Loading...
Welcome to Acta Armamentarii ! Today is

Table of Content

    01 January 2012, Volume 33 Issue 1
       Next Issue
    Paper
    Derivation and Analysis of Mainlobe to Sidelobe Ratio After Pulse Compression in Noise Continuous Wave Radar
    CHENG Yuan-bing, ZHANG Wei, GU Hong, SU Wei-min
    2012, 33(1):  1-6.  doi:10.3969/j.issn.1000-1093.2012.01.001
    Asbtract ( )   PDF (987KB) ( )  
    References | Related Articles | Metrics
    Referring to the problems of parameters selection, sidelobe suppression and Doppler tolerance expansion, the relationships among mainlobe to sidelobe ratio and the pulse compression length, Doppler frequency, signal to noise ratio of the echo and other parameters after the pulse compression in noise continuous wave radar are studied. The mathematical expressions of statistical mainlobe to mean square sidelobe ratio (SMMSSR) and statistical mainlobe to peak sidelobe ratio (SMPSR) are deduced by researching the statistical properties of the sidelobes which constitute a random fluctuant noise floor, respectively. The parameters influencing SMMSSR and SMPSR are analyzed. The correctness of the conclusion is verified by the computer simulation.
    LFM Interference Suppression in FRFT Domain Based on Hypothesis Testing
    FENG Ji-ning, DIAO Zhe-jun, YANG Xiao-bo, WU Si-liang
    2012, 33(1):  7-12.  doi:10.3969/j.issn.1000-1093.2012.01.002
    Asbtract ( )   PDF (977KB) ( )  
    References | Related Articles | Metrics
    Refering to the problem that it is difficult to set the exact threshold of LFM interference suppression in FRFT domain, the defect of fixed threshold algorithm and adaptive threshold algorithm is analyzed. Under the condition that only the direct sequence spread spectrum signal and additive Gaussian noise are present at the receiver, the amplitude of received signal after FRFT is assumed to be Rayleigh distributed. Based on the distribution characteristics, a novel LFM interference suppression algorithm based on hypothesis testing is proposed. The simulation results show the validity of the algorithm.
    Research on Electronic Equipment Damage Simulation in Explosion Impact Vibration Environment
    HU Qi-wei, WANG Guang-yan, SHI Quan, TIAN Xia
    2012, 33(1):  13-18.  doi:10.3969/j.issn.1000-1093.2012.01.003
    Asbtract ( )   PDF (1177KB) ( )  
    References | Related Articles | Metrics
    In order to resolve the problems of electronic equipment damage prediction and survivability assessment in the explosion vibration environment, the explosion vibration damage effects on electronic equipment were analyzed in details. And damage simulation models of electronic equipment were developed, including equipment structure and functional model oriented to the electronic equipment damage simulation, vibration damage effect model, equipment vibration damage model, and simulation procedure model. The experiment shows that the methodology of electronic equipment damage simulation is feasible and effective, and farther research on electronic equipment damage simulation in explosion vibration environment are brought forward through the experiment.
    Study on the Module of Network Thumb Printer Based on Network Covert Time Channel
    QIAN Yu-wen, SONG Hua-jü, KONG Jian-shou, ZHU Xiao-mei
    2012, 33(1):  19-25.  doi:10.3969/j.issn.1000-1093.2012.01.004
    Asbtract ( )   PDF (991KB) ( )  
    References | Related Articles | Metrics
    In order to solve the problem that the network thumb printer system based on covert time channel is instability and inefficient, a novel network thumb printer module based on network timing channel was proposed. In the module, physical information of the host worked as the thumb printer information and was sent to the server. The server picked up thumb printer to authenticate the host. For efficiency promoting, geometry code was introduced into this module. Moreover, the coding way of several network packet intervals and redundancy made the network thumb printer system stable, secure and robust. The simulation system was constructed according to the network thumb printer module. Simulation results show that a discern rate about 99% is obtained even when the system is attacked by network spoofs.
