期刊文献+
共找到196篇文章
< 1 2 10 >
每页显示 20 50 100
Analysis of Low-Frequency Vibrational Modes and Particle Rearrangements in Marginally Jammed Amorphous Solid under Quasi-Static Shear 被引量:1
1
作者 董远湘 张国华 +2 位作者 孙其诚 赵雪丹 牛晓娜 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第12期101-104,共4页
We present the numerical simulation results of a model granular assembly formed by spherical particles with tIertzian interaction subjected to a simple shear in the athermal quasi-static limit. The stress-strain curve... We present the numerical simulation results of a model granular assembly formed by spherical particles with tIertzian interaction subjected to a simple shear in the athermal quasi-static limit. The stress-strain curve is shown to separate into smooth, elastic branches followed by a subsequent plastic event. Mode analysis shows that the lowest-frequency vibrational mode is more localized, and eigenvalues and participation ratios of low- frequency modes exhibit similar power-law behavior as the system approaches plastic instability, indicating that the nature of plastic events in the granular system is also a saddle node bifurcation. The analysis of projection and spatial structure shows that over 75% contributions to the non-affine displacement field at a plastic instability come from the lowest-frequency mode, and the lowest-frequency mode is strongly spatially correlated with local plastic rearrangements, inferring that the lowest-frequency mode could be used as a predictor for future plastic rearrangements in the disordered system jammed marginally. 展开更多
关键词 Analysis of Low-Frequency Vibrational Modes and Particle Rearrangements in Marginally jammed Amorphous Solid under Quasi-Static Shear
下载PDF
Mechanical properties of jammed packings of frictionless spheres under an applied shear stress
2
作者 刘浩 童华 徐宁 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第11期57-63,共7页
By minimizing a thermodynamic-like potential, we unbiasedly sample the potential energy landscape of soft and frictionless spheres under a constant shear stress. We obtain zero-temperature jammed states under desired ... By minimizing a thermodynamic-like potential, we unbiasedly sample the potential energy landscape of soft and frictionless spheres under a constant shear stress. We obtain zero-temperature jammed states under desired shear stresses and investigate their mechanical properties as a function of the shear stress. As a comparison, we also obtain the jammed states from the quasistatic-shear sampling in which the shear stress is not well-controlled. Although the yield stresses determined by both samplings show the same power-law scaling with the compression from the jamming transition point J at zero temperature and shear stress, for finite size systems the quasistatic-shear sampling leads to a lower yield stress and a higher critical volume fraction at point J. The shear modulus of the jammed solids decreases with increasing shear stress. However, the shear modulus does not decay to zero at yielding. This discontinuous change of the shear modulus implies the discontinuous nature of the unjamming transition under nonzero shear stress, which is further verified by the observation of a discontinuous jump in the pressure from the jammed solids to the shear flows. The pressure jump decreases upon decompression and approaches zero at the critical-like point J, in analogy with the well-known phase transitions under an external field. The analysis of the force networks in the jammed solids reveals that the force distribution is more sensitive to the increase of the shear stress near point J. The force network anisotropy increases with increasing shear stress. The weak particle contacts near the average force and under large shear stresses it exhibit an asymmetric angle distribution. 展开更多
关键词 jamming SHEAR phase transition force network
下载PDF
Modeling the capability of penetrating a jammed crowd to eliminate freezing transition
3
作者 Mohammed Mahmod Shuaib 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第5期65-72,共8页
Frozen state from jammed state is one of the most interesting aspects produced when simulating the multidirectional pedestrian flow of high density crowds. Cases of real life situations for such a phenomenon are not e... Frozen state from jammed state is one of the most interesting aspects produced when simulating the multidirectional pedestrian flow of high density crowds. Cases of real life situations for such a phenomenon are not exhaustively treated.Our observations in the Hajj crowd show that freezing transition does not occur very often. On the contrary, penetrating a jammed crowd is a common aspect. We believe the kindness of pedestrians facing others whose walking is blocked is a main factor in eliminating the frozen state as well as in relieving the jammed state. We refine the social force model by incorporating a new social force to enable the simulated pedestrians to mimic the real behavior observed in the Hajj area.Simulations are performed to validate the work qualitatively. 展开更多
