期刊文献+
共找到9,815篇文章
< 1 2 250 >
每页显示 20 50 100
A target parameter estimation method via atom-reconstruction in radar mainlobe jamming
1
作者 ZHOU Bilei LIU Weijian +5 位作者 LI Rongfeng CHEN Hui ZHANG Liang DU Qinglei LI Binbin CHEN Hao 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期350-360,共11页
Mainlobe jamming(MLJ)brings a big challenge for radar target detection,tracking,and identification.The suppression of MLJ is a hard task and an open problem in the electronic counter-counter measures(ECCM)field.Target... Mainlobe jamming(MLJ)brings a big challenge for radar target detection,tracking,and identification.The suppression of MLJ is a hard task and an open problem in the electronic counter-counter measures(ECCM)field.Target parameters and target direction estimation is difficult in radar MLJ.A target parameter estimation method via atom-reconstruction in radar MLJ is proposed in this paper.The proposed method can suppress the MLJ and simultaneously provide high estimation accuracy of target range and angle.Precisely,the eigen-projection matrix processing(EMP)algorithm is adopted to suppress the MLJ,and the target range is estimated effectively through the beamforming and pulse compression.Then the target angle can be effectively estimated by the atom-reconstruction method.Without any prior knowledge,the MLJ can be canceled,and the angle estimation accuracy is well preserved.Furthermore,the proposed method does not have strict requirement for radar array construction,and it can be applied for linear array and planar array.Moreover,the proposed method can effectively estimate the target azimuth and elevation simultaneously when the target azimuth(or elevation)equals to the jamming azimuth(or elevation),because the MLJ is suppressed in spatial plane dimension. 展开更多
关键词 mainlobe jamming ANTI-jamming atom-reconstruction RADAR
下载PDF
An angular blinking jamming method based on electronically controlled corner reflectors
2
作者 GAN Lin WU Zehao +1 位作者 WANG Xuesong LI Jianbing 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期330-338,共9页
Passive jamming is believed to have very good potential in countermeasure community.In this paper,a passive angular blinking jamming method based on electronically controlled corner reflectors is proposed.The amplitud... Passive jamming is believed to have very good potential in countermeasure community.In this paper,a passive angular blinking jamming method based on electronically controlled corner reflectors is proposed.The amplitude of the incident wave can be modulated by switching the corner reflector between the penetration state and the reflection state,and the ensemble of multiple corner reflectors with towing rope can result in complex angle decoying effects.Dependency of the decoying effect on corner reflectors’radar cross section and positions are analyzed and simulated.Results show that the angle measured by a monopulse radar can be significantly interfered by this method while the automatic tracking is employed. 展开更多
关键词 monopulse radar angular blinking jamming corner reflector amplitude-comparison angle measurement metasurface
下载PDF
Optimization of jamming formation of USV offboard active decoy clusters based on an improved PSO algorithm
3
作者 Zhaodong Wu Yasong Luo Shengliang Hu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期529-540,共12页
Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for t... Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for timing and deployment.To improve the response speed and jamming effect,a cluster of OADs based on an unmanned surface vehicle(USV)is proposed.The formation of the cluster determines the effectiveness of jamming.First,based on the mechanism of OAD jamming,critical conditions are identified,and a method for assessing the jamming effect is proposed.Then,for the optimization of the cluster formation,a mathematical model is built,and a multi-tribe adaptive particle swarm optimization algorithm based on mutation strategy and Metropolis criterion(3M-APSO)is designed.Finally,the formation optimization problem is solved and analyzed using the 3M-APSO algorithm under specific scenarios.The results show that the improved algorithm has a faster convergence rate and superior performance as compared to the standard Adaptive-PSO algorithm.Compared with a single OAD,the optimal formation of USV-OAD cluster effectively fills the blind area and maximizes the use of jamming resources. 展开更多
关键词 Electronic countermeasure Offboard active decoy USV cluster jamming formation optimization Improved PSO algorithm
下载PDF
Joint target assignment and power allocation in the netted C-MIMO radar when tracking multi-targets in the presence of self-defense blanket jamming
