期刊文献+
共找到391篇文章
< 1 2 20 >
每页显示 20 50 100
Multi-Antenna Jammer Assisted Covert Communications in Data Collected IoT with NOMA
1
作者 Liwei Tao Weiwei Yang +3 位作者 Xingbo Lu Ruiqian Ma Ling Yang Yi Song 《China Communications》 SCIE CSCD 2023年第5期217-231,共15页
In this paper,we investigate covert communications in data collected IoT with NOMA,where the paired sensor nodes S_(m) and S_(n) transmit covert messages to a legitimate receiver(Bob)in the presence of a Warden(Willie... In this paper,we investigate covert communications in data collected IoT with NOMA,where the paired sensor nodes S_(m) and S_(n) transmit covert messages to a legitimate receiver(Bob)in the presence of a Warden(Willie).To confuse the detection at Willie,an extra multi-antenna friendly jammer(Jammer)has been employed to transmit artificial noise(AN)with random power.Based on the CSI of Willie is available or not at Jammer,three AN transmission schemes,including null-space artificial noise(NAN),transmit antenna selection(TAS),and zeroforcing beamforming(ZFB),are proposed.Furthermore,the closed-form expressions of expected minimum detection error probability(EMDEP)and joint connection outage probability(JCOP)are derived to measure covertness and reliability,respectively.Finally,the maximum effective covert rate(ECR)is obtained with a given covertness constraint.The numerical results show that ZFB scheme has the best maximum ECR in the case of the number of antennas satisfies N>2,and the same maximum ECR can be achieved in ZFB and NAN schemes with N=2.Moreover,TAS scheme also can improve the maximum ECR compared with the benchmark scheme(i.e.,signal-antenna jammer).In addition,a proper NOMA node pairing can further improve the maximum ECR. 展开更多
关键词 IOT covert communications NOMA node pairing multi-antenna jammer
下载PDF
A Coincered Node Based Localization of Jammers in Wireless Sensor Networks
2
作者 Balamurugan Perumal Sharmila Vadivel Mummoorthy Arulappan 《Circuits and Systems》 2016年第9期2613-2621,共9页
Jammers can awfully interfere with the wireless communications. The transmission and reception of wireless communication is blocked by the jammer. The intruder will place the jammer in a well topological network area ... Jammers can awfully interfere with the wireless communications. The transmission and reception of wireless communication is blocked by the jammer. The intruder will place the jammer in a well topological network area and they can easily track the information. It will help them to block the signal transmission and reception. Now, the intention is to track the position of the jammer where it is fixed. The existing methods rely on the indirect measurements and the boundary node to find the jammer’s position which degrades the accuracy of the localization. To improve the efficiency, this paper proposed an efficient method namely Coincered Node Based Localization of jammers to find the position of the jammer with high level of accuracy. The proposed system uses the direct measurements, which is the jammer signal strength. The effectiveness can also be increased by using the coincered node that will stumble across the true position of the jammer. The proposed work is compared with existing methods. Then the proposed mechanism proves better to find the jammer location. The simulation results estimate that the accuracy of the localization achieves better performance than the existing schemes. 展开更多
