期刊文献+
共找到9,719篇文章
< 1 2 250 >
每页显示 20 50 100
An anti-main-lobe jamming algorithm for airborne early warning radar based on APC-SVRGD joint optimization
1
作者 PENG Fang WU Jun +2 位作者 WANG Shuai LI Zhijun XIANG Jianjun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第1期134-143,共10页
Main lobe jamming seriously affects the detection performance of airborne early warning radar.The joint processing of polarization-space has become an effective way to suppress the main lobe jamming.To avoid the main ... Main lobe jamming seriously affects the detection performance of airborne early warning radar.The joint processing of polarization-space has become an effective way to suppress the main lobe jamming.To avoid the main beam distortion and wave crest migration caused by the main lobe jamming in adaptive beamforming,a joint optimization algorithm based on adaptive polarization canceller(APC)and stochastic variance reduction gradient descent(SVRGD)is proposed.First,the polarization plane array structure and receiving signal model based on primary and auxiliary array cancellation are established,and an APC iterative algorithm model is constructed to calculate the optimal weight vector of the auxiliary channel.Second,based on the stochastic gradient descent principle,the variance reduction method is introduced to modify the gradient through internal and external iteration to reduce the variance of the stochastic gradient estimation,the airspace optimal weight vector is calculated and the equivalent weight vector is introduced to measure the beamforming effect.Third,by setting up a planar polarization array simulation scene,the performance of the algorithm against the interference of the main lobe and the side lobe is analyzed,and the effectiveness of the algorithm is verified under the condition of short snapshot number and certain signal to interference plus noise ratio. 展开更多
关键词 airborne early warning radar adaptive beamforming main-lobe interference suppression adaptive polarization canceller(APC) stochastic variance reduction gradient descent(SVRGD)
下载PDF
A target parameter estimation method via atom-reconstruction in radar mainlobe jamming
2
作者 ZHOU Bilei LIU Weijian +5 位作者 LI Rongfeng CHEN Hui ZHANG Liang DU Qinglei LI Binbin CHEN Hao 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期350-360,共11页
Mainlobe jamming(MLJ)brings a big challenge for radar target detection,tracking,and identification.The suppression of MLJ is a hard task and an open problem in the electronic counter-counter measures(ECCM)field.Target... Mainlobe jamming(MLJ)brings a big challenge for radar target detection,tracking,and identification.The suppression of MLJ is a hard task and an open problem in the electronic counter-counter measures(ECCM)field.Target parameters and target direction estimation is difficult in radar MLJ.A target parameter estimation method via atom-reconstruction in radar MLJ is proposed in this paper.The proposed method can suppress the MLJ and simultaneously provide high estimation accuracy of target range and angle.Precisely,the eigen-projection matrix processing(EMP)algorithm is adopted to suppress the MLJ,and the target range is estimated effectively through the beamforming and pulse compression.Then the target angle can be effectively estimated by the atom-reconstruction method.Without any prior knowledge,the MLJ can be canceled,and the angle estimation accuracy is well preserved.Furthermore,the proposed method does not have strict requirement for radar array construction,and it can be applied for linear array and planar array.Moreover,the proposed method can effectively estimate the target azimuth and elevation simultaneously when the target azimuth(or elevation)equals to the jamming azimuth(or elevation),because the MLJ is suppressed in spatial plane dimension. 展开更多
关键词 mainlobe jamming ANTI-jamming atom-reconstruction RADAR
下载PDF
An angular blinking jamming method based on electronically controlled corner reflectors
3
作者 GAN Lin WU Zehao +1 位作者 WANG Xuesong LI Jianbing 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期330-338,共9页
Passive jamming is believed to have very good potential in countermeasure community.In this paper,a passive angular blinking jamming method based on electronically controlled corner reflectors is proposed.The amplitud... Passive jamming is believed to have very good potential in countermeasure community.In this paper,a passive angular blinking jamming method based on electronically controlled corner reflectors is proposed.The amplitude of the incident wave can be modulated by switching the corner reflector between the penetration state and the reflection state,and the ensemble of multiple corner reflectors with towing rope can result in complex angle decoying effects.Dependency of the decoying effect on corner reflectors’radar cross section and positions are analyzed and simulated.Results show that the angle measured by a monopulse radar can be significantly interfered by this method while the automatic tracking is employed. 展开更多