4
作者 Zhengjie Li Junwei Xie +1 位作者 Haowei Zhang Jiahao Xie 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第6期414-427,共14页
The netted radar system(NRS)has been proved to possess unique advantages in anti-jamming and improving target tracking performance.Effective resource management can greatly ensure the combat capability of the NRS.In t... The netted radar system(NRS)has been proved to possess unique advantages in anti-jamming and improving target tracking performance.Effective resource management can greatly ensure the combat capability of the NRS.In this paper,based on the netted collocated multiple input multiple output(CMIMO)radar,an effective joint target assignment and power allocation(JTAPA)strategy for tracking multi-targets under self-defense blanket jamming is proposed.An architecture based on the distributed fusion is used in the radar network to estimate target state parameters.By deriving the predicted conditional Cramer-Rao lower bound(PC-CRLB)based on the obtained state estimation information,the objective function is formulated.To maximize the worst case tracking accuracy,the proposed JTAPA strategy implements an online target assignment and power allocation of all active nodes,subject to some resource constraints.Since the formulated JTAPA is non-convex,we propose an efficient two-step solution strategy.In terms of the simulation results,the proposed algorithm can effectively improve tracking performance in the worst case. 展开更多
关键词 Netted radar system MIMO Target assignment Power allocation multi-targets tracking Self-defense blanket jamming
下载PDF
Open World Recognition of Communication Jamming Signals 被引量:2
5
作者 Yan Tang Zhijin Zhao +4 位作者 Jie Chen Shilian Zheng Xueyi Ye Caiyi Lou Xiaoniu Yang 《China Communications》 SCIE CSCD 2023年第6期199-214,共16页
To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is proposed.The algorithm can recognize known jamming classes,detect new(unknown)jamming c... To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is proposed.The algorithm can recognize known jamming classes,detect new(unknown)jamming classes,and unsupervised cluseter new classes.The network of SNN-OWR is trained supervised with paired input data consisting of two samples from a known dataset.On the one hand,the network is required to have the ability to distinguish whether two samples are from the same class.On the other hand,the latent distribution of known class is forced to approach their own unique Gaussian distribution,which is prepared for the subsequent open set testing.During the test,the unknown class detection process based on Gaussian probability density function threshold is designed,and an unsupervised clustering algorithm of the unknown jamming is realized by using the prior knowledge of known classes.The simulation results show that when the jamming-to-noise ratio is more than 0d B,the accuracy of SNN-OWR algorithm for known jamming classes recognition,unknown jamming detection and unsupervised clustering of unknown jamming is about 95%.This indicates that the SNN-OWR algorithm can make the effect of the recognition of unknown jamming be almost the same as that of known jamming. 展开更多
关键词 communication jamming signals Siamese Neural Network Open World Recognition unsupervised clustering of new jamming type Gaussian probability density function
下载PDF
Jamming-Aided Secure Communication in Ultra-Dense LEO Integrated Satellite-Terrestrial Networks 被引量:2
6
作者 Yongpeng Shi Jiajia Liu +1 位作者 Jiadai Wang Yijie Xun 《China Communications》 SCIE CSCD 2023年第7期43-56,共14页
The ultra-dense low earth orbit(LEO)integrated satellite-terrestrial networks(UDLEO-ISTN)can bring lots of benefits in terms of wide coverage,high capacity,and strong robustness.Meanwhile,the broadcasting and open nat... The ultra-dense low earth orbit(LEO)integrated satellite-terrestrial networks(UDLEO-ISTN)can bring lots of benefits in terms of wide coverage,high capacity,and strong robustness.Meanwhile,the broadcasting and open natures of satellite links also reveal many challenges for transmission security protection,especially for eavesdropping defence.How to efficiently take advantage of the LEO satellite’s density and ensure the secure communication by leveraging physical layer security with the cooperation of jammers deserves further investigation.To our knowledge,using satellites as jammers in UDLEO-ISTN is still a new problem since existing works mainly focused on this issue only from the aspect of terrestrial networks.To this end,we study in this paper the cooperative secrecy communication problem in UDLEOISTN by utilizing several satellites to send jamming signal to the eavesdroppers.An iterative scheme is proposed as our solution to maximize the system secrecy energy efficiency(SEE)via jointly optimizing transmit power allocation and user association.Extensive experiment results verify that our designed optimization scheme can significantly enhance the system SEE and achieve the optimal power allocation and user association strategies. 展开更多