关键词 Wireless Sensor Network Jamming jammer Localization jammer Signal Strength Coincered Node
下载PDF
Mobile Jammer-Aided Secure UAV Communications via Trajectory Design and Power Control 被引量:9
3
作者 An Li Wenjing Zhang 《China Communications》 SCIE CSCD 2018年第8期141-151,共11页
To further promote the achievable average secrecy rate for UAV-ground communications, a UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional cooperative UAV is employed as a mobile... To further promote the achievable average secrecy rate for UAV-ground communications, a UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional cooperative UAV is employed as a mobile jammer to transmit the jamming signal to help keep the source UAV closer to the ground destination, thus establishing more favorable legitimate link and enhancing the secrecy performance. We aimed to maximize the achievable secrecy rate by jointly optimizing the trajectories and transmit power of both source UAV and jammer UAV. To solve the considered non-convex optimization problem, we presented a block coordinate descent based iterative algorithm to address a sequence of approximated convex problems for the optimized parameter block by block to find a local optimal solution. Numerical results verify that the proposed algorithm can achieve significant secrecy rate gain compared to all the benchmark schemes. 展开更多
关键词 轨道设计 UAV 通讯 jammer 安全 拥挤 控制 联合优化
下载PDF
Put Others Before Itself:A Multi-Leader One-Follower Anti-Jamming Stackelberg Game Against Tracking Jammer 被引量:2
4
作者 Xiaobo Zhang Hai Wang +2 位作者 Yifan Xu Zhibin Feng Yunpeng Zhang 《China Communications》 SCIE CSCD 2021年第11期168-181,共14页
This paper mainly investigates the coordinated anti-jamming channel access problems in multiuser scenarios where there exists a tracking jammer who senses the spectrum and traces the channel with maximal receiving pow... This paper mainly investigates the coordinated anti-jamming channel access problems in multiuser scenarios where there exists a tracking jammer who senses the spectrum and traces the channel with maximal receiving power.To cope with the challenges brought by the tracking jammer,a multi-leader onefollower anti-jamming Stackelberg(MOAS)game is formulated,which is able to model the complex interactions between users and the tracking jammer.In the proposed game,users act as leaders,chose their channel access strategies and transmit firstly.The tracking jammer acts as the follower,whose objective is to find the optimal jamming strategy at each time slot.Besides,the existence of Stackelberg equilibriums(SEs)is proved,which means users reach Nash Equilibriums(NEs)for each jamming strategy while the jammer finds its best response jamming strategy for the current network access case.An active attraction based anti-jamming channel access(3ACA)algorithm is designed to reach SEs,where jammed users keep their channel access strategies unchanged to create access chances for other users.To enhance the fairness of the system,users will adjust their strategies and relearn after certain time slots to provide access chances for those users who sacrifice themselves to attract the tracking jammer. 展开更多
关键词 coordinated anti-jamming channel access Stackelberg game tracking jammer active attraction
下载PDF
Effects of long-term exposure to radiofrequency radiations emitted by mobile Jammers on reproduction parameters in rats 被引量:1
5
作者 Maryam Owjfard Manzarbanoo Shojaei Fard 《Asian pacific Journal of Reproduction》 2017年第4期164-171,共8页
