In this paper,an integrated estimation guidance and control(IEGC)system is designed based on the command filtered backstepping approach for circular field-of-view(FOV)strapdown missiles.The threedimensional integrated...In this paper,an integrated estimation guidance and control(IEGC)system is designed based on the command filtered backstepping approach for circular field-of-view(FOV)strapdown missiles.The threedimensional integrated estimation guidance and control nonlinear model with limited actuator deflection angle is established considering the seeker's FOV constraint.The boundary time-varying integral barrier Lyapunov function(IBLF)is employed in backstepping design to constrain the body line-of-sight(BLOS)in IEGC system to fit a circular FOV.Then,the nonlinear adaptive controller is designed to estimate the changing aerodynamic parameters.The generalized extended state observer(GESO)is designed to estimate the acceleration of the maneuvering targets and the unmatched time-varying disturbances for improving tracking accuracy.Furthermore,the command filters are used to solve the"differential expansion"problem during the backstepping design.The Lyapunov theory is used to prove the stability of the overall closed-loop IEGC system.Finally,the simulation results validate the integrated system's effectiveness,achieving high accuracy strikes against maneuvering targets.展开更多
僵尸网络(Botnet)是一种从传统恶意代码形态进化而来的新型攻击方式,为攻击者提供了隐匿、灵活且高效的一对多命令与控制信道(Command and Control channel,C&C)机制,可以控制大量僵尸主机实现信息窃取、分布式拒绝服务攻击和垃圾...僵尸网络(Botnet)是一种从传统恶意代码形态进化而来的新型攻击方式,为攻击者提供了隐匿、灵活且高效的一对多命令与控制信道(Command and Control channel,C&C)机制,可以控制大量僵尸主机实现信息窃取、分布式拒绝服务攻击和垃圾邮件发送等攻击目的。该文提出一种与僵尸网络结构和C&C协议无关,不需要分析数据包的特征负载的僵尸网络检测方法。该方法首先使用预过滤规则对捕获的流量进行过滤,去掉与僵尸网络无关的流量;其次对过滤后的流量属性进行统计;接着使用基于X-means聚类的两步聚类算法对C&C信道的流量属性进行分析与聚类,从而达到对僵尸网络检测的目的。实验证明,该方法高效准确地把僵尸网络流量与其他正常网络流量区分,达到从实际网络中检测僵尸网络的要求,并且具有较低的误判率。展开更多
Adaptive optimization is one of the means that agile organization of command and control resource (AOC2R) adapts for the dynamic battlefield environment. A math model of the adaptive optimization of AOC2R is put for...Adaptive optimization is one of the means that agile organization of command and control resource (AOC2R) adapts for the dynamic battlefield environment. A math model of the adaptive optimization of AOC2R is put forward by analyzing the interrelating concept and research. The model takes the adaptive process as a multi-stage decision making problem. The 2-phases method is presented to calculate the model, which obtains the related parameters by running the colored Petri net (CPN) model of AOC2R and then searches for the result by ant colony optimization (ACO) algorithm integrated with genetic optimization techniques. The simulation results demonstrate that the proposed algorithm greatly improves the performance of AOC2R.展开更多
The global economic downturn caused primarily by the US sub-prime mortgage crisis in 2007 engendered revenue loss of the multinational corporations. Existing studies have yet to depict the detrimental impacts on city...The global economic downturn caused primarily by the US sub-prime mortgage crisis in 2007 engendered revenue loss of the multinational corporations. Existing studies have yet to depict the detrimental impacts on city's command and control functions induced by the sub-prime mortgage crisis together with its residual wave of global economic recession on the global spatial economy. Recent and previous studies have produced an 'instant history' of the global spatial economy before the global economic downturn undermines the global economy in late 2008. How- ever, the waxes and wanes of major cities' command and control functions on the global economic arena before and after the outbreak of financial crisis and its associated geo-economic transitions are still poorly understood. This paper attempts to contribute a new set of customized data to update and fill in the gap in the literature with the investigation of the command and control functions of cities arotmd the world from 2005 to 2009. Particular attentions are paid to the time-space relationship of the geo-economic transition that can capture the recent historical images of the com- mand and control situation of different cities in the world.展开更多
In this paper the geographical information system (GIS) is applied to earthquake and tsunami emergency work and an earthquake and tsunami emergency command system (ETECS) for seaside cities is developed which is c...In this paper the geographical information system (GIS) is applied to earthquake and tsunami emergency work and an earthquake and tsunami emergency command system (ETECS) for seaside cities is developed which is composed of a basic database and six subsystems. By employing this system, the responsible municipal departments can make rapid prediction before the occurrence of earthquake or tsunami, make commanding decisions concerning the disaster-fight during the disastrous event, and make rapid estimates of the casualties and economic losses. So that the government could conduct relief work in time and planning for future disaster reduction and prevention.展开更多
For improving the performance of differential geometric guidance command(DGGC), a new formation of this guidance law is proposed, which can guarantee the finite time convergence(FTC) of the line of sight(LOS) rate to ...For improving the performance of differential geometric guidance command(DGGC), a new formation of this guidance law is proposed, which can guarantee the finite time convergence(FTC) of the line of sight(LOS) rate to zero or its neighborhood against maneuvering targets in three-dimensional(3D) space. The extended state observer(ESO) is employed to estimate the target acceleration, which makes the new DGGC more applicable to practical interception scenarios. Finally, the effectiveness of this newly proposed guidance command is demonstrated by the numerical simulation results.展开更多