关键词 monopulse radar angular blinking jamming corner reflector amplitude-comparison angle measurement metasurface
下载PDF
Optimization of jamming formation of USV offboard active decoy clusters based on an improved PSO algorithm
4
作者 Zhaodong Wu Yasong Luo Shengliang Hu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期529-540,共12页
Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for t... Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for timing and deployment.To improve the response speed and jamming effect,a cluster of OADs based on an unmanned surface vehicle(USV)is proposed.The formation of the cluster determines the effectiveness of jamming.First,based on the mechanism of OAD jamming,critical conditions are identified,and a method for assessing the jamming effect is proposed.Then,for the optimization of the cluster formation,a mathematical model is built,and a multi-tribe adaptive particle swarm optimization algorithm based on mutation strategy and Metropolis criterion(3M-APSO)is designed.Finally,the formation optimization problem is solved and analyzed using the 3M-APSO algorithm under specific scenarios.The results show that the improved algorithm has a faster convergence rate and superior performance as compared to the standard Adaptive-PSO algorithm.Compared with a single OAD,the optimal formation of USV-OAD cluster effectively fills the blind area and maximizes the use of jamming resources. 展开更多
关键词 Electronic countermeasure Offboard active decoy USV cluster jamming formation optimization Improved PSO algorithm
下载PDF
Open World Recognition of Communication Jamming Signals 被引量:1
5
作者 Yan Tang Zhijin Zhao +4 位作者 Jie Chen Shilian Zheng Xueyi Ye Caiyi Lou Xiaoniu Yang 《China Communications》 SCIE CSCD 2023年第6期199-214,共16页
To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is proposed.The algorithm can recognize known jamming classes,detect new(unknown)jamming c... To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is proposed.The algorithm can recognize known jamming classes,detect new(unknown)jamming classes,and unsupervised cluseter new classes.The network of SNN-OWR is trained supervised with paired input data consisting of two samples from a known dataset.On the one hand,the network is required to have the ability to distinguish whether two samples are from the same class.On the other hand,the latent distribution of known class is forced to approach their own unique Gaussian distribution,which is prepared for the subsequent open set testing.During the test,the unknown class detection process based on Gaussian probability density function threshold is designed,and an unsupervised clustering algorithm of the unknown jamming is realized by using the prior knowledge of known classes.The simulation results show that when the jamming-to-noise ratio is more than 0d B,the accuracy of SNN-OWR algorithm for known jamming classes recognition,unknown jamming detection and unsupervised clustering of unknown jamming is about 95%.This indicates that the SNN-OWR algorithm can make the effect of the recognition of unknown jamming be almost the same as that of known jamming. 展开更多
关键词 communication jamming signals Siamese Neural Network Open World Recognition unsupervised clustering of new jamming type Gaussian probability density function
下载PDF
Jamming-Aided Secure Communication in Ultra-Dense LEO Integrated Satellite-Terrestrial Networks 被引量:1
6
作者 Yongpeng Shi Jiajia Liu +1 位作者 Jiadai Wang Yijie Xun 《China Communications》 SCIE CSCD 2023年第7期43-56,共14页
The ultra-dense low earth orbit(LEO)integrated satellite-terrestrial networks(UDLEO-ISTN)can bring lots of benefits in terms of wide coverage,high capacity,and strong robustness.Meanwhile,the broadcasting and open nat... The ultra-dense low earth orbit(LEO)integrated satellite-terrestrial networks(UDLEO-ISTN)can bring lots of benefits in terms of wide coverage,high capacity,and strong robustness.Meanwhile,the broadcasting and open natures of satellite links also reveal many challenges for transmission security protection,especially for eavesdropping defence.How to efficiently take advantage of the LEO satellite’s density and ensure the secure communication by leveraging physical layer security with the cooperation of jammers deserves further investigation.To our knowledge,using satellites as jammers in UDLEO-ISTN is still a new problem since existing works mainly focused on this issue only from the aspect of terrestrial networks.To this end,we study in this paper the cooperative secrecy communication problem in UDLEOISTN by utilizing several satellites to send jamming signal to the eavesdroppers.An iterative scheme is proposed as our solution to maximize the system secrecy energy efficiency(SEE)via jointly optimizing transmit power allocation and user association.Extensive experiment results verify that our designed optimization scheme can significantly enhance the system SEE and achieve the optimal power allocation and user association strategies. 展开更多