Objective:To evaluate the effect of long-term exposure to radiofrequency radiations emitted from mobile jammers onrat's reproductive parameters.Methods: Eighty male rats were divided into neonatal group (n=20), im... Objective:To evaluate the effect of long-term exposure to radiofrequency radiations emitted from mobile jammers onrat's reproductive parameters.Methods: Eighty male rats were divided into neonatal group (n=20), immature group (n=30) and mature group (n=30). Neonatal rats were randomly divided into two subgroups. Immature and mature rats were randomly divided into three subgroups. Experimental rats were fixed in the restraining tube and were exposed to radiofrequency radiations emitted from mobile jammers at a distance of 100 cm, for 30 d (7 h/d). Sham group rats were also fixed in restraining tube but without radiations. The control group was allowed to move freely without being exposed to radiation. At the end of the experiment, weight of testes, sperm quality, histological testicular sections and serum testosterone levels were evaluated.Results: Long-term exposure to radiofrequency from mobile jammers could adversely affect neonatal rat fertility, but it did not have significant effects on male mature and immature rat's reproduction parameters. However, restraint stress induced by immobilizing them for a long-period could adversely affect male mature rat's reproductive parameters, but it had no significant effect on male immature rat's reproduction parameters.Conclusion:The effects of EMF exposure to be various based on the life stage. 展开更多
关键词 RADIO frequency MOBILE jammers TESTICULAR REPRODUCTION RATS
下载PDF
Lightweight jammer localization algorithm in wireless sensor networks
6
作者 成天桢 栗苹 朱森存 《Journal of Beijing Institute of Technology》 EI CAS 2013年第2期143-148,共6页
In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a gr... In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a great concern recently. Finding the location of a jammer is important to take security actions against the jammer, and thus to restore the network communication. After a comprehensive study on the jammer localization problem, a lightweight easy-operated algorithm called triple circles localization (TCL) is proposed. The evaluation results have demonstrated that, compared with other approaches, TCL achieves the best jammer localization accuracy under variable conditions. 展开更多
关键词 jammer localization jamming attacks wireless sensor networks
下载PDF
Enhanced Intrusion Detection System for an EH IoT Architecture Using a Cooperative UAV Relay and Friendly UAV Jammer
7
作者 Van Nhan Vo Hung Tran Chakchai So-In 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第11期1786-1799,共14页
In this paper,the detection capabilities and system performance of an energy harvesting(EH)Internet of Things(Io T)architecture in the presence of an unmanned aerial vehicle(UAV)eavesdropper(UE)are investigated.The co... In this paper,the detection capabilities and system performance of an energy harvesting(EH)Internet of Things(Io T)architecture in the presence of an unmanned aerial vehicle(UAV)eavesdropper(UE)are investigated.The communication protocol is divided into two phases.In the first phase,a UAV relay(UR)cooperates with a friendly UAV jammer(UJ)to detect the UE,and the UR and UJ harvest energy from a power beacon(PB).In the second phase,a ground base station(GBS)sends a confidential signal to the UR using non-orthogonal multiple access(NOMA);the