    Research on Multi-source Image Fusion Technology in Different Fields of View
    TIAN Si, ZHANG Jun-ju, YUAN Yi-hui, CHANG Ben-kang
    2012, 33(1):  26-31.  doi:10.3969/j.issn.1000-1093.2012.01.005
    Asbtract ( )   PDF (1931KB) ( )  
    References | Related Articles | Metrics
    In recent years, the image fusion technology already has become one of key technologies in some areas, such as computer vision, automatic control, robot, target identification and track. Its main research object is the registered multiple source image having the same field of view(FOV). There exist a lot of image systems with different features in different fields of view in real life. The multi-source image fusion technology for different fields of view can improve the performance of image acquisition system without investment increase in hardware. For the multi-image fusion technology of different FOV, in this paper, a registration method is proposed, which combines affine transformation and linear interpolation, the images before and after fusion are analyzed and compared in temporal and spatial domains and the results are evaluated to verify the feasibility of the method.
    Research of on Fire Adjustment Method Based on UV Image Fusion of Burst Point
    WANG Yang, HUANG Ke-ming, HU Jun
    2012, 33(1):  32-34.  doi:10.3969/j.issn.1000-1093.2012.01.006
    Asbtract ( )   PDF (1923KB) ( )  
    References | Related Articles | Metrics
    Aiming to the problems in fire adjustment, a fire adjustment method based on the fusing of UV and visible color images is proposed. The experiment results show that the method can be implemented simply and reliably, and its accuracy can meet the requirement of the artillery firing.
    A Method for Coherent Multi-target Localization in Bistatic MIMO Radar System
    WANG Wei, WANG Xian-peng, GAI Meng
    2012, 33(1):  35-40.  doi:10.3969/j.issn.1000-1093.2012.01.007
    Asbtract ( )   PDF (956KB) ( )  
    References | Related Articles | Metrics
    The Multiple-Input Multiple-Output (MIMO) radar was proposed in recent years. Using MIMO radar to detect the location of multi-target, a lot of algorithms are failure when the multi-target echo signals are coherent. Concerning this problem, a localization algorithm of coherent multi-target is presented in bistatic MIMO radar. The algorithm constructs virtual array for both the transmit and receiver array to de-correlate the coherent multi-target echo signals, and then the location of multi-target can be obtained. The estimated parameters are automatically paired without additional paring computation. The proposed method avoids the array aperture loss and the performance of angle estimation is improved. Theoretical analysis and simulation results verify the effectiveness of this method.
    Research on Optimum Scheduling for Radar Radiation Occasions with Emission Time Constraint
    WU Wei, WANG Guo-hong, LI Shi-zhong
    2012, 33(1):  41-47.  doi:10.3969/j.issn.1000-1093.2012.01.008
    Asbtract ( )   PDF (970KB) ( )  
    References | Related Articles | Metrics
    The optimum scheduling for radar radiation occasions with emission time constraint is concerned, the model of the radar radiation occasions optimum scheduling is established with optimizing objective function the trace of target statement estimation error covariance, the rule of optimum scheduling for radar radiation is drawn. Research results demonstrate, given the emission time constraint, the closer the radar radiation occasions to the end of the time segment is, the less the target statement estimation error is. A method of real-time radar radiation controlling is put forward based on the rule, using the prediction covariance threshold and the estimation covariance threshold to control the radar radiation on real time. The simulation results show that, the proposed method can control radar’s radiation to track targets smoothly, the radar radiation times is related to the prediction covariance threshold and the estimation covariance threshold, and radar radiation can be controlled by setting different parameter based on different tracking demand. These conclusions can be used for optimum scheduling for radar radiation to obtain high estimation accuracy.
    Experimental Investigation on Projectile Nose Eroding Effect of High-velocity Penetration into Concrete
    WU Hai-jun, HUANG Feng-lei, WANG Yi-nan, DUAN Zhuo-ping, PI Ai-guo
    2012, 33(1):  48-55.  doi:10.3969/j.issn.1000-1093.2012.01.009
    Asbtract ( )   PDF (5872KB) ( )  
    References | Related Articles | Metrics
    A sets of high-velocity projectile penetration experiments with limestone and quartz aggregate concrete targets were conducted, in which the projectiles were used with different structures, different materials. The technologies of high-velocity ballistic gun, projectile flight attitude observing, remaining projectile recovery were used. The results showed that an approximate linear relationship exists between the mass loss of projectile and its initial momentum, which has a relation with the projectile’s material strength. The erosion of the projectile nose become severer and the mass loss of the projectile is higher as the striking velocity increases and the strength of the projectile material becomes lower. The structure of the projectile occurs broken and the penetration depth decreases with the erosion of the projectile nose. Compared with the projectiles which penetration depth does not become lower, there is a serious projectile distortion and the length of the projectile gets shorter. The character of “deforming/eroding” is shown clearly. Compared with penetrating into limestone concrete, the projectile which penetrated into quartz aggregate concrete has severe erosion, and the variation of the nose contour is more obvious. At last, it is represented that the erosion of the projectile nose is caused by the cutting of the concrete aggregate.