关键词 multidirectional flow jamming transition pedestrian behavior social force
下载PDF
Complex force network in marginally and deeply jammed solids
4
作者 胡茂彬 姜锐 吴清松 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第6期475-480,共6页
This paper studies the force network properties of marginally and deeply jammed packings of frictionless soft particlesfrom the perspective of complex network theory. We generate zero-temperature granular packings at ... This paper studies the force network properties of marginally and deeply jammed packings of frictionless soft particlesfrom the perspective of complex network theory. We generate zero-temperature granular packings at different pressures by minimizing the inter-particle potential energy. The force networks are constructed as nodes representing particles and links representing normal forces between the particles. Deeply jammed solids show remarkably different behavior from marginally jammed solids in their degree distribution, strength distribution, degree correlation, and clustering coefficient. Bimodal and multi-modal distributions emerge when the system enters the deep jamming region. The results also show that small and large particles can show different correlation behavior in this simple system. 展开更多
关键词 jamming complex networks amorphous solids
下载PDF
Robust adaptive radar beamforming based on iterative training sample selection using kurtosis of generalized inner product statistics
5
作者 TIAN Jing ZHANG Wei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2024年第1期24-30,共7页
In engineering application,there is only one adaptive weights estimated by most of traditional early warning radars for adaptive interference suppression in a pulse reputation interval(PRI).Therefore,if the training s... In engineering application,there is only one adaptive weights estimated by most of traditional early warning radars for adaptive interference suppression in a pulse reputation interval(PRI).Therefore,if the training samples used to calculate the weight vector does not contain the jamming,then the jamming cannot be removed by adaptive spatial filtering.If the weight vector is constantly updated in the range dimension,the training data may contain target echo signals,resulting in signal cancellation effect.To cope with the situation that the training samples are contaminated by target signal,an iterative training sample selection method based on non-homogeneous detector(NHD)is proposed in this paper for updating the weight vector in entire range dimension.The principle is presented,and the validity is proven by simulation results. 展开更多
关键词 adaptive radar beamforming training sample selection non-homogeneous detector electronic jamming jamming suppression
下载PDF
K-core attack, equilibrium K-core,and kinetically constrained spin system
6
作者 周海军 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期14-26,共13页
Kinetically constrained spin systems are toy models of supercooled liquids and amorphous solids. In this perspective,we revisit the prototypical Fredrickson–Andersen(FA) kinetically constrained model from the viewpoi... Kinetically constrained spin systems are toy models of supercooled liquids and amorphous solids. In this perspective,we revisit the prototypical Fredrickson–Andersen(FA) kinetically constrained model from the viewpoint of K-core combinatorial optimization. Each kinetic cluster of the FA system, containing all the mutually visitable microscopic occupation configurations, is exactly the solution space of a specific instance of the K-core attack problem. The whole set of different jammed occupation patterns of the FA system is the configuration space of an equilibrium K-core problem. Based on recent theoretical results achieved on the K-core attack and equilibrium K-core problems, we discuss the thermodynamic spin glass phase transitions and the maximum occupation density of the fully unfrozen FA kinetic cluster, and the minimum occupation density and extreme vulnerability of the partially frozen(jammed) kinetic clusters. The equivalence between K-core attack and the fully unfrozen FA kinetic cluster also implies a new way of sampling K-core attack solutions. 展开更多
关键词 Fredrickson–Andersen model K-core attack spin glass jamming
下载PDF
A target parameter estimation method via atom-reconstruction in radar mainlobe jamming
7
作者 ZHOU Bilei LIU Weijian +5 位作者 LI Rongfeng CHEN Hui ZHANG Liang DU Qinglei LI Binbin CHEN Hao 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期350-360,共11页