UR then uses its harvested energy to forward this confidential signal to IoT destinations(IDs)using the decode-and-forward(DF)technique.Simultaneously,the UJ uses its harvested energy to emit an artificial signal to combat the detected UE.A closed-form expression for the probability of detecting the UE(the detection probability,DP)is derived to analyze the detection performance.Furthermore,the intercept probability(IP)and throughput of the considered IoT architecture are determined.Accordingly,we identify the optimal altitudes for the UR and UJ to enhance the system and secrecy performance.Monte Carlo simulations are employed to verify our approach. 展开更多
关键词 Detection probability(DP) energy harvesting(EH) friendly UAV jammer Internet of Things(IoT) system performance UAV detection
下载PDF
安捷伦科技推出业界首款具有在线误码注入功能的PCI EXPRESS Jammer
8
《电子测量技术》 2009年第2期178-178,共1页
2009年2月9日,安捷伦科技公司(NYSE:A)日前宣布推出在线误码注入工具(Jammer),用于进行PCI EXPRESS (PCIe)协议测试。Jammer采用了突破性的PCIe测试理念,是一种创新的测试工具,可帮助开发人员缩短测试周期和加快器件的上市... 2009年2月9日,安捷伦科技公司(NYSE:A)日前宣布推出在线误码注入工具(Jammer),用于进行PCI EXPRESS (PCIe)协议测试。Jammer采用了突破性的PCIe测试理念,是一种创新的测试工具,可帮助开发人员缩短测试周期和加快器件的上市速度。 展开更多
关键词 EXPRESS 安捷伦科技公司 jammer PCI 注入 误码 在线 协议测试
下载PDF
安捷伦科技推出业界首款具有在线误码注入功能的PCI EXPRESS Jammer
9
《国外电子测量技术》 2009年第3期80-80,共1页
关键词 EXPRESS 安捷伦科技公司 jammer PCI 误码 在线 协议测试 测试工具
下载PDF
Localizing Jammer in an Indoor Environment by Estimating Signal Strength and Kalman Filter
10
作者 Waleed Aldosari Mohamed Zohdy 《Wireless Engineering and Technology》 2018年第2期20-33,共14页
Localizing a jammer in an indoor environment in wireless sensor networks becomes a significant research problem due to the ease of blocking the communication between legitimate nodes. An adversary may emit radio frequ... Localizing a jammer in an indoor environment in wireless sensor networks becomes a significant research problem due to the ease of blocking the communication between legitimate nodes. An adversary may emit radio frequency to prevent the transmission between nodes. In this paper, we propose detecting the position of the jammer indoor by using the received signal strength and Kalman filter (KF) to reduce the noise due to the multipath signal caused by obstacles in the indoor environment. We compare our work to the Linear Prediction Algorithm (LP) and Centroid Localization Algorithm (CL). We observed that the Kalman filter has better results when estimating the distance compared to other algorithms. 展开更多
关键词 jammer Detecting Kalman Filter (KF) Linear Prediction (LP) CENTROID Localization (CL) jammer RECEIVED SIGNAL Strength (JRSS) MULTIPATH SIGNAL Indoor Location
下载PDF
电脑音乐DIY系列之三:电脑自动作曲软件Jammer
11
作者 goldman 《软件》 2000年第12期58-60,共3页
在我们周围有许多朋友非常喜欢音乐,头脑中时常有一些从不曾听过的音乐飘过,只可惜自己的音乐基础知识太少,无法把这些飘过脑际的美妙音乐记录下来,使它成为一首音乐作品,这点实在令人感到遗憾。先别着急,这里给大家介绍一个能够自动生... 在我们周围有许多朋友非常喜欢音乐,头脑中时常有一些从不曾听过的音乐飘过,只可惜自己的音乐基础知识太少,无法把这些飘过脑际的美妙音乐记录下来,使它成为一首音乐作品,这点实在令人感到遗憾。先别着急,这里给大家介绍一个能够自动生成音乐的软件——Jammer。你无须学习任何枯燥的音乐理论,只要对音乐有感觉、有鉴赏力。 展开更多
关键词 电脑自动作曲软件 jammer 电脑音乐 DIY系列
下载PDF
A Novel Range-Free Jammer Localization Solution in Wireless Network by Using PSO Algorithm
12
作者 LiangPang Xiao Chen +1 位作者 Zhi Xue Rida Khatoun 《国际计算机前沿大会会议论文集》 2017年第2期46-48,共3页