    Consensus Analysis of High-order Multi-agent Network in Fixed and Dynamical Switching Topology
    YU Di, WU Qing-he, WANG Yin-qiu
    2012, 33(1):  56-62.  doi:10.3969/j.issn.1000-1093.2012.01.010
    Asbtract ( )   PDF (980KB) ( )  
    References | Related Articles | Metrics
    New results are put forward for consensus analysis of high-order multi-agent network from the perspective of algebraic theory, subject to the application problem of existing consensus analysis achievements of first-order directed network in high-order network. Under certain condition, the system matrix of directed network is Metzler with zero row sum by model transformation where the dynamics of agents is modeled as a high-order integrator. Thus the analysis results of first-order consensus algorithms are extended to high-order ones using algebraic theory, nonnegative matrix theory and control theory. The consensus conditions and consensus states are proposed for leaderless and leader-follower cases in fixed topology. Moreover, it is proved that the whole closed-loop network achieves consensus asymptotically if the union of directed graphs across finite switching intervals has a spanning tree in dynamic switching topology. Simulation examples and multi-vehicle formation control simulation validate the soundness of the theoretical results.
    Accelerated Life Modeling for Machine Gun Based on LS-SVM
    ZHANG Jun, SHAN Yong-hai, CAO Dian-guang, ZHENG Yu-xin, GE Xin-xin
    2012, 33(1):  63-68.  doi:10.3969/j.issn.1000-1093.2012.01.011
    Asbtract ( )   PDF (954KB) ( )  
    References | Related Articles | Metrics
    Product life can be assessed effectively in the short period of time by using accelerated life test. Aimed at problems resulted from poor predictive ability of the previous accelerated life model, a method to establish accelerated life model for machine guns based on LS-SVM was proposed. It took the machine gun’s shooting ammunition quantity before the life end as the life feature and selected the test ambient temperature, barrel’s maximum temperature, shooting interval, maximum pressure in bore as the accelerated stresses. A genetic algorithm was adopted to determine the optimal parameters of LS-SVM. The prediction results show that the model established in this paper are better than the general transformation and BP neural network models obviously, and the LS-SVM method are effective on accelerated life prediction for machine guns.
    Comprehensive Review
    Research on Situation and Development of Digital All-electrical Gun Control System of Tank
    MA Xiao-jun, YUAN Dong, ZANG Ke-mao, LI Chang-bing, YAN Zhi-feng
    2012, 33(1):  69-76.  doi:10.3969/j.issn.1000-1093.2012.01.012
    Asbtract ( )   PDF (1133KB) ( )  
    References | Related Articles | Metrics
    In order to improve the performance, reliability and informationalization level of gun control system, on the request of future high maneuvering operations, digital all-electrical gun control system becomes the important development direction in various countries. The concept, characteristic and structure of all-electrical gun control system of tank are introduced, and then the research on situation of all-electrical gun control system and its digitalization are discussed from the power system and control system point of view. On the basis of these, the development trend is analyzed. The results show that it is the key content to improve system performance and the intelligent degree to realize rapid and accurate tracking target in future research of gun control system. Finally, several technologies are researched to provide the theoretic and technologic reference for system analysis, design and modification up-grading, such as high-precision power transmission technology, soft-switching power converter technique, control strategy and intelligent control.