关键词 ultra-dense LEO satellite integrated satellite-terrestrial network physical layer security cooperative jamming
下载PDF
Towards reinforcement learning in UAV relay for anti-jamming maritime communications
7
作者 Chuhuan Liu Yi Zhang +3 位作者 Guohang Niu Luliang Jia Liang Xiao Jiangxia Luan 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1477-1485,共9页
Maritime communications with sea surface reflections and sea wave occlusions are susceptible to jamming attacks due to the wide geographical area and intensive wireless communication services.Unmanned Aerial Vehicles(... Maritime communications with sea surface reflections and sea wave occlusions are susceptible to jamming attacks due to the wide geographical area and intensive wireless communication services.Unmanned Aerial Vehicles(UAVs)help relay messages to improve communication performance,but the relay policy that depends on the rapidly changing maritime environments is difficult to optimize.In this paper,a reinforcement learning-based UAV relay policy for maritime communications is proposed to resist jamming attacks.Based on previous transmission performance,the relay location,the received power of the transmitted signal and the received jamming power,this scheme optimizes the UAV trajectory and relay power to save the energy consumption and decrease the Bit-Error-Rate(BER)of the maritime signals.A deep reinforcement learning-based scheme is also proposed,which designs a deep neural network with dueling architecture to further improve the communication performance and computational complexity.The performance bounds regarding the signal to interference plus noise ratio,energy consumption and the communication utility are provided based on the Nash equilibrium of the game against jamming,and the computational complexity of the proposed schemes is analyzed.Simulation results show that the proposed schemes improve the energy efficiency and decrease the BER compared with the benchmark. 展开更多
关键词 Maritime communications jamming Unmanned aerial vehicle RELAY Reinforcement learning
下载PDF
Numerical Analyses of Ice Jamming in Jacket Platform Conductor Array in Bohai Sea
8
作者 ZHAI Bi-yao YANG Fan +1 位作者 PAN Jun-ning XIE Dong-mei 《China Ocean Engineering》 SCIE EI CSCD 2023年第6期885-896,共12页
Serious ice accumulating,pile-up and ice jamming occur around the conductor array of offshore jacket platforms during the winter every year in Bohai Sea,which could cause grave threats to the stability of platform str... Serious ice accumulating,pile-up and ice jamming occur around the conductor array of offshore jacket platforms during the winter every year in Bohai Sea,which could cause grave threats to the stability of platform structure,the safety of people and equipment,and even severer calamity.Therefore,the process of ice accumulation and ice jamming in the jacket platform area needs more concern.This study focuses on ice accumulation and jamming behaviors in the jacket platform conductor area by using a coupled two-dimensional hydro-ice dynamics model.A series of cases are conducted with different flow conditions,such as flow velocity,drifting direction and oscillatory flow.Through the simulation,the ice pile-up process is described and changes in ice-jamming thickness,ice pile-up location and ice pile-up volume are investigated.The differences in ice pile-up in the steady flow and oscillatory flow are analyzed.This study proposes a new approach to simulate the ice jamming process in the jacket platform conductor area,providing a reference for ice management on the platform. 展开更多
关键词 sea ice ice jamming conductor array numerical modeling hydro-ice dynamics
下载PDF
Received Power Based Unmanned Aerial Vehicles (UAVs) Jamming Detection and Nodes Classification Using Machine Learning
9
作者 Waleed Aldosari 《Computers, Materials & Continua》 SCIE EI 2023年第4期1253-1269,共17页