In wireless networks, jamming attacks are easy to launch and can significantly impact the network performance. The technique which localizes the jamming attacker is useful to address this problem. Some range-based loc... In wireless networks, jamming attacks are easy to launch and can significantly impact the network performance. The technique which localizes the jamming attacker is useful to address this problem. Some range-based localization schemes depend on the additional hardware of wireless nodes too much, and they can not work in resource-constrained wireless networks. Solutions in range-free localization are being pursued as a cost-effective alternative to more expensive range-based approaches.In this paper, we propose a novel range-free algorithm to localize the source of the attacker. We show that our approach only relies on the positions of each jammed or no-jammed node in the network, PSO algorithm is used to get the minimum covering circle of jammed positions and the circle center is the estimated jammer location. We compare our work with some existing range-free solutions via extensive simulations in two models, which are wireless sensor network (WSN) and vehicular ad hoc network (VANET) respectively. The experimental results suggest that our proposed algorithm achieves higher accuracy than the other solutions, and the localization error goes down with larger number of recorded jammed positions. In additional, when the recorded jammed positions are distributed in a specific constrained area, the localization error goes higher, we also propose an improved PSO algorithm to deal with this issue. 展开更多
关键词 Jamming attack jammer LOCALIZATION Vehicular ad HOC NETWORK (VANET) Wireless sensor NETWORK (WSN) PSO Minimum covering circle
下载PDF
Energy-Efficient Jammer Selection Approach for QoS Provisioning in Distributed Wireless Cooperative Networks
13
作者 Ma Yue Wang Li +3 位作者 Ke Tenghui Zhang Yong Song Mei Wang Xiaojun 《China Communications》 SCIE CSCD 2012年第7期90-98,共9页
Aiming at achieving better Quality of Service (QoS) provisioning in distributed wireless cooperative networks, a novel energy efficient jammer selection approach is proposed in this paper. We employ Secrecy Capacity (... Aiming at achieving better Quality of Service (QoS) provisioning in distributed wireless cooperative networks, a novel energy efficient jammer selection approach is proposed in this paper. We employ Secrecy Capacity (SC) to characterize the security of transmission. In order to accurately describe the time-varying characteristic, related channels are modeled as Finite-State Markov Channels (FSM Cs). The remaining energy of candidate node is considered in a similar way. Accordingly, jammer selection is modeled as Restless Multi-armed Bandit problem for the sake of energy balance and security. Primal-dual heuristic and priority-index heuristic are exploited to select the optimal jammer quickly and effectively. In the simulation, numerical evaluation of SC and networks lifetime results show that the proposed approach outperforms the existing ones. 展开更多
关键词 服务质量保障 合作网络 高效节能 分布式 干扰机 无线 协作 时间变化
下载PDF
UltraJam:Ultrasonic adaptive jammer based on nonlinearity effect of microphone circuits
14
作者 Zhicheng Han Jun Ma +1 位作者 Chao Xu Guoming Zhang 《High-Confidence Computing》 2023年第3期30-39,共10页