This paper investigates the heading tracking problem of surface vehicles with unknown model parameters.Based on finite/fixed-time control theories and in the context of command filtered control,two novel adaptive cont...This paper investigates the heading tracking problem of surface vehicles with unknown model parameters.Based on finite/fixed-time control theories and in the context of command filtered control,two novel adaptive control laws are developed by which the vehicle can track the desired heading within settling time with all signals of the closed-loop system are uniformly bounded.The effectiveness and performance of the schemes are demonstrated by simulations and comparison studies.展开更多
Accurate parameter identification is essential when designing controllers for inertially stabilized platforms (lSPs). But traditional identification methods suffer from observation measurement noise and operating re...Accurate parameter identification is essential when designing controllers for inertially stabilized platforms (lSPs). But traditional identification methods suffer from observation measurement noise and operating restrictions of ISPs. To address this issue, a novel identification method based on current command design and multilevel coordinate search (MCS) algorithm without any higher order measurement differentiations was proposed. The designed current commands were adopted to obtain parameter decoupled models with the platform operating under allowable conditions. MCS algorithm was employed to estimate the parameters based on parameter decoupled models. A comparison experiment between the proposed method and non-linear least square method was carried out and most of the relative errors of identified parameters obtained by the proposed method were below 10%. Simulation and experiment based on identified parameters were conducted. A velocity control structure was also developed with disturbance observer (DOB) for application in disturbance compensation control system of an ISR Experimental results show that the control scheme based on the identified parameters with DOB has the best disturbance rejection performance. It reduces the peak to peak value (PPV) of velocity error integral to 0.8 mrad which is much smaller than the value (10 mrad) obtained by the single velocity controller without DOB. Compared with the control scheme based on sweep model with DOB compensation, the proposed control scheme improves the PPV of velocity error integral by 1.625 times.展开更多
The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific sec...The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study utilizes applied pi calculus to forrmlize the commands and determine how their security properties affect TPM key rmnagement. The attacker is assumed to call TPM comrmnds without bounds and without knowing the TPM root key, expecting to obtain or replace the user key. The analysis goal in our study is to guarantee the corre- sponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which suc- cessfully replaces a user key with an attacker's key using lmlicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can hunch a keyhandle attack to obtain the user key and even break into the whole storage tree of user keys.展开更多
文摘In this paper,an integrated estimation guidance and control(IEGC)system is designed based on the command filtered backstepping approach for circular field-of-view(FOV)strapdown missiles.The threedimensional integrated estimation guidance and control nonlinear model with limited actuator deflection angle is established considering the seeker's FOV constraint.The boundary time-varying integral barrier Lyapunov function(IBLF)is employed in backstepping design to constrain the body line-of-sight(BLOS)in IEGC system to fit a circular FOV.Then,the nonlinear adaptive controller is designed to estimate the changing aerodynamic parameters.The generalized extended state observer(GESO)is designed to estimate the acceleration of the maneuvering targets and the unmatched time-varying disturbances for improving tracking accuracy.Furthermore,the command filters are used to solve the"differential expansion"problem during the backstepping design.The Lyapunov theory is used to prove the stability of the overall closed-loop IEGC system.Finally,the simulation results validate the integrated system's effectiveness,achieving high accuracy strikes against maneuvering targets.
文摘僵尸网络(Botnet)是一种从传统恶意代码形态进化而来的新型攻击方式,为攻击者提供了隐匿、灵活且高效的一对多命令与控制信道(Command and Control channel,C&C)机制,可以控制大量僵尸主机实现信息窃取、分布式拒绝服务攻击和垃圾邮件发送等攻击目的。该文提出一种与僵尸网络结构和C&C协议无关,不需要分析数据包的特征负载的僵尸网络检测方法。该方法首先使用预过滤规则对捕获的流量进行过滤,去掉与僵尸网络无关的流量;其次对过滤后的流量属性进行统计;接着使用基于X-means聚类的两步聚类算法对C&C信道的流量属性进行分析与聚类,从而达到对僵尸网络检测的目的。实验证明,该方法高效准确地把僵尸网络流量与其他正常网络流量区分,达到从实际网络中检测僵尸网络的要求,并且具有较低的误判率。
文摘Adaptive optimization is one of the means that agile organization of command and control resource (AOC2R) adapts for the dynamic battlefield environment. A math model of the adaptive optimization of AOC2R is put forward by analyzing the interrelating concept and research. The model takes the adaptive process as a multi-stage decision making problem. The 2-phases method is presented to calculate the model, which obtains the related parameters by running the colored Petri net (CPN) model of AOC2R and then searches for the result by ant colony optimization (ACO) algorithm integrated with genetic optimization techniques. The simulation results demonstrate that the proposed algorithm greatly improves the performance of AOC2R.