关键词 ultra-dense LEO satellite integrated satellite-terrestrial network physical layer security cooperative jamming
下载PDF
Multi-target tracking algorithm based on PHD filter against multi-range-false-target jamming 被引量:9
7
作者 TIAN Chen PEI Yang +1 位作者 HOU Peng ZHAO Qian 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第5期859-870,共12页
Multi-range-false-target(MRFT) jamming is particularly challenging for tracking radar due to the dense clutter and the repeated multiple false targets. The conventional association-based multi-target tracking(MTT) met... Multi-range-false-target(MRFT) jamming is particularly challenging for tracking radar due to the dense clutter and the repeated multiple false targets. The conventional association-based multi-target tracking(MTT) methods suffer from high computational complexity and limited usage in the presence of MRFT jamming.In order to solve the above problems, an efficient and adaptable probability hypothesis density(PHD) filter is proposed. Based on the gating strategy, the obtained measurements are firstly classified into the generalized newborn target and the existing target measurements. The two categories of measurements are independently used in the decomposed form of the PHD filter. Meanwhile,an amplitude feature is used to suppress the dense clutter. In addition, an MRFT jamming suppression algorithm is introduced to the filter. Target amplitude information and phase quantization information are jointly used to deal with MRFT jamming and the clutter by modifying the particle weights of the generalized newborn targets. Simulations demonstrate the proposed algorithm can obtain superior correct discrimination rate of MRFT, and high-accuracy tracking performance with high computational efficiency in the presence of MRFT jamming in the dense clutter. 展开更多
关键词 multi-range-false-target(MRFT)jamming multi-target tracking(MTT) probability hypothesis density(PHD) target amplitude feature gating strategy
下载PDF
Towards reinforcement learning in UAV relay for anti-jamming maritime communications
8
作者 Chuhuan Liu Yi Zhang +3 位作者 Guohang Niu Luliang Jia Liang Xiao Jiangxia Luan 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1477-1485,共9页
Maritime communications with sea surface reflections and sea wave occlusions are susceptible to jamming attacks due to the wide geographical area and intensive wireless communication services.Unmanned Aerial Vehicles(... Maritime communications with sea surface reflections and sea wave occlusions are susceptible to jamming attacks due to the wide geographical area and intensive wireless communication services.Unmanned Aerial Vehicles(UAVs)help relay messages to improve communication performance,but the relay policy that depends on the rapidly changing maritime environments is difficult to optimize.In this paper,a reinforcement learning-based UAV relay policy for maritime communications is proposed to resist jamming attacks.Based on previous transmission performance,the relay location,the received power of the transmitted signal and the received jamming power,this scheme optimizes the UAV trajectory and relay power to save the energy consumption and decrease the Bit-Error-Rate(BER)of the maritime signals.A deep reinforcement learning-based scheme is also proposed,which designs a deep neural network with dueling architecture to further improve the communication performance and computational complexity.The performance bounds regarding the signal to interference plus noise ratio,energy consumption and the communication utility are provided based on the Nash equilibrium of the game against jamming,and the computational complexity of the proposed schemes is analyzed.Simulation results show that the proposed schemes improve the energy efficiency and decrease the BER compared with the benchmark. 展开更多
关键词 Maritime communications jamming Unmanned aerial vehicle RELAY Reinforcement learning
下载PDF
Numerical Analyses of Ice Jamming in Jacket Platform Conductor Array in Bohai Sea
9
作者 ZHAI Bi-yao YANG Fan +1 位作者 PAN Jun-ning XIE Dong-mei 《China Ocean Engineering》 SCIE EI CSCD 2023年第6期885-896,共12页