The widely used devices(e.g.smartphones,recorders)equipped with microphones have posed a severe threat to confidential conversations.In this paper,we design an inaudible anti-eavesdropping method:UltraJam,to reduce th... The widely used devices(e.g.smartphones,recorders)equipped with microphones have posed a severe threat to confidential conversations.In this paper,we design an inaudible anti-eavesdropping method:UltraJam,to reduce the risk of unwanted and secret recordings.UltraJam uses the ultrasonic signal to mask conversation.By leveraging the nonlinear effect of microphone circuits,the adaptive ultrasonic signal can be recorded and demodulated into low-frequency which can effectively squash the sound.Based on the characteristics of the attenuation coefficient and frequency response,we construct a number of jamming signals with different bandwidths and designed a wideband signal injection array,meanwhile adaptively adjust the power at each bandwidth signal to cover more frequency bands and increase usage scenarios.To verify the security of the microphone jamming system,we also utilize several audio recovery methods to recover the raw signal from jamming noise.The experimental results show that less than 1% of the words are recognized in the jamming recording,and even with the audio recovery method,99% of the words still cannot be recognized in the recovered jamming recording. 展开更多
关键词 Noise jammer MICROPHONE Nonlinear effects SECURITY
原文传递
Security-Reliability Tradeoff Analysis for Jamming Aided Decode-and-Forward Relay Networks
15
作者 Zou Ronggui Zou Yulong +1 位作者 Zhu Jia Li Bin 《China Communications》 SCIE CSCD 2024年第5期218-228,共11页
In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we p... In this paper,we explore a cooperative decode-and-forward(DF)relay network comprised of a source,a relay,and a destination in the presence of an eavesdropper.To improve physical-layer security of the relay system,we propose a jamming aided decodeand-forward relay(JDFR)scheme combining the use of artificial noise and DF relaying which requires two stages to transmit a packet.Specifically,in stage one,the source sends confidential message to the relay while the destination acts as a friendly jammer and transmits artificial noise to confound the eavesdropper.In stage two,the relay forwards its re-encoded message to the destination while the source emits artificial noise to confuse the eavesdropper.In addition,we analyze the security-reliability tradeoff(SRT)performance of the proposed JDFR scheme,where security and reliability are evaluated by deriving intercept probability(IP)and outage probability(OP),respectively.For the purpose of comparison,SRT of the traditional decode-and-forward relay(TDFR)scheme is also analyzed.Numerical results show that the SRT performance of the proposed JDFR scheme is better than that of the TDFR scheme.Also,it is shown that for the JDFR scheme,a better SRT performance can be obtained by the optimal power allocation(OPA)between the friendly jammer and user. 展开更多
关键词 decode-and-forward relay friendly jammer physical layer security power allocation security-reliability tradeoff
下载PDF
空频抗干扰对GNSS载波相位测量的影响
16
作者 张伟 彭梓洋 +1 位作者 马竞羽 贺智勇 《太赫兹科学与电子信息学报》 2024年第3期285-289,共5页
对于全球导航卫星系统(GNSS)的抗干扰,最有效的是采用自适应天线阵技术,但这种抗干扰处理会引入与信号入射方向相关的载波相位测量偏差,限制了其在高精确度测量领域的应用。为减小抗干扰处理的偏差,引入测量偏差及其分析方法,建立仿真模... 对于全球导航卫星系统(GNSS)的抗干扰,最有效的是采用自适应天线阵技术,但这种抗干扰处理会引入与信号入射方向相关的载波相位测量偏差,限制了其在高精确度测量领域的应用。为减小抗干扰处理的偏差,引入测量偏差及其分析方法,建立仿真模型,并搭建软件接收机进行实验。结果表明,在不增加额外约束的条件下,采用空频最小方差无畸变响应算法实现空频抗干扰处理器,不会引入载波相位测量偏差,非常适用于对抗干扰性能和测量精确度均有苛刻要求的场合。 展开更多
关键词 全球导航卫星系统 抗干扰 空频自适应处理 载波相位
下载PDF
基于多干扰机协同的极化SAR干扰方法
17
作者 纪朋徽 邢世其 +2 位作者 代大海 庞礴 冯德军 《信号处理》 CSCD 北大核心 2024年第5期907-921,共15页