Mainlobe jamming(MLJ)brings a big challenge for radar target detection,tracking,and identification.The suppression of MLJ is a hard task and an open problem in the electronic counter-counter measures(ECCM)field.Target... Mainlobe jamming(MLJ)brings a big challenge for radar target detection,tracking,and identification.The suppression of MLJ is a hard task and an open problem in the electronic counter-counter measures(ECCM)field.Target parameters and target direction estimation is difficult in radar MLJ.A target parameter estimation method via atom-reconstruction in radar MLJ is proposed in this paper.The proposed method can suppress the MLJ and simultaneously provide high estimation accuracy of target range and angle.Precisely,the eigen-projection matrix processing(EMP)algorithm is adopted to suppress the MLJ,and the target range is estimated effectively through the beamforming and pulse compression.Then the target angle can be effectively estimated by the atom-reconstruction method.Without any prior knowledge,the MLJ can be canceled,and the angle estimation accuracy is well preserved.Furthermore,the proposed method does not have strict requirement for radar array construction,and it can be applied for linear array and planar array.Moreover,the proposed method can effectively estimate the target azimuth and elevation simultaneously when the target azimuth(or elevation)equals to the jamming azimuth(or elevation),because the MLJ is suppressed in spatial plane dimension. 展开更多
关键词 mainlobe jamming ANTI-JAMMING atom-reconstruction RADAR
下载PDF
Full-domain collaborative deployment method of multiple interference sources and evaluation of its deployment effect
8
作者 Yue Wang Fuping Sun +2 位作者 Xian Wang Jinming Hao Kai Xiao 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期572-595,共24页
This paper realizes the full-domain collaborative deployment of multiple interference sources of the global satellite navigation system(GNSS)and evaluates the deployment effect to enhance the ability to disturb the at... This paper realizes the full-domain collaborative deployment of multiple interference sources of the global satellite navigation system(GNSS)and evaluates the deployment effect to enhance the ability to disturb the attacker and the capability to defend the GNSS during navigation countermeasures.Key evaluation indicators for the jamming effect of GNSS suppressive and deceptive jamming sources are first created,their evaluation models are built,and their detection procedures are sorted out,as the basis for determining the deployment principles.The principles for collaboratively deploying multi-jamming sources are developed to obtain the deployment structures(including the required number,structures in demand,and corresponding positions)of three single interference sources required by collaboratively deploying.Accordingly,simulation and hardware-in-loop testing results are presented to determine a rational configuration of the collaborative deployment of multi-jamming sources in the set situation and further realize the full-domain deployment of an interference network from ground,air to space.Varied evaluation indices for the deployment effect are finally developed to evaluate the deployment effect of the proposed configuration and further verify its reliability and rationality. 展开更多
关键词 Jamming effect Multiple interference sources Collaborative deployment Effect evaluation Defense capability
下载PDF
Optimization of jamming formation of USV offboard active decoy clusters based on an improved PSO algorithm
9
作者 Zhaodong Wu Yasong Luo Shengliang Hu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期529-540,共12页
Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for t... Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for timing and deployment.To improve the response speed and jamming effect,a cluster of OADs based on an unmanned surface vehicle(USV)is proposed.The formation of the cluster determines the effectiveness of jamming.First,based on the mechanism of OAD jamming,critical conditions are identified,and a method for assessing the jamming effect is proposed.Then,for the optimization of the cluster formation,a mathematical model is built,and a multi-tribe adaptive particle swarm optimization algorithm based on mutation strategy and Metropolis criterion(3M-APSO)is designed.Finally,the formation optimization problem is solved and analyzed using the 3M-APSO algorithm under specific scenarios.The results show that the improved algorithm has a faster convergence rate and superior performance as compared to the standard Adaptive-PSO algorithm.Compared with a single OAD,the optimal formation of USV-OAD cluster effectively fills the blind area and maximizes the use of jamming resources. 展开更多
关键词 Electronic countermeasure Offboard active decoy USV cluster Jamming formation optimization Improved PSO algorithm
下载PDF
An angular blinking jamming method based on electronically controlled corner reflectors
10
作者 GAN Lin WU Zehao +1 位作者 WANG Xuesong LI Jianbing 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期330-338,共9页