基金Foundation item:Under the auspices of Hui Oi Chow Trust Fund(No.200902172004)Mrs.Li Ka Shing Fund,Strategic Research Theme on Contemporary China,Small Project Funding provided by the University of Hong Kong(No.200807176152)
文摘The global economic downturn caused primarily by the US sub-prime mortgage crisis in 2007 engendered revenue loss of the multinational corporations. Existing studies have yet to depict the detrimental impacts on city's command and control functions induced by the sub-prime mortgage crisis together with its residual wave of global economic recession on the global spatial economy. Recent and previous studies have produced an 'instant history' of the global spatial economy before the global economic downturn undermines the global economy in late 2008. How- ever, the waxes and wanes of major cities' command and control functions on the global economic arena before and after the outbreak of financial crisis and its associated geo-economic transitions are still poorly understood. This paper attempts to contribute a new set of customized data to update and fill in the gap in the literature with the investigation of the command and control functions of cities arotmd the world from 2005 to 2009. Particular attentions are paid to the time-space relationship of the geo-economic transition that can capture the recent historical images of the com- mand and control situation of different cities in the world.
文摘In this paper the geographical information system (GIS) is applied to earthquake and tsunami emergency work and an earthquake and tsunami emergency command system (ETECS) for seaside cities is developed which is composed of a basic database and six subsystems. By employing this system, the responsible municipal departments can make rapid prediction before the occurrence of earthquake or tsunami, make commanding decisions concerning the disaster-fight during the disastrous event, and make rapid estimates of the casualties and economic losses. So that the government could conduct relief work in time and planning for future disaster reduction and prevention.
文摘For improving the performance of differential geometric guidance command(DGGC), a new formation of this guidance law is proposed, which can guarantee the finite time convergence(FTC) of the line of sight(LOS) rate to zero or its neighborhood against maneuvering targets in three-dimensional(3D) space. The extended state observer(ESO) is employed to estimate the target acceleration, which makes the new DGGC more applicable to practical interception scenarios. Finally, the effectiveness of this newly proposed guidance command is demonstrated by the numerical simulation results.
基金supported by the National Natural Science Foundation of China(U1808205)the Fundamental Research Funds for the Central Universities(N2023011)+1 种基金the Youth Foundation of Hebei Educational Committee(QN2020522)the Natural Science Foundation of Hebei Province(F2020501018)。
文摘This paper investigates the heading tracking problem of surface vehicles with unknown model parameters.Based on finite/fixed-time control theories and in the context of command filtered control,two novel adaptive control laws are developed by which the vehicle can track the desired heading within settling time with all signals of the closed-loop system are uniformly bounded.The effectiveness and performance of the schemes are demonstrated by simulations and comparison studies.
基金Project(50805144) supported by the National Natural Science Foundation of China
文摘Accurate parameter identification is essential when designing controllers for inertially stabilized platforms (lSPs). But traditional identification methods suffer from observation measurement noise and operating restrictions of ISPs. To address this issue, a novel identification method based on current command design and multilevel coordinate search (MCS) algorithm without any higher order measurement differentiations was proposed. The designed current commands were adopted to obtain parameter decoupled models with the platform operating under allowable conditions. MCS algorithm was employed to estimate the parameters based on parameter decoupled models. A comparison experiment between the proposed method and non-linear least square method was carried out and most of the relative errors of identified parameters obtained by the proposed method were below 10%. Simulation and experiment based on identified parameters were conducted. A velocity control structure was also developed with disturbance observer (DOB) for application in disturbance compensation control system of an ISR Experimental results show that the control scheme based on the identified parameters with DOB has the best disturbance rejection performance. It reduces the peak to peak value (PPV) of velocity error integral to 0.8 mrad which is much smaller than the value (10 mrad) obtained by the single velocity controller without DOB. Compared with the control scheme based on sweep model with DOB compensation, the proposed control scheme improves the PPV of velocity error integral by 1.625 times.
基金This paper was supported by the National Natural Science Foundation of China under Grants No.91118006, No. 61202414 the Knowledge Innovation Project of Chinese Academy of Science under Grant No. ISCAS2009-DR14.
文摘The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study utilizes applied pi calculus to forrmlize the commands and determine how their security properties affect TPM key rmnagement. The attacker is assumed to call TPM comrmnds without bounds and without knowing the TPM root key, expecting to obtain or replace the user key. The analysis goal in our study is to guarantee the corre- sponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which suc- cessfully replaces a user key with an attacker's key using lmlicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can hunch a keyhandle attack to obtain the user key and even break into the whole storage tree of user keys.