Serious ice accumulating,pile-up and ice jamming occur around the conductor array of offshore jacket platforms during the winter every year in Bohai Sea,which could cause grave threats to the stability of platform str... Serious ice accumulating,pile-up and ice jamming occur around the conductor array of offshore jacket platforms during the winter every year in Bohai Sea,which could cause grave threats to the stability of platform structure,the safety of people and equipment,and even severer calamity.Therefore,the process of ice accumulation and ice jamming in the jacket platform area needs more concern.This study focuses on ice accumulation and jamming behaviors in the jacket platform conductor area by using a coupled two-dimensional hydro-ice dynamics model.A series of cases are conducted with different flow conditions,such as flow velocity,drifting direction and oscillatory flow.Through the simulation,the ice pile-up process is described and changes in ice-jamming thickness,ice pile-up location and ice pile-up volume are investigated.The differences in ice pile-up in the steady flow and oscillatory flow are analyzed.This study proposes a new approach to simulate the ice jamming process in the jacket platform conductor area,providing a reference for ice management on the platform. 展开更多
关键词 sea ice ice jamming conductor array numerical modeling hydro-ice dynamics
下载PDF
Received Power Based Unmanned Aerial Vehicles (UAVs) Jamming Detection and Nodes Classification Using Machine Learning
10
作者 Waleed Aldosari 《Computers, Materials & Continua》 SCIE EI 2023年第4期1253-1269,共17页
This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks onWireless Sensor Networks(WSNs).Jamming is a type of Denial of Service(DoS)attack and intentional ... This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks onWireless Sensor Networks(WSNs).Jamming is a type of Denial of Service(DoS)attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly.To defend and prevent such attacks,the first step is to detect them.The current detection approaches use centralized techniques to detect jamming,where each node collects information and forwards it to the base station.As a result,overhead and communication costs increased.In this work,we present a jamming attack and classify nodes into different categories based on their location to the jammer by employing a single node observer.As a result,we introduced a machine learning model that uses distance ratios and power received as features to detect such attacks.Furthermore,we considered several types of jammers transmitting at different power levels to evaluate the proposed metrics using MATLAB.With a detection accuracy of 99.7%for the k-nearest neighbors(KNN)algorithm and average testing accuracy of 99.9%,the presented solution is capable of efficiently and accurately detecting jamming attacks in wireless sensor networks. 展开更多
关键词 jamming attacks machine learning unmanned aerial vehicle(UAV) WSNS
下载PDF
Cognitive J^(2)SAC:Joint Jamming,Sensing,and Communication Under Antagonistic Environment
11
作者 Jiangchun Gu Guoru Ding +3 位作者 Yizhen Yin Haichao Wang Yitao Xu Yehui Song 《China Communications》 SCIE CSCD 2023年第9期78-95,共18页
Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still fac... Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still faces the challenges of the information security and transmission robustness caused by the openness of wireless channel,especially under antagonistic environment.Hence,this article develops a generalized framework,named cognitive joint jamming,sensing and communication(cognitive J2SAC),to empower the current sensing/communication/jamming system with a“brain”for realizing precise sensing,reliable communication and effective jamming under antagonistic environment.Three kinds of gains can be captured by cognitive J2SAC,including integrated gain,cooperative gain and cognitive gain.Moreover,we highlight the enabling mechanism among jamming,sensing,and communication,as well as illustrating several typical use cases of cognitive J2SAC.Furthermore,several key enabled technologies are analyzed and a typical sensing enhance integrated communication and jamming case study is discussed to verify the effectiveness of the proposed method.Last but not the least,the future directions are listed before concluding this article.Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still faces the challenges of the information security and transmission robustness caused by the openness of wireless channel,especially under antagonistic environment.Hence,this article develops a generalized framework,named cognitive joint jamming,sensing and communication(cognitive J2SAC),to empower the current sensing/communication/jamming system with a“brain”for realizing precise sensing,reliable communication and effective jamming under antagonistic environment.Three kinds of gains can be captured by cognitive J2SAC,including integrated gain,cooperative gain and cognitive gain.Moreover,we highlight the enabling mechanism among jamming,sensing,and communication,as well as illustrating several typical use cases of cognitive J2SAC.Furthermore,several key enabled technologies are analyzed and a typical sensing enhance integrated communication and jamming case study is discussed to verify the effectiveness of the proposed method.Last but not the least,the future directions are listed before concluding this article. 展开更多