This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks onWireless Sensor Networks(WSNs).Jamming is a type of Denial of Service(DoS)attack and intentional ... This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks onWireless Sensor Networks(WSNs).Jamming is a type of Denial of Service(DoS)attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly.To defend and prevent such attacks,the first step is to detect them.The current detection approaches use centralized techniques to detect jamming,where each node collects information and forwards it to the base station.As a result,overhead and communication costs increased.In this work,we present a jamming attack and classify nodes into different categories based on their location to the jammer by employing a single node observer.As a result,we introduced a machine learning model that uses distance ratios and power received as features to detect such attacks.Furthermore,we considered several types of jammers transmitting at different power levels to evaluate the proposed metrics using MATLAB.With a detection accuracy of 99.7%for the k-nearest neighbors(KNN)algorithm and average testing accuracy of 99.9%,the presented solution is capable of efficiently and accurately detecting jamming attacks in wireless sensor networks. 展开更多
关键词 jamming attacks machine learning unmanned aerial vehicle(UAV) WSNS
下载PDF
Joint target assignment and power allocation in the netted C-MIMO radar when tracking multi-targets in the presence of self-defense blanket jamming
10
作者 Zhengjie Li Junwei Xie +1 位作者 Haowei Zhang Jiahao Xie 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第6期414-427,共14页
The netted radar system(NRS)has been proved to possess unique advantages in anti-jamming and improving target tracking performance.Effective resource management can greatly ensure the combat capability of the NRS.In t... The netted radar system(NRS)has been proved to possess unique advantages in anti-jamming and improving target tracking performance.Effective resource management can greatly ensure the combat capability of the NRS.In this paper,based on the netted collocated multiple input multiple output(CMIMO)radar,an effective joint target assignment and power allocation(JTAPA)strategy for tracking multi-targets under self-defense blanket jamming is proposed.An architecture based on the distributed fusion is used in the radar network to estimate target state parameters.By deriving the predicted conditional Cramer-Rao lower bound(PC-CRLB)based on the obtained state estimation information,the objective function is formulated.To maximize the worst case tracking accuracy,the proposed JTAPA strategy implements an online target assignment and power allocation of all active nodes,subject to some resource constraints.Since the formulated JTAPA is non-convex,we propose an efficient two-step solution strategy.In terms of the simulation results,the proposed algorithm can effectively improve tracking performance in the worst case. 展开更多
关键词 Netted radar system MIMO Target assignment Power allocation Multi-targets tracking Self-defense blanket jamming
下载PDF
Cognitive J^(2)SAC:Joint Jamming,Sensing,and Communication Under Antagonistic Environment
11
作者 Jiangchun Gu Guoru Ding +3 位作者 Yizhen Yin Haichao Wang Yitao Xu Yehui Song 《China Communications》 SCIE CSCD 2023年第9期78-95,共18页
Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still fac... Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still faces the challenges of the information security and transmission robustness caused by the openness of wireless channel,especially under antagonistic environment.Hence,this article develops a generalized framework,named cognitive joint jamming,sensing and communication(cognitive J2SAC),to empower the current sensing/communication/jamming system with a“brain”for realizing precise sensing,reliable communication and effective jamming under antagonistic environment.Three kinds of gains can be captured by cognitive J2SAC,including integrated gain,cooperative gain and cognitive gain.Moreover,we highlight the enabling mechanism among jamming,sensing,and communication,as well as illustrating several typical use cases of cognitive J2SAC.Furthermore,several key enabled technologies are analyzed and a typical sensing enhance integrated communication and jamming case study is discussed to verify the effectiveness of the proposed method.Last but not the least,the future directions are listed before concluding this article.Integrated sensing and communication(ISAC)is regarded as a recent advanced technology,which is expected to realize the dual functions of sensing and communication simultaneously in one system.Nevertheless,it still faces the challenges of the information security and transmission robustness caused by the openness of wireless channel,especially under antagonistic environment.Hence,this