Passive jamming is believed to have very good potential in countermeasure community.In this paper,a passive angular blinking jamming method based on electronically controlled corner reflectors is proposed.The amplitud... Passive jamming is believed to have very good potential in countermeasure community.In this paper,a passive angular blinking jamming method based on electronically controlled corner reflectors is proposed.The amplitude of the incident wave can be modulated by switching the corner reflector between the penetration state and the reflection state,and the ensemble of multiple corner reflectors with towing rope can result in complex angle decoying effects.Dependency of the decoying effect on corner reflectors’radar cross section and positions are analyzed and simulated.Results show that the angle measured by a monopulse radar can be significantly interfered by this method while the automatic tracking is employed. 展开更多
关键词 monopulse radar angular blinking jamming corner reflector amplitude-comparison angle measurement metasurface
下载PDF
Modulated-ISRJ rejection using online dictionary learning for synthetic aperture radar imagery
11
作者 WEI Shaopeng ZHANG Lei +1 位作者 LU Jingyue LIU Hongwei 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期316-329,共14页
In electromagnetic countermeasures circumstances,synthetic aperture radar(SAR)imagery usually suffers from severe quality degradation from modulated interrupt sampling repeater jamming(MISRJ),which usually owes consid... In electromagnetic countermeasures circumstances,synthetic aperture radar(SAR)imagery usually suffers from severe quality degradation from modulated interrupt sampling repeater jamming(MISRJ),which usually owes considerable coherence with the SAR transmission waveform together with periodical modulation patterns.This paper develops an MISRJ suppression algorithm for SAR imagery with online dictionary learning.In the algorithm,the jamming modulation temporal properties are exploited with extracting and sorting MISRJ slices using fast-time autocorrelation.Online dictionary learning is followed to separate real signals from jamming slices.Under the learned representation,time-varying MISRJs are suppressed effectively.Both simulated and real-measured SAR data are also used to confirm advantages in suppressing time-varying MISRJs over traditional methods. 展开更多
关键词 synthetic aperture radar(SAR) modulated interrupt sampling jamming(MISRJ) online dictionary learning
下载PDF
Impacts of bridge piers on water level during ice jammed period in bend channel——An experimental study 被引量:2
12
作者 王军 李淑祎 +2 位作者 陈胖胖 汪涛 Jueyi Sui 《Journal of Hydrodynamics》 SCIE EI CSCD 2018年第1期160-168,共9页
Experiments are carried out in an "S-shaped" flume in the laboratory under both open flow and ice-jammed conditions to study the impacts of bridge piers in a bend channel on the variation of the water level. The var... Experiments are carried out in an "S-shaped" flume in the laboratory under both open flow and ice-jammed conditions to study the impacts of bridge piers in a bend channel on the variation of the water level. The variations of the water level under the ice jammed condition with bridge piers are compared to those without bridge piers in an 180° bend channel. Results indicate that the bridge piers in the S-shaped channel have obvious impacts on the ice accumulation and the water level. The increment of the water level with the presence of the bridge piers is less than that without the bridge piers in the channel. Different arrangements of the bridge piers result in different increments of the water level. When one bridge pier is installed in the straight section of the channel(between 2 bends) and another one at the bend apex(for a convex bank), the increment of the water level during the equilibrium ice jammed period is between that with a single bridge pier located in the straight section of the bend channel and that with a single bridge pier located at the bend apex. It is also shown that the increment of the water level during the equilibrium ice jammed period increases with the increase of the average thickness of the ice jams. 展开更多
关键词 Ice jam bend channel bridge pier increment of water level
原文传递
Open World Recognition of Communication Jamming Signals 被引量:2
13
作者 Yan Tang Zhijin Zhao +4 位作者 Jie Chen Shilian Zheng Xueyi Ye Caiyi Lou Xiaoniu Yang 《China Communications》 SCIE CSCD 2023年第6期199-214,共16页
