacks a protection mechanism, there is a risk of user information leakage. Aiming at the problems of insufficient flexibility of traditional defense methods and poor defense effects, The present work proposed a new dual detection method based on MODBUS RTU, which combines the dual monitoring mechanism of “Address Resolution Protocol (ARP) request detection” and “ARP response detection”. In order to improve detection efficiency, two real-time updated linear tables are introduced, which can effectively deal with the three ARP spoofing methods of updating the ARP buffer. Based on the analysis of the hidden dangers of the Modbus RTU wired communication protocol, a wired connection between the S7-1200 PLC and the variable frequency motor was established, and a real experimental platform was constructed to demonstrate the attack. The intensity of ARP attacks has gradually increased over time. Through comparative experiments with traditional defense methods, it is proved that the algorithm enhances the protocol mechanism in principle, and is more flexible and reliable than traditional methods.展开更多
A defender–attacker–target problem with non-moving target is considered.This problem is modelled by a pursuit-evasion zero-sum differential game with linear dynamics and quadratic cost functional.In this game,the pu...A defender–attacker–target problem with non-moving target is considered.This problem is modelled by a pursuit-evasion zero-sum differential game with linear dynamics and quadratic cost functional.In this game,the pursuer is the defender,while the evader is the attacker.The objective of the pursuer is to minimise the cost functional,while the evader has two objectives:to maximise the cost functional and to keep a given terminal state inequality constraint.The open-loop saddle point solution of this game is obtained in the case where the transfer functions of the controllers for the defender and the attacker are of arbitrary orders.展开更多
文摘在目标-攻击弹-防御弹群(target-attacker-defenders,TADs)系统中,防御弹群通过与目标(载机)异构协同、弹群间同构协同以保护载机并降低单弹脱靶的风险。针对TADs系统在二维平面下的协同主动防御模型进行了研究,采用机/弹协同和防御弹群协同的两层制导策略。在机弹协同方面,防御弹领弹与载机进行异构协同,考虑载机及防御弹领弹的机动能力限制,采用协同视线制导律(cooperative line of sight guidance,CLOSG)分别得到载机和防御弹领弹的制导指令;在防御弹群协同方面,考虑单弹计算能力约束,拦截时间约束和加速度约束,设计出基于分布式模型预测控制(distributed model predictive control,DMPC)的算法实现弹群从弹和防御弹领弹协同同时抵达并拦截攻击弹。仿真结果表明,多防御弹协同一致拦截制导算法能够实现TADs系统中载机和防御弹群的异构协同主动防御,并实现防御弹群的一致性同时拦截,以降低单弹脱靶的风险。
基金College Doctor Foundation (20060699026)Aviation Basic Scientific Foundation (05D53021).
文摘As to oppositional, multi-objective and hierarchical characteristic of air formation to ground attackdefends campaign, and using dynamic space state model of military campaign, this article establishes a principal and subordinate hierarchical interactive decision-making way, the Nash-Stackelberg-Nash model, to solve the problems in military operation, and find out the associated best strategy in hierarchical dynamic decision-making. The simulating result indicate that when applying the model to air formation to ground attack-defends decision-making system, it can solve the problems of two hierarchies, dynamic oppositional decision-making favorably, and reach preferable effect in battle. It proves that the model can provide an effective way for analyzing a battle,
文摘The GB/T 27930-2015 protocol is the communication protocol between the non-vehicle-mounted charger and the battery management system (BMS) stipulated by the state. However, as the protocol adopts the way of broadcast communication and plaintext to transmit data, the data frame does not contain the source address and the destination address, making the Electric Vehicle (EV) vulnerable to replay attack in the charging process. In order to verify the security problems of the protocol, this paper uses 27,655 message data in the complete charging process provided by Shanghai Thaisen electric company, and analyzes these actual data frames one by one with the program written by C++. In order to enhance the security of the protocol, Rivest-Shamir-Adleman (RSA) digital signature and adding random numbers are proposed to resist replay attack. Under the experimental environment of Eclipse, the normal charging of electric vehicles, RSA digital signature and random number defense are simulated. Experimental results show that RSA digital signature cannot resist replay attack, and adding random numbers can effectively enhance the ability of EV to resist replay attack during charging.
文摘Newly developed Al2O3-Si3N4 composite refractories used for blast furnace is introduced in this work. Al2O3-Si3N4 composite refractories attacked by alkali vapor and blast furnace slag was investigated. High performance Al2O3-Si3N4 composite refractories was produced and used at both 2560m^3 blast furnaces of Tan-gsteel and No. 5 blast furnace of Shaosteel.
文摘Since the Modbus RTU wired communication protocol of Siemens variable frequency motors is unstable and lacks a protection mechanism, there is a risk of user information leakage. Aiming at the problems of insufficient flexibility of traditional defense methods and poor defense effects, The present work proposed a new dual detection method based on MODBUS RTU, which combines the dual monitoring mechanism of “Address Resolution Protocol (ARP) request detection” and “ARP response detection”. In order to improve detection efficiency, two real-time updated linear tables are introduced, which can effectively deal with the three ARP spoofing methods of updating the ARP buffer. Based on the analysis of the hidden dangers of the Modbus RTU wired communication protocol, a wired connection between the S7-1200 PLC and the variable frequency motor was established, and a real experimental platform was constructed to demonstrate the attack. The intensity of ARP attacks has gradually increased over time. Through comparative experiments with traditional defense methods, it is proved that the algorithm enhances the protocol mechanism in principle, and is more flexible and reliable than traditional methods.
文摘A defender–attacker–target problem with non-moving target is considered.This problem is modelled by a pursuit-evasion zero-sum differential game with linear dynamics and quadratic cost functional.In this game,the pursuer is the defender,while the evader is the attacker.The objective of the pursuer is to minimise the cost functional,while the evader has two objectives:to maximise the cost functional and to keep a given terminal state inequality constraint.The open-loop saddle point solution of this game is obtained in the case where the transfer functions of the controllers for the defender and the attacker are of arbitrary orders.