期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Synthetic damage effect assessment through evidential reasoning approach and neural fuzzy inference:Application in ship target 被引量:5
1
作者 tianle yao Run MIAO +4 位作者 Weili WANG Zhirong LI Jun DONG Yajuan GU Xuefei YAN 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2022年第8期143-157,共15页
The damage effect assessment of anti-ship missiles combines system science and weapon science,which can provide reference for the assessment of battlefield damage situation.In order to solve the difficulty of heteroge... The damage effect assessment of anti-ship missiles combines system science and weapon science,which can provide reference for the assessment of battlefield damage situation.In order to solve the difficulty of heterogeneous data aggregation and the difficulty in constructing the mapping between factors and damage effect,this paper analyzes the specific damage process of the anti-ship missile to the ship,and proposes a synthetic Evidential Reasoning(ER)–Adaptive Neural Fuzzy Inference System(ANFIS)to assess the damage effect.To solve the problem of fuzziness and uncertainty of criteria in the assessment process,the belief structure model is used to transform qualitative and quantitative information into a unified mathematical structure,and ER algorithm is used to fuse the information of lower-level criteria.In order to solve the problem of fuzziness and uncertainty of the information contained in the first-level variables,and the strong non-linear characteristics of the mapping between first-level variables and damage effect,the ANFIS with selfadaptation and self-learning is constructed.The map between the three first-level variables and damage effect is established,and the interaction process of the various factors in the damage effect assessment are clear.Sensitivity analysis shows that assessment model has good stability.The result analysis and comparative analysis show that the process proposed in this paper can effectively assess the damage effect of anti-ship missiles,and all criteria data are objective and comparable. 展开更多
关键词 ANFIS Belief structure model Damage effect assessment ER approach Ship target
原文传递
Warhead power assessment based on double hierarchy hesitant fuzzy linguistic term sets theory and gained and lost dominance score method 被引量:3
2
作者 tianle yao Weili WANG +3 位作者 Run MIAO Qiwei HU Jun DONG Xuefei YAN 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2022年第4期362-375,共14页
Warhead power assessment of the anti-ship missile plays a vital role in determining the optimal design of missile, thus having important strategic research significance. However, in the assessment process, expert’s j... Warhead power assessment of the anti-ship missile plays a vital role in determining the optimal design of missile, thus having important strategic research significance. However, in the assessment process, expert’s judgement will directly affect the assessment accuracy. In addition,there are many criteria involved in the missile design alternatives. Some criteria with poor performance may be compensated by other criteria with excellent performance, and then it is impossible to find the truly optimal alternative. Aimed at solving these problems, this paper proposes a synthetical assessment process based on fuzzy hesitant linguistic term set and the Gained and Lost Dominance Score(GLDS) method. In order to improve the assessment accuracy of experts and solve the problem that experts generate different opinions, combined with the advantages of fuzzy hesitant sets and linguistic term sets, the double hierarchy hesitant fuzzy linguistic term sets are used in this paper to improve the accuracy of expert’s judgement. In order to effectively combine expert’s experience with the data of criteria, the evidence theory and entropy weight method are used to transfer the expert’s judgement to the weight. In order to avoid selecting defective alternative of missile design, the GLDS is used to fuse expert information and criteria information. Sensitivity analysis shows that the assessment process has sensitivity to some extent. However, when the fluctuation of expert’s assessment makes the fluctuation of θ in the range of-5% to 5%, the impact on the results is not quite conspicuous. The analysis of calculation result and comparative analysis show that the assessment process proposed in this paper is accurate enough, has great advantage in selecting the current and potential optimal alternative of missile design, and avoids the alternatives with low criteria performance that cannot be compensated by other criteria being selected. 展开更多
关键词 Evidence theory Fuzzy hesitant linguistic term set Gained and lost dominance score method Optimal alternative of warhead design Warhead power assessment
原文传递
Operating system network security enhancement scheme based on trusted storage
3
作者 Longyun Qi Xiaoliang Lv +3 位作者 Lianwen Sun tianle yao Jianye Yu Lei Wang 《Intelligent and Converged Networks》 EI 2023年第2期127-141,共15页
Data storage security has become the core of many network security issues.In order to achieve trusted storage and trusted measurement of network community data,this paper proposes a secure storage model based on trust... Data storage security has become the core of many network security issues.In order to achieve trusted storage and trusted measurement of network community data,this paper proposes a secure storage model based on trust extension for existing trusted storage technologies.In the process of document encryption,the key information is encrypted as well as decentralized stored by optimizing the ciphertext inverted index structure and update policy to ensure the security of index information.In the process of user access control mechanism,SAML and XACML are used in combination with role-based access control in order to achieve flexible and efficient authorization and access control.In the process of result query,ontology technology is introduced to better express the user’s query intention and improve the query accuracy.A large number of experiments demonstrate the effectiveness and feasibility of the scheme. 展开更多
关键词 trusted storage trust extension trusted platform model(TPM) access control
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部