To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is proposed.The algorithm can recognize known jamming classes,detect new(unknown)jamming c... To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is proposed.The algorithm can recognize known jamming classes,detect new(unknown)jamming classes,and unsupervised cluseter new classes.The network of SNN-OWR is trained supervised with paired input data consisting of two samples from a known dataset.On the one hand,the network is required to have the ability to distinguish whether two samples are from the same class.On the other hand,the latent distribution of known class is forced to approach their own unique Gaussian distribution,which is prepared for the subsequent open set testing.During the test,the unknown class detection process based on Gaussian probability density function threshold is designed,and an unsupervised clustering algorithm of the unknown jamming is realized by using the prior knowledge of known classes.The simulation results show that when the jamming-to-noise ratio is more than 0d B,the accuracy of SNN-OWR algorithm for known jamming classes recognition,unknown jamming detection and unsupervised clustering of unknown jamming is about 95%.This indicates that the SNN-OWR algorithm can make the effect of the recognition of unknown jamming be almost the same as that of known jamming. 展开更多
关键词 communication jamming signals Siamese Neural Network Open World Recognition unsupervised clustering of new jamming type Gaussian probability density function
下载PDF
Jamming-Aided Secure Communication in Ultra-Dense LEO Integrated Satellite-Terrestrial Networks 被引量:2
14
作者 Yongpeng Shi Jiajia Liu +1 位作者 Jiadai Wang Yijie Xun 《China Communications》 SCIE CSCD 2023年第7期43-56,共14页
The ultra-dense low earth orbit(LEO)integrated satellite-terrestrial networks(UDLEO-ISTN)can bring lots of benefits in terms of wide coverage,high capacity,and strong robustness.Meanwhile,the broadcasting and open nat... The ultra-dense low earth orbit(LEO)integrated satellite-terrestrial networks(UDLEO-ISTN)can bring lots of benefits in terms of wide coverage,high capacity,and strong robustness.Meanwhile,the broadcasting and open natures of satellite links also reveal many challenges for transmission security protection,especially for eavesdropping defence.How to efficiently take advantage of the LEO satellite’s density and ensure the secure communication by leveraging physical layer security with the cooperation of jammers deserves further investigation.To our knowledge,using satellites as jammers in UDLEO-ISTN is still a new problem since existing works mainly focused on this issue only from the aspect of terrestrial networks.To this end,we study in this paper the cooperative secrecy communication problem in UDLEOISTN by utilizing several satellites to send jamming signal to the eavesdroppers.An iterative scheme is proposed as our solution to maximize the system secrecy energy efficiency(SEE)via jointly optimizing transmit power allocation and user association.Extensive experiment results verify that our designed optimization scheme can significantly enhance the system SEE and achieve the optimal power allocation and user association strategies. 展开更多
关键词 ultra-dense LEO satellite integrated satellite-terrestrial network physical layer security cooperative jamming
下载PDF
Numerical Analyses of Ice Jamming in Jacket Platform Conductor Array in Bohai Sea
15
作者 ZHAI Bi-yao YANG Fan +1 位作者 PAN Jun-ning XIE Dong-mei 《China Ocean Engineering》 SCIE EI CSCD 2023年第6期885-896,共12页
Serious ice accumulating,pile-up and ice jamming occur around the conductor array of offshore jacket platforms during the winter every year in Bohai Sea,which could cause grave threats to the stability of platform str... Serious ice accumulating,pile-up and ice jamming occur around the conductor array of offshore jacket platforms during the winter every year in Bohai Sea,which could cause grave threats to the stability of platform structure,the safety of people and equipment,and even severer calamity.Therefore,the process of ice accumulation and ice jamming in the jacket platform area needs more concern.This study focuses on ice accumulation and jamming behaviors in the jacket platform conductor area by using a coupled two-dimensional hydro-ice dynamics model.A series of cases are conducted with different flow conditions,such as flow velocity,drifting direction and oscillatory flow.Through the simulation,the ice pile-up process is described and changes in ice-jamming thickness,ice pile-up location and ice pile-up volume are investigated.The differences in ice pile-up in the steady flow and oscillatory flow are analyzed.This study proposes a new approach to simulate the ice jamming process in the jacket platform conductor area,providing a reference for ice management on the platform. 展开更多
关键词 sea ice ice jamming conductor array numerical modeling hydro-ice dynamics
下载PDF
Joint target assignment and power allocation in the netted C-MIMO radar when tracking multi-targets in the presence of self-defense blanket jamming
16
作者 Zhengjie Li Junwei Xie +1 位作者 Haowei Zhang Jiahao Xie 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第6期414-427,共14页