article develops a generalized framework,named cognitive joint jamming,sensing and communication(cognitive J2SAC),to empower the current sensing/communication/jamming system with a“brain”for realizing precise sensing,reliable communication and effective jamming under antagonistic environment.Three kinds of gains can be captured by cognitive J2SAC,including integrated gain,cooperative gain and cognitive gain.Moreover,we highlight the enabling mechanism among jamming,sensing,and communication,as well as illustrating several typical use cases of cognitive J2SAC.Furthermore,several key enabled technologies are analyzed and a typical sensing enhance integrated communication and jamming case study is discussed to verify the effectiveness of the proposed method.Last but not the least,the future directions are listed before concluding this article. 展开更多
关键词 integrated sensing and communication(ISAC) information security joint jamming sensing and communication(J2SAC) cognition theory
下载PDF
无线传感器网络中基于几何覆盖的Jamming攻击定位算法 被引量:9
12
作者 孙言强 王晓东 周兴铭 《通信学报》 EI CSCD 北大核心 2010年第11期10-16,共7页
提出一种基于几何覆盖理论的Jamming攻击定位(GCL,geometry-covering based localization)算法。GCL算法利用计算几何中的凸壳理论,特别是最小包容圆方法,对Jamming攻击者进行定位。理论证明了该算法的正确性和较低的时间复杂度(O(nlogn... 提出一种基于几何覆盖理论的Jamming攻击定位(GCL,geometry-covering based localization)算法。GCL算法利用计算几何中的凸壳理论,特别是最小包容圆方法,对Jamming攻击者进行定位。理论证明了该算法的正确性和较低的时间复杂度(O(nlogn));模拟实验表明,该算法在攻击者攻击范围、网络节点密度以及攻击者位置等度量值变化的情况下,比已有算法具有更好的定位准确度。 展开更多
关键词 无线传感器网络 jamming攻击 定位 最小包容圆
下载PDF
Cross-eye gain distribution of multiple-element retrodirective cross-eye jamming 被引量:7
13
作者 YANG Degui LIANG Buge ZHAO Dangjun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第6期1170-1179,共10页
The total cross-eye gain of multiple-element retrodirective cross-eye jamming(MRCJ) in the presence of the platform skin return is a distribution rather than a constant value, due to the random variation in the phase ... The total cross-eye gain of multiple-element retrodirective cross-eye jamming(MRCJ) in the presence of the platform skin return is a distribution rather than a constant value, due to the random variation in the phase of the skin return. Although the median value of the total cross-eye gain distribution had been analyzed in previous studies, the extreme values providing useful indications of the upper and lower bounds of the total cross-eye gain have not been analyzed until now. In this paper, the cumulative distribution function and the extreme values of the total cross-eye gain of MRCJ are derived. The angular error induced in threat monopulse radar as a figure of merit is used to analyze the performance of MRCJ system. Simulation results demonstrate the variation of the angular error and discuss the proper value of jamming-to-signal ratio(JSR) making the MRCJ system more effective in consideration of the whole distribution of the total cross-eye gain. 展开更多
关键词 ELECTRONIC warfare(EW) ELECTRONIC countermeasures(ECM) cross-eye jamming MONOPULSE radar ANGULAR DECEPTION jamming.
下载PDF
Deceptive jamming suppression in multistatic radar based on coherent clustering 被引量:12
14
作者 ABDALLA Ahmed AHMED Mohaned Giess Shokrallah +2 位作者 ZHAO Yuan XIONG Ying TANG Bin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2018年第2期269-277,共9页
This paper proposes a suppression method of the deceptive false target(FT) produced by digital radio frequency memory(DRFM) in a multistatic radar system. The simulated deceptive false targets from DRFM cannot be easi... This paper proposes a suppression method of the deceptive false target(FT) produced by digital radio frequency memory(DRFM) in a multistatic radar system. The simulated deceptive false targets from DRFM cannot be easily discriminated and suppressed with traditional radar systems. Therefore, multistatic radar has attracted considerable interest as it provides improved performance against deception jamming due to several separated receivers. This paper first investigates the received signal model in the presence of multiple false targets in all receivers of the multistatic radar. Then, obtain the propagation time delays of the false targets based on the cross-correlation test of the received signals in different receivers. In doing so, local-density-based spatial clustering of applications with noise(LDBSCAN) is proposed to discriminate the FTs from the physical targets(PTs) after compensating the FTs time delays, where the FTs are approximately coincident with one position, while PTs possess small dispersion.Numerical simulations are carried out to demonstrate the feasibility and validness of the proposed method. 展开更多
关键词 multistatic RADAR CLUSTERING analysis electronic counter-countermeasure(ECCM) deceptive jamming.