关键词 integrated sensing and communication(ISAC) information security joint jamming sensing and communication(J2SAC) cognition theory
下载PDF
Research on Rotating Machinery Fault Diagnosis Based on Improved Multi-target Domain Adversarial Network
12
作者 Haitao Wang Xiang Liu 《Instrumentation》 2024年第1期38-50,共13页
Aiming at the problems of low efficiency,poor anti-noise and robustness of transfer learning model in intelligent fault diagnosis of rotating machinery,a new method of intelligent fault diagnosis of rotating machinery... Aiming at the problems of low efficiency,poor anti-noise and robustness of transfer learning model in intelligent fault diagnosis of rotating machinery,a new method of intelligent fault diagnosis of rotating machinery based on single source and multi-target domain adversarial network model(WDMACN)and Gram Angle Product field(GAPF)was proposed.Firstly,the original one-dimensional vibration signal is preprocessed using GAPF to generate the image data including all time series.Secondly,the residual network is used to extract data features,and the features of the target domain without labels are pseudo-labeled,and the transferable features among the feature extractors are shared through the depth parameter,and the feature extractors of the multi-target domain are updated anatomically to generate the features that the discriminator cannot distinguish.The modelt through adversarial domain adaptation,thus achieving fault classification.Finally,a large number of validations were carried out on the bearing data set of Case Western Reserve University(CWRU)and the gear data.The results show that the proposed method can greatly improve the diagnostic efficiency of the model,and has good noise resistance and generalization. 展开更多
关键词 multi-target domain domain-adversarial neural networks transfer learning rotating machinery fault diagnosis
下载PDF
无线传感器网络中基于几何覆盖的Jamming攻击定位算法 被引量:9
13
作者 孙言强 王晓东 周兴铭 《通信学报》 EI CSCD 北大核心 2010年第11期10-16,共7页
提出一种基于几何覆盖理论的Jamming攻击定位(GCL,geometry-covering based localization)算法。GCL算法利用计算几何中的凸壳理论,特别是最小包容圆方法,对Jamming攻击者进行定位。理论证明了该算法的正确性和较低的时间复杂度(O(nlogn... 提出一种基于几何覆盖理论的Jamming攻击定位(GCL,geometry-covering based localization)算法。GCL算法利用计算几何中的凸壳理论,特别是最小包容圆方法,对Jamming攻击者进行定位。理论证明了该算法的正确性和较低的时间复杂度(O(nlogn));模拟实验表明,该算法在攻击者攻击范围、网络节点密度以及攻击者位置等度量值变化的情况下,比已有算法具有更好的定位准确度。 展开更多
关键词 无线传感器网络 jamming攻击 定位 最小包容圆
下载PDF
Cross-eye gain distribution of multiple-element retrodirective cross-eye jamming 被引量:7
14
作者 YANG Degui LIANG Buge ZHAO Dangjun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第6期1170-1179,共10页
The total cross-eye gain of multiple-element retrodirective cross-eye jamming(MRCJ) in the presence of the platform skin return is a distribution rather than a constant value, due to the random variation in the phase ... The total cross-eye gain of multiple-element retrodirective cross-eye jamming(MRCJ) in the presence of the platform skin return is a distribution rather than a constant value, due to the random variation in the phase of the skin return. Although the median value of the total cross-eye gain distribution had been analyzed in previous studies, the extreme values providing useful indications of the upper and lower bounds of the total cross-eye gain have not been analyzed until now. In this paper, the cumulative distribution function and the extreme values of the total cross-eye gain of MRCJ are derived. The angular error induced in threat monopulse radar as a figure of merit is used to analyze the performance of MRCJ system. Simulation results demonstrate the variation of the angular error and discuss the proper value of jamming-to-signal ratio(JSR) making the MRCJ system more effective in consideration of the whole distribution of the total cross-eye gain. 展开更多
关键词 electronic warfare(EW) electronic countermeasures(ECM) cross-eye jamming monopulse radar angular deception jamming
下载PDF
Deceptive jamming suppression in multistatic radar based on coherent clustering 被引量:13