针对单极化干扰机生成的干扰会被极化合成孔径雷达(SAR)鉴别和对消的问题,本文提出了一种基于多干扰机协同的极化SAR干扰方法。该方法在不改变现有干扰机单极化发射结构的基础上,通过时序协同不同位置的多个单极化干扰机,实现对极化SAR... 针对单极化干扰机生成的干扰会被极化合成孔径雷达(SAR)鉴别和对消的问题,本文提出了一种基于多干扰机协同的极化SAR干扰方法。该方法在不改变现有干扰机单极化发射结构的基础上,通过时序协同不同位置的多个单极化干扰机,实现对极化SAR的干扰。具体来说,根据极化SAR抗压制和欺骗干扰处理方式的不同,该方法利用不同位置的多个单极化干扰机同时发射,使极化SAR无法准确估计出干扰机发射天线极化比,从而无法对消压制干扰,实现压制干扰的目的;使用不同位置的多个单极化干扰机交替发射,有效破坏相邻两个接收脉冲之间的相关性,使极化SAR无法实现假目标对消,从而实现对极化SAR欺骗干扰的目的,并且多部单极化干扰机交替发射也能实现方位向间歇采样的干扰效果,增加欺骗干扰生成虚假目标的复杂性。由于实际应用中不需要改变现有单极化干扰机发射结构,该文所提方法为实现对极化SAR干扰带来了便利。并且该方法在生成压制和欺骗干扰时均使用模板调制干扰方式,通过简单的模板修改就能实现可控的压制和欺骗干扰效果。文中首先分析了极化SAR抗压制和欺骗干扰的方法,然后分别给出了多干扰机生成压制和欺骗干扰的时序协同方式,最后以模板调制干扰为基础具体分析了多干扰机协同生成干扰的方法,并分析了多干扰机的布局和干扰机数量选取准则。理论推导和仿真实验证明了本文方法能够实现对极化SAR的干扰。 展开更多
关键词 极化合成孔径雷达 多干扰机协同 单极化 模板调制干扰
下载PDF
基于非脉冲矢量网络分析仪的非反向交叉眼干扰实验设计与分析
18
作者 周亮 孟进 +2 位作者 刘永才 李伟 杨浩楠 《系统工程与电子技术》 EI CSCD 北大核心 2024年第1期62-70,共9页
交叉眼技术是对抗单脉冲雷达最有效的方式之一。针对交叉眼干扰多侧重于仿真建模、实验设计及实施复杂等特点,基于交叉眼干扰原理、单脉冲测角原理和矢量网络分析仪幅相精确测量等特性,设计了基于喇叭天线、微带天线、幅相调节器和非脉... 交叉眼技术是对抗单脉冲雷达最有效的方式之一。针对交叉眼干扰多侧重于仿真建模、实验设计及实施复杂等特点,基于交叉眼干扰原理、单脉冲测角原理和矢量网络分析仪幅相精确测量等特性,设计了基于喇叭天线、微带天线、幅相调节器和非脉冲矢量网络分析仪组成的非反向交叉眼干扰实验系统。在微波暗室环境下,先后开展了基于矢量网络分析仪的测角实验和非反向交叉眼干扰实验,并通过建立干扰天线相位中心电磁仿真模型,对误差展开了分析。实验和仿真结果表明:交叉眼干扰下实验测量的角度值与理论角度值随相位差变化趋势一致,其理论最大角度值与实际最大角度值误差不超过2°,对应的交叉眼增益误差小于0.5;基于矢量网络分析仪设计的非反向交叉眼实验系统可行,可模拟非反向交叉眼干扰对被动单脉冲雷达干扰,亦可部分模拟反向交叉眼干扰应用场景,为交叉眼干扰机设计和测试提供一定的指导。 展开更多
关键词 单脉冲雷达 交叉眼 干扰机 矢量网络分析仪
下载PDF
干扰弹发射过程中飞机弹舱结构损伤研究
19
作者 王斌 党蒲妮 +4 位作者 谭乐琴 刘江华 熊峰 张志楠 豆清波 《科学技术与工程》 北大核心 2024年第2期827-833,共7页
针对发射干扰弹时飞机弹舱腹板可能出现损伤的情况,对弹舱腹板受载情况和动力学响应进行了分析。开展了干扰弹发射时的冲击波载荷和金属腹板响应原理试验,对试验进行了数值模拟,模拟结果与试验结果较吻合,并进一步分析了实际弹舱腹板结... 针对发射干扰弹时飞机弹舱腹板可能出现损伤的情况,对弹舱腹板受载情况和动力学响应进行了分析。开展了干扰弹发射时的冲击波载荷和金属腹板响应原理试验,对试验进行了数值模拟,模拟结果与试验结果较吻合,并进一步分析了实际弹舱腹板结构在冲击波作用下可能出现的最大响应。根据弹舱空腔结构的非定常流场仿真所得的脉动压力功率谱密度载荷,计算了弹舱腹板在不同飞机构型脉动压力作用下的应力均方根值。分析结果表明:弹舱空腔结构所产生的脉动压力是造成弹舱腹板结构损伤的主要原因。根据分析结果,给出了干扰弹舱结构改进建议。 展开更多
关键词 干扰弹 冲击波 脉动压力 损伤 空腔流动
下载PDF
Supermodular interference suppression game for multistatic MIMO radar networks and multiple jammers with multiple targets 被引量:1
20
作者 Bin HE Hongtao SU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第4期617-629,共13页
To deal with the threat of the new generation of electronic warfare,we establish a non-cooperative countermeasure game model to analyze power allocation and interference suppression between multistatic multipleinput m... To deal with the threat of the new generation of electronic warfare,we establish a non-cooperative countermeasure game model to analyze power allocation and interference suppression between multistatic multipleinput multiple-output(MIMO)radars and multiple jammers in this study.First,according to the power allocation strategy,a supermodular power allocation game framework with a fixed weight(FW)vector is constructed.At the same time,a constrained optimization model for maximizing the radar utility function is established.Based on the utility function,the best power allocation strategies for the radars and jammers are obtained.The existence and uniqueness of the Nash equilibrium(NE)of the supermodular game are proved.A supermodular game algorithm with FW is proposed which converges to the NE.In addition,we use adaptive beamforming methods to suppress cross-channel interference that occurs as direct wave interferences between the radars and jammers.A supermodular game algorithm for joint power allocation and beamforming is also proposed.The algorithm can ensure the best power allocation,and also improves the interference suppression ability of the MIMO radar.Finally,the effectiveness and convergence of two algorithms are verified by numerical results. 展开更多
关键词 Supermodular game Power allocation BEAMFORMING MIMO radar Multiple jammers
原文传递
上一页 1 2 20 下一页 到第
使用帮助 返回顶部