下载PDF
A jamming method against bistatic SAR based on modulation theory 被引量:7
15
作者 RAN Jinhe LI Xiuhe SHEN Yang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2019年第3期504-510,共7页
This paper focuses on the jamming problem of bistatic synthetic aperture radar (BiSAR), and a jamming method against BiSAR based on modulation theory is proposed. The proposed jamming method modulates the BiSAR signal... This paper focuses on the jamming problem of bistatic synthetic aperture radar (BiSAR), and a jamming method against BiSAR based on modulation theory is proposed. The proposed jamming method modulates the BiSAR signal with the cosinusoidal phase to generate multi-false targets in range, and further rotates the jammer to generate multi-false targets in azimuth. The range multi-false targets and azimuth multi-false targets form the two-dimensional cover jamming or deception jamming, which can protect the important targets efficiently. The number of false targets, the interval of false targets, and the jamming square can be adjusted flexibly by setting different range jamming parameters and azimuth jamming parameters. The jamming performance and the choosing criteria of jamming parameters are also discussed. Finally, the simulated data verify the effectiveness of the jamming method. 展开更多
关键词 BISTATIC SYNTHETIC APERTURE radar (BiSAR) cosinusoidal phase COVER jamming MICRO-MOTION modulation
下载PDF
Examining the effect of adverse geological conditions on jamming of a single shielded TBM in Uluabat tunnel using numerical modeling 被引量:8
16
作者 Rohola Hasanpour Jürgen Schmitt +1 位作者 Yilmaz Ozcelik Jamal Rostami 《Journal of Rock Mechanics and Geotechnical Engineering》 SCIE CSCD 2017年第6期1112-1122,共11页
Severe shield jamming events have been reported during excavation of Uluabat tunnel through adverse geological conditions, which resulted in several stoppages at advancing a single shielded tunnel boring machine(TBM).... Severe shield jamming events have been reported during excavation of Uluabat tunnel through adverse geological conditions, which resulted in several stoppages at advancing a single shielded tunnel boring machine(TBM). To study the jamming mechanism, three-dimensional(3D) simulation of the machine and surrounding ground was implemented using the finite difference code FLAC3D. Numerical analyses were performed for three sections along the tunnel with a higher risk for entrapment due to the combination of overburden and geological conditions. The computational results including longitudinal displacement contours and ground pressure profiles around the shield allow a better understanding of ground behavior within the excavation. Furthermore, they allow realistically assessing the impact of adverse geological conditions on shield jamming. The calculated thrust forces, which are required to move the machine forward, are in good agreement with field observations and measurements. It also proves that the numerical analysis can effectively be used for evaluating the effect of adverse geological environment on TBM entrapments and can be applied to prediction of loads on the shield and preestimating of the required thrust force during excavation through adverse ground conditions. 展开更多
关键词 SINGLE shielded TUNNEL BORING machine(TBM) Numerical modeling Shield jamming SQUEEZING ground Uluabat TUNNEL
下载PDF
Tolerance analysis of multiple-element linear retrodirective cross-eye jamming 被引量:8
17
作者 LIU Tianpeng WEI Xizhang +3 位作者 PENG Bo LIU Zhen SUN Bin GUAN Zhiqiang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第3期460-469,共10页
Tolerance sensitivity limits the practical application of the cross-eye jammer.Previous literature has demonstrated that retrodirective cross-eye jamming with multiple antenna elements possesses the advantage of loose... Tolerance sensitivity limits the practical application of the cross-eye jammer.Previous literature has demonstrated that retrodirective cross-eye jamming with multiple antenna elements possesses the advantage of loose tolerance requirements compared to traditional cross-eye jamming.However,the previous analysis was limited,because there are still some factors affecting the parameter tolerance of the multiple-element retrodirective cross-eye jamming(MRCJ)system and they have not been investigated completely,such as the loop difference,the baseline ratio and the jammer-to-signal ratio.This paper performs a comprehensive tolerance analysis of the MRCJ system with a nonuniformspacing linear array.Simulation results demonstrate the tolerance effects of the above influence factors and give reasonable advice for easing tolerance sensitivity. 展开更多