15
作者 ABDALLA Ahmed AHMED Mohaned Giess Shokrallah +2 位作者 ZHAO Yuan XIONG Ying TANG Bin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第2期269-277,共9页
This paper proposes a suppression method of the deceptive false target(FT) produced by digital radio frequency memory(DRFM) in a multistatic radar system. The simulated deceptive false targets from DRFM cannot be easi... This paper proposes a suppression method of the deceptive false target(FT) produced by digital radio frequency memory(DRFM) in a multistatic radar system. The simulated deceptive false targets from DRFM cannot be easily discriminated and suppressed with traditional radar systems. Therefore, multistatic radar has attracted considerable interest as it provides improved performance against deception jamming due to several separated receivers. This paper first investigates the received signal model in the presence of multiple false targets in all receivers of the multistatic radar. Then, obtain the propagation time delays of the false targets based on the cross-correlation test of the received signals in different receivers. In doing so, local-density-based spatial clustering of applications with noise(LDBSCAN) is proposed to discriminate the FTs from the physical targets(PTs) after compensating the FTs time delays, where the FTs are approximately coincident with one position, while PTs possess small dispersion.Numerical simulations are carried out to demonstrate the feasibility and validness of the proposed method. 展开更多
关键词 multistatic radar clustering analysis electronic counter-countermeasure(ECCM) deceptive jamming
下载PDF
Novel discrimination method of digital deceptive jamming in mono-pulse radar 被引量:8
16
作者 Huanyao Dai Xuesong Wang Yongzhen Li 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第6期910-916,共7页
A new polarization measurement algorithm by using the sum and difference beam differential property of mono-pulse radar is given.Based on the generation mechanism differences between the target scattering and multi-fa... A new polarization measurement algorithm by using the sum and difference beam differential property of mono-pulse radar is given.Based on the generation mechanism differences between the target scattering and multi-false-target jamming,the signal models of real targets and digital deceptive false target jamming for sum and delta channel are presented.The polarization discrimination parameters are designed,and the discrimination method and its performance are discussed.This novel method does not need the accurate estimation of the absolute value of full target polarization scattering matrix,but only requires the relative estimation of the orthogonal polarized component of the targets.Without the need to add additional polarization channels,the proposed method is more suitable for engineering realization.The simulation experiment verifies that the correctly identifying probability can be better than 90%. 展开更多
关键词 DISCRIMINATION multi-false-target jamming polarization pattern difference sum-difference beam.
下载PDF
Mathematic principle of active jamming against wideband LFM radar 被引量:11
17
作者 Shixian Gong Xizhang Wei +1 位作者 Xiang Li Yongshun Ling 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2015年第1期50-60,共11页
The inherent mathematic principle of active jamming against the wideband linear frequency modulated(LFM) radar is investigated. According to different generation strategies, the active jamming methods are reclassifi... The inherent mathematic principle of active jamming against the wideband linear frequency modulated(LFM) radar is investigated. According to different generation strategies, the active jamming methods are reclassified into three groups, i.e.,non-coherent jamming(NCJ), convolution jamming(CJ) and multiplying jamming(MJ). Based on the classification, the mathematic principles of different active jamming groups are put forward, which describe the relationships between the modulated signals and the jamming results. The advantages and disadvantages of different groups are further analyzed, which provides a new perspective for the study of jamming/anti-jamming methods and a potential for engineers to integrate similar jamming methods into one jammer platform. The analyses and simulation results of some typical active jamming methods prove the validity of the proposed mathematics principle. 展开更多
关键词 linear frequency modulated(LFM) mathematic principle active jamming
下载PDF
A jamming method against bistatic SAR based on modulation theory 被引量:7
18
作者 RAN Jinhe LI Xiuhe SHEN Yang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2019年第3期504-510,共7页