    Research Notes
    A Method of Extracting Radar Deception in Polarization Agile Radar
    CHEN Xin-wei, ZHAO Jian-zhong, WU Wen
    2012, 33(1):  77-82.  doi:10.3969/j.issn.1000-1093.2012.01.013
    Asbtract ( )   PDF (972KB) ( )  
    References | Related Articles | Metrics
    In order to simplify the separation of radar echo and deception and to get the Jones vector of deception, a simple and convenient method to extract radar deception is proposed. By transmitting a group of relative polarization agile signals, the scattered wave and deception can be separated during the calculation of the signal output by the receiver, while utilizing the polarization effect of the target and the constant polarization state of deception. Compared with existing interference feature extraction algorithms, resources can be saved when this algorithm is implemented in single chip. The simulation results show that the relative errors of the calculation are less than 10%, when INR is more than 11.8 dB.
    A New Hybrid Algorithm for Particle Filtering and Its Application to Radar Target Tracking
    CHEN Zhi-min, BO Yu-ming, WU Pan-long, CHEN Qin-xin
    2012, 33(1):  83-88.  doi:10.3969/j.issn.1000-1093.2012.01.014
    Asbtract ( )   PDF (972KB) ( )  
    References | Related Articles | Metrics
    Particle filter has the defects of low precision and weak robustness, it is not able to meet the requirement of radar target tracking . To solve these problems, a new particle filter algorithm based on Hybrid algorithm is proposed. It looked for satisfactory solution space with artificial fish swarm algorithm and made the particles move to the high likelihood region under the action of particle swarm optimization algorithm. By doing simulation under glint noise environment, the results show that this algorithm can jump local optimum to search the best value of particle, it improves the precision of radar target tracking under glint noise environment.
    Research on Optimized Electronic Warfare Embattling Countermining Radar Net
    CHEN Zhong-qi, YU Lei, LU Yi, ZHOU Zhong-liang
    2012, 33(1):  89-94.  doi:10.3969/j.issn.1000-1093.2012.01.015
    Asbtract ( )   PDF (971KB) ( )  
    References | Related Articles | Metrics
    In order to investigate how to embattle electronic warfare(EW) to get certain width of safe corridor, the safe corridor conception is put forward and its width is used as the jamming index of performance measurement. Firstly, the conception of radar detecting area in real terrain is given, and the solution to get safe corridor width using mathematical morphology is brought forward. Secondly, both the restriction of safe corridor and the safe of electronic jamming plane are taken into full consideration, the optimal EW embattling model is built, and the resolution using genetic algorithm is given as well. At last, a simulation example is offered. Whose results show that the way to get safe corridor width works perfectly and the optimal model is right.
    Study on Two-step Imaging Based on Azimuthal Dechirp in Space-borne Sliding Spotlight SAR
    DING Ze-gang, LIU Fei-feng, ZENG Tao
    2012, 33(1):  95-102.  doi:10.3969/j.issn.1000-1093.2012.01.016
    Asbtract ( )   PDF (2086KB) ( )  
    References | Related Articles | Metrics
    Based on dechirp processing, the two step imaging can effectively decrease the Doppler bandwidth of the echo in space borne sliding spotlight SAR. In order to overcome the alias of the echo, pulse repeation frequency (PRF) should be larger than the residual Doppler bandwidth of the dechirped azimuth signal, which is the fundamental of the two step imaging algorithm. Firstly, the formula of the residual Doppler band-width (RDB) of dechirped azimuth signal in the range frequency and azimuth time domains, which was related to the transmitted bandwidth, azimuth beam width and the azimuth rotation angle, was derived. Secondly, the influence of the window function of the dechirped azimuth signal in two dimensional time domains was analyzed by introducing range migration, and the derived RDB formula was analyzed and validated. Finally, the simulation results validate the analysis.