关键词 electronic warfare(EW) electronic countermeasure(ECM) cross-eye jamming radar active jamming TOLERANCE
下载PDF
Cooperative Jamming for Physical Layer Security in Hybrid Satellite Terrestrial Relay Networks 被引量:7
18
作者 Su Yan Xinyi Wang +2 位作者 Zongling Li Bin Li Zesong Fei 《China Communications》 SCIE CSCD 2019年第12期154-164,共11页
To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTR... To integrate the satellite communications with the LTE/5G services, the concept of Hybrid Satellite Terrestrial Relay Networks(HSTRNs) has been proposed. In this paper, we investigate the secure transmission in a HSTRN where the eavesdropper can wiretap the transmitted messages from both the satellite and the intermediate relays. To effectively protect the message from wiretapping in these two phases, we consider cooperative jamming by the relays, where the jamming signals are optimized to maximize the secrecy rate under the total power constraint of relays. In the first phase, the Maximal Ratio Transmission(MRT) scheme is used to maximize the secrecy rate, while in the second phase, by interpolating between the sub-optimal MRT scheme and the null-space projection scheme, the optimal scheme can be obtained via an efficient one-dimensional searching method. Simulation results show that when the number of cooperative relays is small, the performance of the optimal scheme significantly outperforms that of MRT and null-space projection scheme. When the number of relays increases, the performance of the null-space projection approaches that of the optimal one. 展开更多
关键词 hybrid satellite terrestrial relay networks physical layer security cooperative jamming
下载PDF
Fuzzy Jamming Pattern Recognition Based on Statistic Parameters of Signal’s PSD 被引量:2
19
作者 牛英滔 姚富强 陈建忠 《Defence Technology(防务技术)》 SCIE EI CAS 2011年第1期15-23,共9页
In order to recognize the jamming pattern in anti-jamming, a novel fuzzy jamming recognition method based on statistic parameters of received signal’s power spectral density (PSD) is proposed. It exploits PSD’s shap... In order to recognize the jamming pattern in anti-jamming, a novel fuzzy jamming recognition method based on statistic parameters of received signal’s power spectral density (PSD) is proposed. It exploits PSD’s shape factor and skewness of received signal as classified characters of jamming pattern. After the mean center and variance of each jamming pattern are calculated by using some jamming samples, an exponential fuzzy membership function is used to calculate the membership value of the recognized sample. Finally, the jamming pattern of received signal is recognized by the maximum membership principle. The simulation results show that the proposed algorithm can recognize common eight jamming patterns accurately. 展开更多
关键词 communication technology shape factor SKEWNESS jamming pattern fuzzy recognition
下载PDF
Parameters Design of Pull-off Deceptive Jamming to Terminal Guidance Radar 被引量:3
20
作者 李云杰 张延彬 高梅国 《Journal of Beijing Institute of Technology》 EI CAS 2010年第3期362-366,共5页
A deceptive pull-off jamming method to terminal guidance radar is put forward in this paper.The design rules about the important jamming parameters are discussed in detail,including the number of the decoy targets in ... A deceptive pull-off jamming method to terminal guidance radar is put forward in this paper.The design rules about the important jamming parameters are discussed in detail,including the number of the decoy targets in range dimension,the velocity of the range gate pull-off,and the number of the decoy targets in velocity dimension and the velocity of the Doppler frequency pull-off.Also,the steps to design these parameters are brought out.The rules and design procedure discussed in this paper have important meaning for the choice of the reasonable jamming parameters in the practical applications,which can help to obtain good jamming effect. 展开更多
关键词 terminal guidance radar deceptive jamming range gate pull-off velocity Doppler frequency pulloff velocity
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部