期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Multi-attribute decision making method for air target threat evaluation based on intuitionistic fuzzy sets 被引量:42
1
作者 Yongjie XU YongchunWang Xudong Miu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第6期891-897,共7页
The function of the air target threat evaluation (TE) is the foundation for weapons allocation and senor resources management within the surface air defense. The multi-attribute evaluation methodology is utilized to... The function of the air target threat evaluation (TE) is the foundation for weapons allocation and senor resources management within the surface air defense. The multi-attribute evaluation methodology is utilized to address the issue of the TE in which the tactic features of the detected target are treated as evaluation attributes. Meanwhile, the intuitionistic fuzzy set (IFS) is employed to deal with information uncertainty in the TE process. Furthermore, on the basis of the entropy weight and inclusion-comparison probability, a hybrid TE method is developed. In order to accommodate the demands of naturalistic decision making, the proposed method allows air defense commanders to express their intuitive opinions besides incorporating into the threat features of the detected target. An illustrative example is provided to indicate the feasibility and advantage of the proposed method. 展开更多
关键词 threat evaluation (TE) intuitionistic fuzzy set (IFS) multi-attribute evaluation intuitive opinions entropy weight inclusion-comparison probability (ICP).
下载PDF
Self-Compassion Moderates the Effect of Contingent Self-Esteem on Well-Being:Evidence from Cross-Sectional Survey and Experiment
2
作者 Ruirui Zhang Xuguang Zhang +1 位作者 Minxin Yang Haoran Zhang 《International Journal of Mental Health Promotion》 2024年第2期117-126,共10页
Contingent self-esteem captures the fragile nature of self-esteem and is often regarded as suboptimal to psychological functioning.Self-compassion is another important self-related concept assumed to promote mental he... Contingent self-esteem captures the fragile nature of self-esteem and is often regarded as suboptimal to psychological functioning.Self-compassion is another important self-related concept assumed to promote mental health and well-being.However,research on the relation of self-compassion to contingent self-esteem is lacking.Two studies were conducted to explore the role of selfcompassion,either as a personal characteristic or an induced mindset,in influencing the effects of contingent self-esteem on well-being.Study 1 recruited 256 Chinese college students(30.4%male,mean age=21.72 years)who filled out measures of contingent self-esteem,self-compassion,and well-being.The results found that self-compassion moderated the effect of contingent self-esteem on well-being.In Study 2,a sample of 90 Chinese college students(34%male,mean age=18.39 years)were randomly assigned to either a control or self-compassion group.They completed baseline trait measures of contingent self-esteem,self-compassion,and self-esteem.Then,they were led to have a 12-min break(control group)or listen to a 12-min self-compassion audio(self-compassion group),followed by a social stress task and outcome measures.The results demonstrated the effectiveness of the brief self-compassion training and its moderating role in influencing the effects of contingent self-esteem on negative affects after the social stress task.This research provides implications that to equip with a self-compassionate mindset could lower the risk of the impairment of well-being associated with elements of contingent selfesteem,which involves a fragile sense of self-worth.It may also provide insights into the development of an“optimal selfesteem”and the improvement of well-being. 展开更多
关键词 SELF-COMPASSION contingent self-esteem WELL-BEING social evaluative threat
下载PDF
Improving Performance of Virtual Machine Covert Timing Channel Through Optimized Run-Length Encoding
3
作者 王翀 陈荣亮 古亮 《Journal of Computer Science & Technology》 SCIE EI CSCD 2023年第4期793-806,共14页
With its wider acceptability,cloud can host a diverse set of data and applications ranging from entertainment to personal to industry.The foundation of cloud computing is based on virtual machines where boundaries amo... With its wider acceptability,cloud can host a diverse set of data and applications ranging from entertainment to personal to industry.The foundation of cloud computing is based on virtual machines where boundaries among the application data are very thin,and the potential of data leakage exists all the time.For instance,a virtual machine covert timing channel is an aggressive mechanism to leak confidential information through shared components or networks by violating isolation and security policies in practice.The performance of a covert timing channel(covert channel)is crucial to adversaries and attempts have been made to improve the performance of covert timing channels by advancing the encoding mechanism and covert information carriers.Though promising,the redundancy of the covert message is mainly overlooked.This paper applies three encoding schemes namely run-length,Huffman,and arithmetic encoding schemes for data compression of a virtual machine covert timing channel by exploiting redundancy.Accordingly,the paper studies the performance of such channels according to their capacity.Unfortunately,we show that these encoding schemes still contain redundancy in a covert channel scenario,and thereby a new encoding scheme namely optimized Runlength encoding(OptRLE)is presented that greatly enhances the performance of a covert timing channel.Several optimizations schemes adopted by OptRLE are also discussed,and a mathematical model of the behavior of an OptRLE-based covert timing channel is proposed.The theoretical capacity of a channel can be obtained using the proposed model.Our analysis reveals that OptRLE further improves the performance of a covert timing channel,in addition to the effects of the optimizations.Experimental result shows how OptRLE affects the size of covert data and the capacity of covert timing channels,and why the performance of the covert timing channel is improved. 展开更多
关键词 covert storage channel information security covert channel threat evaluation anti-detection criterion covert channel restriction
原文传递
A novel adaptive lateral reentry guidance algorithm with complex distributed no-fly zones constraints 被引量:4
4
作者 Yudong HU Changsheng GAO +2 位作者 Junlong LI Wuxing JING Wenxue CHEN 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2022年第7期128-143,共16页
Aimed at complex distributed no-fly zones avoidance problems,a novel adaptive lateral reentry guidance algorithm is proposed.Firstly,by introducing the improved attractive and repulsive potential fields,an improved ar... Aimed at complex distributed no-fly zones avoidance problems,a novel adaptive lateral reentry guidance algorithm is proposed.Firstly,by introducing the improved attractive and repulsive potential fields,an improved artificial potential field method is developed.Combined with the proposed judgment criterion for whether a no-fly zone has been avoided,the proposed improved artificial potential field method effectively solves the reference heading angle determination problem under the constraints of complex distributed no-fly zones.Then,based on the proposed no-fly zone’s threat quantitative evaluation method and the reference heading angle determined by the proposed improved artificial potential field method,the heading corridor is improved to increase its sensitivity to the threat changes of the no-fly zones.Finally,for satisfying the requirements of complex distributed no-fly zones avoidance,a novel guidance logic via improved heading corridor is proposed to update the reference heading corridor adaptively in real time according to the threat and constraint changes of the no-fly zones,and the bank reversal logic is employed to control the lateral motion.The simulation results for nominal and dispersed cases indicate that the proposed guidance algorithm has high robustness,stability,and applicability,and is feasible and effective to deal with the complex distributed no-fly zones avoidance problems. 展开更多
关键词 Guidance strategy Heading corridor Hypersonic vehicles Improved artificial potential field Lateral reentry guidance threat quantitative evaluation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部