    High Accurate and Unambiguous 2D Direction Finding Estimation Based on Extended Aperture ESPRIT Algorithm
    GU Chen, HE Jin, LI Hong-tao, ZHU Xiao-hua
    2012, 33(1):  103-108.  doi:10.3969/j.issn.1000-1093.2012.01.017
    Asbtract ( )   PDF (950KB) ( )  
    References | Related Articles | Metrics
    A new high accurate azimuth and elevation angle estimation algorithm using ESPRIT algorithm is developed to avoid the ambiguous of extended aperture. Firstly the two-parallel-shape array geometry, which consists of sensors spaced much farther apart than a half-wavelength, is exploited to achieve array aperture extension, and the sensors are divided into 2 sub-arrays. The sub-array parallel with the x-axis is employed to extract low accurate but unambiguous y-axis direction cosines and high accurate but cyclically ambiguous x-axis direction cosines. Then, the sub-array parallel with the y-axis is employed to extract unambiguous x-axis direction cosines and cyclically ambiguous y-axis direction cosines. Finally, the low accurate unambiguous direction cosine estimates are used to resolve the cyclically ambiguous direction cosine estimates to obtain azimuth-elevation angle estimates. The proposed algorithm requires no 2D iterative searching, and thereby, offering high estimation precision with low computational complexity. Furthermore, a new pairing method based on the orthometric subspaces is proposed for the equivalent eigenvalues case. The simulation results indicate the performance of proposed algorithms.
    Study of Attack Graph Construction Based on Distributed Parallel Processing
    MA Jun-chun, SUN Ji-yin, WANG Yong-jun, ZHAO Bao-kang, CHEN Shan
    2012, 33(1):  109-115.  doi:10.3969/j.issn.1000-1093.2012.01.018
    Asbtract ( )   PDF (1053KB) ( )  
    References | Related Articles | Metrics
    In order to resolve the existed problems when analyzing large and complex network systems, a novel attack graph construction method is proposed which is based on distributed parallel processing technology. Firstly, from the defender's point of view, all the vulnerable hosts are considered as attack targets, using positive, breadth-first search strategy to construct attack graph, which resolves the problem of which the attack target is defined and single in the existed methods. Secondly, the optimization technology is researched, and the total network is divided into different areas, through multi-engine parallel processing technology, to meet the distribution scalability requirements, the problem of existed methods with high complexity and low scalability is resolved, and which is difficult for large-scale complex network. Finally, the optimization strategy, limited number of attack steps is used, which resolves the existing state explosion problem when constructing the attack graph. Experimental results show that this method can improve the efficiency of attack graph’s generation, and reduce the system resource consumption greatly, and it has value for assessing the security of large-scale complex network.
    Defect Profile Reconstruction from Magnetic Flux Leakage Signals Based on Bayesian Estimation
    YUAN Xi-chao, WANG Chang-long, WANG Jian-bin
    2012, 33(1):  116-120.  doi:10.3969/j.issn.1000-1093.2012.01.019
    Asbtract ( )   PDF (930KB) ( )  
    References | Related Articles | Metrics
    The reconstruction of magnetic flux leakage (MFL) defect profiles means the reconstruction of defect profiles and parameters from MFL inspection signals. It is the key for the inversion of MFL inspection signals. The studies of MFL inversion problem mainly based on neural network and optimization method. But these two methods have certain shortages. The precision of neural networks may be influenced by noises, and the optimization method is computational demanding. To overcome these shortages, a reconstruction approach for solving such inversion problems based on Bayesian estimation method is proposed. It formulates the inversion problem as a classical discrete-time tracking problem with state and measurement equations. State-space model of defect profile and MFL signals is established, the proposed method is adapted to reconstruct defect profile and the comparison between neural network and proposed method under different SNR. Results indicate that the proposed method has high accuracy and robustness against noise, and it is an effective and feasible approach for solving inverse problems.
    Study of Accurate Simulation for Electromagnetic Scattering from Vehicle Under Vegetation Screen
    ZHANG Pin, CHEN Yi-wang, JIN Xiu-hai
    2012, 33(1):  121-128.  doi:10.3969/j.issn.1000-1093.2012.01.020
    Asbtract ( )   PDF (1453KB) ( )  
    References | Related Articles | Metrics
    An accurate simulation model is proposed to investigate the electromagnetic scattering behavior of electrically large targets under a vegetation screen accurately. The proposed model is composed of two electromagnetic-scattering sub-models. One makes use of realistic tree structures for founding multilayer vegetation scattering model in frequency domain. The other founds target scattering model in time domain based on finite difference time domain method. The electromagnetic interaction between electrically large target and screen is avoided very efficiently by using a reciprocity theorem to connect the two sub-models. The proposed method is proved to be exact and valid by electromagnetic computation tests for a dihedral corner reflector and a electrically large vehicle.