scholarly journals A Novel Deceptive Jamming Approach for Hiding Actual Target and Generating False Targets

2021 ◽  
Vol 2021 ◽  
pp. 1-20
Author(s):  
Shahid Mehmood ◽  
Aqdas Naveed Malik ◽  
Ijaz Manssor Qureshi ◽  
Muhammad Zafar Ullah Khan ◽  
Fawad Zaman

Deceptive jamming is a popular electronic countermeasure (ECM) technique that generates false targets to confuse opponent surveillance radars. This work presents a novel approach for hiding the actual target while producing multiple false targets at the same time against frequency diverse array (FDA) radar. For this purpose, the modified FDA radar is assumed to be mounted on the actual aircraft. It intercepts the opponent’s radar signals and transmits back to place nulls in the radiation pattern at the desired range and direction to exploit FDA radar’s range-dependent pattern nulling capability. The proposed deceptive jammer produces delayed versions of the intercepted signals to create false targets with multiple ranges to confuse the opponent’s radar system. The novel mathematical model is proposed whose effectiveness is verified through several simulation results for different numbers of ranges, directions, and antenna elements.

2018 ◽  
Vol 173 ◽  
pp. 02034
Author(s):  
Gao Xiang Zou ◽  
Chuang Ming Tong ◽  
Qian Gao ◽  
Tong Wang ◽  
Peng Peng ◽  
...  

A novel electromagnetic scattering model is presented for studying coupling field of super-low altitude target under diverse terrestrial environments in semi-active radar system. The PO+MEC hybrid method is applied to obtain the electromagnetic scattering of target. The Physical Optics (PO) is introduced to calculate the scattering from facets of target. The Method of Equivalent Currents (MEC) is introduced to calculate the scattering from edges of target. Antenna radiation pattern of seeker is introduced to modify traditional Four Path Method (FPM) in semi-active radar system. Based on the modified FPM, the characteristics of coupling field from super-low altitude target under diverse terrestrial environments in semi-active radar system are studied. Simulation results can use for reference in the fields of remote sensing and detection for super-low altitude target.


2012 ◽  
Author(s):  
Mohammad Hamiruce Marhaban

Prestasi pengesanan radar maritim selalunya terbatas disebabkan gema laut atau serakan yang tidak diingini. Taburan-K adalah salah satu ketumpatan berekor panjang, di mana ia dikenali dalam komuniti pemprosesan isyarat untuk memadan dengan tepat serakan laut. Dalam kertas kerja ini, satu pendekatan novel untuk menganggar parameter taburan-K dibentangkan. Kaedah ini diterbitkan dari fungsi ciri empirik komponen quadrature. Hasil simulasi menunjukkan pembaikan yang ketara dari segi kecenderungan dan varians teranggar, berbanding dengan manamana kaedah bukan kemungkinan maksimum sedia ada. Kata kunci: Sistem radar, serakan laut, taburan–K, penganggaran parameter, fungsi ciri Detection performance of the maritime radars is often limited by the unwanted sea echo or clutter. K-distribution is one of the long-tailed densities which is known in the signal processing community for fitting the radar sea clutter accurately. In this paper, a novel approach for estimating the parameter of K-distribution is presented. The method is derived from the empirical characteristic function of the quadrature components. Simulation results show a great improvement in term of estimated bias and variance, compared with any existing non-maximum likelihood method. Key words: Radar system, sea clutter, K–distribution, parameter estimation, characteristic function


Author(s):  
Yang Zhao ◽  
Chaoxuan Shang ◽  
Zhuangzhi Han

Airborne passive electronic reconnaissance equipment has developed rapidly during recent years. However, because of its expensive and unavailable military features, the simulation realization of these equipment needs to be solved. And the smaller the simulation particle is, the better the simulation system will be. In this study, a signal-level airborne electronic reconnaissance simulation system was built. Mathematical model and simulation realization of each part are introduced in this study. Focusing on the shortness of traditional signal sorting methods, we creatively proposed a presorting method based on the Euclidean distance inside signal flows. Simulation results show that the presorting method based on Euclidean distance successfully reduced the pressure on main sorting and appeared good for signal sorting. Simulation test results of each model built in this study are also shown in the study. This study provides a new thought on the realization of airborne electronic reconnaissance equipment and benefits the development of electronic countermeasure.


2020 ◽  
Author(s):  
Elaine Gallagher ◽  
Bas Verplanken ◽  
Ian Walker

Social norms have been shown to be an effective behaviour change mechanism across diverse behaviours, demonstrated from classical studies to more recent behaviour change research. Much of this research has focused on environmentally impactful actions. Social norms are typically utilised for behaviour change in social contexts, which facilitates the important element of the behaviour being visible to the referent group. This ensures that behaviours can be learned through observation and that deviations from the acceptable behaviour can be easily sanctioned or approved by the referent group. There has been little focus on how effective social norms are in private or non-social contexts, despite a multitude of environmentally impactful behaviours occurring in the home, for example. The current study took the novel approach to explore if private behaviours are important in the context of normative influence, and if the lack of a referent groups results in inaccurate normative perceptions and misguided behaviours. Findings demonstrated variance in normative perceptions of private behaviours, and that these misperceptions may influence behaviour. These behaviours are deemed to be more environmentally harmful, and respondents are less comfortable with these behaviours being visible to others, than non-private behaviours. The research reveals the importance of focusing on private behaviours, which have been largely overlooked in the normative influence literature.