The netted radar system(NRS)has been proved to possess unique advantages in anti-jamming and improving target tracking performance.Effective resource management can greatly ensure the combat capability of the NRS.In t... The netted radar system(NRS)has been proved to possess unique advantages in anti-jamming and improving target tracking performance.Effective resource management can greatly ensure the combat capability of the NRS.In this paper,based on the netted collocated multiple input multiple output(CMIMO)radar,an effective joint target assignment and power allocation(JTAPA)strategy for tracking multi-targets under self-defense blanket jamming is proposed.An architecture based on the distributed fusion is used in the radar network to estimate target state parameters.By deriving the predicted conditional Cramer-Rao lower bound(PC-CRLB)based on the obtained state estimation information,the objective function is formulated.To maximize the worst case tracking accuracy,the proposed JTAPA strategy implements an online target assignment and power allocation of all active nodes,subject to some resource constraints.Since the formulated JTAPA is non-convex,we propose an efficient two-step solution strategy.In terms of the simulation results,the proposed algorithm can effectively improve tracking performance in the worst case. 展开更多
关键词 Netted radar system MIMO Target assignment Power allocation Multi-targets tracking Self-defense blanket jamming
下载PDF
Towards reinforcement learning in UAV relay for anti-jamming maritime communications
17
作者 Chuhuan Liu Yi Zhang +3 位作者 Guohang Niu Luliang Jia Liang Xiao Jiangxia Luan 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1477-1485,共9页
Maritime communications with sea surface reflections and sea wave occlusions are susceptible to jamming attacks due to the wide geographical area and intensive wireless communication services.Unmanned Aerial Vehicles(... Maritime communications with sea surface reflections and sea wave occlusions are susceptible to jamming attacks due to the wide geographical area and intensive wireless communication services.Unmanned Aerial Vehicles(UAVs)help relay messages to improve communication performance,but the relay policy that depends on the rapidly changing maritime environments is difficult to optimize.In this paper,a reinforcement learning-based UAV relay policy for maritime communications is proposed to resist jamming attacks.Based on previous transmission performance,the relay location,the received power of the transmitted signal and the received jamming power,this scheme optimizes the UAV trajectory and relay power to save the energy consumption and decrease the Bit-Error-Rate(BER)of the maritime signals.A deep reinforcement learning-based scheme is also proposed,which designs a deep neural network with dueling architecture to further improve the communication performance and computational complexity.The performance bounds regarding the signal to interference plus noise ratio,energy consumption and the communication utility are provided based on the Nash equilibrium of the game against jamming,and the computational complexity of the proposed schemes is analyzed.Simulation results show that the proposed schemes improve the energy efficiency and decrease the BER compared with the benchmark. 展开更多
关键词 Maritime communications Jamming Unmanned aerial vehicle RELAY Reinforcement learning
下载PDF
Experimental study on the mechanism of flow blockage formation in fast reactor
18
作者 Wen-Hui Jin Song-Bai Cheng Xiao-Xing Liu 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2023年第6期171-182,共12页
Various sources of solid particles might exist in the coolant flow of a liquid metal cooled fast reactor(e.g.,through chemical interaction between the coolant and impurities,air,or water,through corrosion of structura... Various sources of solid particles might exist in the coolant flow of a liquid metal cooled fast reactor(e.g.,through chemical interaction between the coolant and impurities,air,or water,through corrosion of structural materials,or from damaged/molten fuel).Such particles may cause flow blockage accidents in a fuel assembly,resulting in a reduction in coolant flow,which potentially causes a local temperature rise in the fuel cladding,cladding failure,and fuel melt.To understand the blockage formation mechanism,in this study,a series of simulated experiments was conducted by releasing different solid particles from a release device into a reducer pipe using gravity.Through detailed analyses,the influence of various experimental parameters(e.g.,particle diameter,capacity,shape,and static friction coefficient,and the diameter and height of the particle release nozzle)on the blockage characteristics(i.e.,blockage probability and position)was examined.Under the current range of experimental conditions,the blockage was significantly influenced by the aforementioned parameters.The ratio between the particle diameter and outlet size of the reducer pipe might be one of the determining factors governing the occurrence of blockage.Specifically,increasing the ratio enhanced blockage(i.e.,larger probability and higher position within the reducer pipe).Increasing the particle size,particle capacity,particle static friction coefficient,and particle release nozzle diameter led to a rise in the blockage probability;however,increasing the particle release nozzle height had a downward influence on the blockage probability.Finally,blockage was more likely to occur in non-spherical particles case than that of spherical particles.This study provides a large experimental database to promote an understanding of the flow blockage mechanism and improve the validation process of fast reactor safety analysis codes. 展开更多