This paper focuses on the jamming problem of bistatic synthetic aperture radar (BiSAR), and a jamming method against BiSAR based on modulation theory is proposed. The proposed jamming method modulates the BiSAR signal... This paper focuses on the jamming problem of bistatic synthetic aperture radar (BiSAR), and a jamming method against BiSAR based on modulation theory is proposed. The proposed jamming method modulates the BiSAR signal with the cosinusoidal phase to generate multi-false targets in range, and further rotates the jammer to generate multi-false targets in azimuth. The range multi-false targets and azimuth multi-false targets form the two-dimensional cover jamming or deception jamming, which can protect the important targets efficiently. The number of false targets, the interval of false targets, and the jamming square can be adjusted flexibly by setting different range jamming parameters and azimuth jamming parameters. The jamming performance and the choosing criteria of jamming parameters are also discussed. Finally, the simulated data verify the effectiveness of the jamming method. 展开更多
关键词 BISTATIC SYNTHETIC APERTURE radar (BiSAR) cosinusoidal phase COVER jamming MICRO-MOTION modulation
下载PDF
Mitigation of cross-eye jamming using a dual-polarization array 被引量:9
19
作者 MA Jiazhi SHI Longfei +1 位作者 XIAO Shunping WANG Xuesong 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第3期491-498,共8页
This paper presents an approach for mitigating the cross-eye jamming using a dual-polarization array. By transmitting a sum beam and a difference beam in two orthogonal polarimetric channels, a synthesized transmitted... This paper presents an approach for mitigating the cross-eye jamming using a dual-polarization array. By transmitting a sum beam and a difference beam in two orthogonal polarimetric channels, a synthesized transmitted beam with spatially varying polarization is produced, such that the polarization of the transmitted radar wave varies in azimuth or elevation. Thus, the phases of the signals received on the two antennas of a cross-eye jammer become unequal, and an additional phase difference is introduced to disrupt the 180? phase shifting in the retrodirective loop of the jammer. By means of beam scanning in a small angular range,the optimal beam steering configuration can be found to maximize the phase error for the mitigation of cross-eye jamming. As a result, the jamming performance of the cross-eye jammer degrades largely. Theoretical analysis and simulation results indicate that the proposed method is valid and feasible. 展开更多
关键词 cross-eye jamming monopulse radar spatially varying polarization insertion phase beam scanning
下载PDF
Examining the effect of adverse geological conditions on jamming of a single shielded TBM in Uluabat tunnel using numerical modeling 被引量:8
20
作者 Rohola Hasanpour Jürgen Schmitt +1 位作者 Yilmaz Ozcelik Jamal Rostami 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2017年第6期1112-1122,共11页
Severe shield jamming events have been reported during excavation of Uluabat tunnel through adverse geological conditions, which resulted in several stoppages at advancing a single shielded tunnel boring machine(TBM).... Severe shield jamming events have been reported during excavation of Uluabat tunnel through adverse geological conditions, which resulted in several stoppages at advancing a single shielded tunnel boring machine(TBM). To study the jamming mechanism, three-dimensional(3D) simulation of the machine and surrounding ground was implemented using the finite difference code FLAC3D. Numerical analyses were performed for three sections along the tunnel with a higher risk for entrapment due to the combination of overburden and geological conditions. The computational results including longitudinal displacement contours and ground pressure profiles around the shield allow a better understanding of ground behavior within the excavation. Furthermore, they allow realistically assessing the impact of adverse geological conditions on shield jamming. The calculated thrust forces, which are required to move the machine forward, are in good agreement with field observations and measurements. It also proves that the numerical analysis can effectively be used for evaluating the effect of adverse geological environment on TBM entrapments and can be applied to prediction of loads on the shield and preestimating of the required thrust force during excavation through adverse ground conditions. 展开更多
关键词 Single shielded tunnel boring machine(TBM) Numerical modeling Shield jamming Squeezing ground Uluabat tunnel
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部