Author(s):  
Supriya Raheja

Background: The extension of CPU schedulers with fuzzy has been ascertained better because of its unique capability of handling imprecise information. Though, other generalized forms of fuzzy can be used which can further extend the performance of the scheduler. Objectives: This paper introduces a novel approach to design an intuitionistic fuzzy inference system for CPU scheduler. Methods: The proposed inference system is implemented with a priority scheduler. The proposed scheduler has the ability to dynamically handle the impreciseness of both priority and estimated execution time. It also makes the system adaptive based on the continuous feedback. The proposed scheduler is also capable enough to schedule the tasks according to dynamically generated priority. To demonstrate the performance of proposed scheduler, a simulation environment has been implemented and the performance of proposed scheduler is compared with the other three baseline schedulers (conventional priority scheduler, fuzzy based priority scheduler and vague based priority scheduler). Results: Proposed scheduler is also compared with the shortest job first CPU scheduler as it is known to be an optimized solution for the schedulers. Conclusion: Simulation results prove the effectiveness and efficiency of intuitionistic fuzzy based priority scheduler. Moreover, it provides optimised results as its results are comparable to the results of shortest job first.


2014 ◽  
Vol 945-949 ◽  
pp. 777-780
Author(s):  
Tao Liu ◽  
Yong Xu ◽  
Bo Yuan Mao

Firstly, according to the structure characteristics of precision centrifuge, the mathematical model of its dynamic balancing system was set up, and the dynamic balancing scheme of double test surfaces, double emendation surfaces were established. Then the dynamic balance system controller of precision centrifuge was designed. Simulation results show that the controller designed can completely meet the requirements of precision centrifuge dynamic balance control system.


Mathematics ◽  
2021 ◽  
Vol 9 (6) ◽  
pp. 608
Author(s):  
Danielle Burton ◽  
Suzanne Lenhart ◽  
Christina J. Edholm ◽  
Benjamin Levy ◽  
Michael L. Washington ◽  
...  

The 2014–2016 West African outbreak of Ebola Virus Disease (EVD) was the largest and most deadly to date. Contact tracing, following up those who may have been infected through contact with an infected individual to prevent secondary spread, plays a vital role in controlling such outbreaks. Our aim in this work was to mechanistically represent the contact tracing process to illustrate potential areas of improvement in managing contact tracing efforts. We also explored the role contact tracing played in eventually ending the outbreak. We present a system of ordinary differential equations to model contact tracing in Sierra Leonne during the outbreak. Using data on cumulative cases and deaths, we estimate most of the parameters in our model. We include the novel features of counting the total number of people being traced and tying this directly to the number of tracers doing this work. Our work highlights the importance of incorporating changing behavior into one’s model as needed when indicated by the data and reported trends. Our results show that a larger contact tracing program would have reduced the death toll of the outbreak. Counting the total number of people being traced and including changes in behavior in our model led to better understanding of disease management.


2021 ◽  
Vol 11 (2) ◽  
pp. 674
Author(s):  
Marianna Koctúrová ◽  
Jozef Juhár

With the ever-progressing development in the field of computational and analytical science the last decade has seen a big improvement in the accuracy of electroencephalography (EEG) technology. Studies try to examine possibilities to use high dimensional EEG data as a source for Brain to Computer Interface. Applications of EEG Brain to computer interface vary from emotion recognition, simple computer/device control, speech recognition up to Intelligent Prosthesis. Our research presented in this paper was focused on the study of the problematic speech activity detection using EEG data. The novel approach used in this research involved the use visual stimuli, such as reading and colour naming, and signals of speech activity detectable by EEG technology. Our proposed solution is based on a shallow Feed-Forward Artificial Neural Network with only 100 hidden neurons. Standard features such as signal energy, standard deviation, RMS, skewness, kurtosis were calculated from the original signal from 16 EEG electrodes. The novel approach in the field of Brain to computer interface applications was utilised to calculated additional set of features from the minimum phase signal. Our experimental results demonstrated F1 score of 86.80% and 83.69% speech detection accuracy based on the analysis of EEG signal from single subject and cross-subject models respectively. The importance of these results lies in the novel utilisation of the mobile device to record the nerve signals which can serve as the stepping stone for the transfer of Brain to computer interface technology from technology from a controlled environment to the real-life conditions.


Author(s):  
Lei Si ◽  
Zhongbin Wang ◽  
Xinhua Liu

In order to accurately and conveniently identify the shearer running status, a novel approach based on the integration of rough sets (RS) and improved wavelet neural network (WNN) was proposed. The decision table of RS was discretized through genetic algorithm and the attribution reduction was realized by MIBARK algorithm to simply the samples of WNN. Furthermore, an improved particle swarm optimization algorithm was proposed to optimize the parameters of WNN and the flowchart of proposed approach was designed. Then, a simulation example was provided and some comparisons with other methods were carried out. The simulation results indicated that the proposed approach was feasible and outperforming others. Finally, an industrial application example of mining automation production was demonstrated to verify the effect of proposed system.


Sign in / Sign up

Export Citation Format

Share Document