关键词 Liquid metal cooled fast reactor Flow blockage Granular jamming Experimental study
下载PDF
Received Power Based Unmanned Aerial Vehicles (UAVs) Jamming Detection and Nodes Classification Using Machine Learning
19
作者 Waleed Aldosari 《Computers, Materials & Continua》 SCIE EI 2023年第4期1253-1269,共17页
This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks onWireless Sensor Networks(WSNs).Jamming is a type of Denial of Service(DoS)attack and intentional ... This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks onWireless Sensor Networks(WSNs).Jamming is a type of Denial of Service(DoS)attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly.To defend and prevent such attacks,the first step is to detect them.The current detection approaches use centralized techniques to detect jamming,where each node collects information and forwards it to the base station.As a result,overhead and communication costs increased.In this work,we present a jamming attack and classify nodes into different categories based on their location to the jammer by employing a single node observer.As a result,we introduced a machine learning model that uses distance ratios and power received as features to detect such attacks.Furthermore,we considered several types of jammers transmitting at different power levels to evaluate the proposed metrics using MATLAB.With a detection accuracy of 99.7%for the k-nearest neighbors(KNN)algorithm and average testing accuracy of 99.9%,the presented solution is capable of efficiently and accurately detecting jamming attacks in wireless sensor networks. 展开更多
关键词 Jamming attacks machine learning unmanned aerial vehicle(UAV) WSNS
下载PDF
Cognitive J^(2)SAC:Joint Jamming,Sensing,and Communication Under Antagonistic Environment
20
作者 Jiangchun Gu Guoru Ding +3 位作者 Yizhen Yin Haichao Wang Yitao Xu Yehui Song 《China Communications》 SCIE CSCD 2023年第9期78-95,共18页
Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still fac... Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still faces the challenges of the information security and transmission robustness caused by the openness of wireless channel,especially under antagonistic environment.Hence,this article develops a generalized framework,named cognitive joint jamming,sensing and communication(cognitive J2SAC),to empower the current sensing/communication/jamming system with a“brain”for realizing precise sensing,reliable communication and effective jamming under antagonistic environment.Three kinds of gains can be captured by cognitive J2SAC,including integrated gain,cooperative gain and cognitive gain.Moreover,we highlight the enabling mechanism among jamming,sensing,and communication,as well as illustrating several typical use cases of cognitive J2SAC.Furthermore,several key enabled technologies are analyzed and a typical sensing enhance integrated communication and jamming case study is discussed to verify the effectiveness of the proposed method.Last but not the least,the future directions are listed before concluding this article.Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still faces the challenges of the information security and transmission robustness caused by the openness of wireless channel,especially under antagonistic environment.Hence,this article develops a generalized framework,named cognitive joint jamming,sensing and communication(cognitive J2SAC),to empower the current sensing/communication/jamming system with a“brain”for realizing precise sensing,reliable communication and effective jamming under antagonistic environment.Three kinds of gains can be captured by cognitive J2SAC,including integrated gain,cooperative gain and cognitive gain.Moreover,we highlight the enabling mechanism among jamming,sensing,and communication,as well as illustrating several typical use cases of cognitive J2SAC.Furthermore,several key enabled technologies are analyzed and a typical sensing enhance integrated communication and jamming case study is discussed to verify the effectiveness of the proposed method.Last but not the least,the future directions are listed before concluding this article. 展开更多
关键词 integrated sensing and communication(ISAC) information security joint jamming sensing and communication(J2SAC) cognition theory
下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部