期刊文献+
共找到9,924篇文章
< 1 2 250 >
每页显示 20 50 100
A target parameter estimation method via atom-reconstruction in radar mainlobe jamming
1
作者 ZHOU Bilei LIU Weijian +5 位作者 LI Rongfeng CHEN Hui ZHANG Liang DU Qinglei LI Binbin CHEN Hao 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期350-360,共11页
Mainlobe jamming(MLJ)brings a big challenge for radar target detection,tracking,and identification.The suppression of MLJ is a hard task and an open problem in the electronic counter-counter measures(ECCM)field.Target... Mainlobe jamming(MLJ)brings a big challenge for radar target detection,tracking,and identification.The suppression of MLJ is a hard task and an open problem in the electronic counter-counter measures(ECCM)field.Target parameters and target direction estimation is difficult in radar MLJ.A target parameter estimation method via atom-reconstruction in radar MLJ is proposed in this paper.The proposed method can suppress the MLJ and simultaneously provide high estimation accuracy of target range and angle.Precisely,the eigen-projection matrix processing(EMP)algorithm is adopted to suppress the MLJ,and the target range is estimated effectively through the beamforming and pulse compression.Then the target angle can be effectively estimated by the atom-reconstruction method.Without any prior knowledge,the MLJ can be canceled,and the angle estimation accuracy is well preserved.Furthermore,the proposed method does not have strict requirement for radar array construction,and it can be applied for linear array and planar array.Moreover,the proposed method can effectively estimate the target azimuth and elevation simultaneously when the target azimuth(or elevation)equals to the jamming azimuth(or elevation),because the MLJ is suppressed in spatial plane dimension. 展开更多
关键词 mainlobe jamming ANTI-jamming atom-reconstruction RADAR
下载PDF
An angular blinking jamming method based on electronically controlled corner reflectors
2
作者 GAN Lin WU Zehao +1 位作者 WANG Xuesong LI Jianbing 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期330-338,共9页
Passive jamming is believed to have very good potential in countermeasure community.In this paper,a passive angular blinking jamming method based on electronically controlled corner reflectors is proposed.The amplitud... Passive jamming is believed to have very good potential in countermeasure community.In this paper,a passive angular blinking jamming method based on electronically controlled corner reflectors is proposed.The amplitude of the incident wave can be modulated by switching the corner reflector between the penetration state and the reflection state,and the ensemble of multiple corner reflectors with towing rope can result in complex angle decoying effects.Dependency of the decoying effect on corner reflectors’radar cross section and positions are analyzed and simulated.Results show that the angle measured by a monopulse radar can be significantly interfered by this method while the automatic tracking is employed. 展开更多
关键词 monopulse radar angular blinking jamming corner reflector amplitude-comparison angle measurement metasurface
下载PDF
Rock mass quality prediction on tunnel faces with incomplete multi-source dataset via tree-augmented naive Bayesian network
3
作者 Hongwei Huang Chen Wu +3 位作者 Mingliang Zhou Jiayao Chen Tianze Han Le Zhang 《International Journal of Mining Science and Technology》 SCIE EI CAS CSCD 2024年第3期323-337,共15页
Rock mass quality serves as a vital index for predicting the stability and safety status of rock tunnel faces.In tunneling practice,the rock mass quality is often assessed via a combination of qualitative and quantita... Rock mass quality serves as a vital index for predicting the stability and safety status of rock tunnel faces.In tunneling practice,the rock mass quality is often assessed via a combination of qualitative and quantitative parameters.However,due to the harsh on-site construction conditions,it is rather difficult to obtain some of the evaluation parameters which are essential for the rock mass quality prediction.In this study,a novel improved Swin Transformer is proposed to detect,segment,and quantify rock mass characteristic parameters such as water leakage,fractures,weak interlayers.The site experiment results demonstrate that the improved Swin Transformer achieves optimal segmentation results and achieving accuracies of 92%,81%,and 86%for water leakage,fractures,and weak interlayers,respectively.A multisource rock tunnel face characteristic(RTFC)dataset includes 11 parameters for predicting rock mass quality is established.Considering the limitations in predictive performance of incomplete evaluation parameters exist in this dataset,a novel tree-augmented naive Bayesian network(BN)is proposed to address the challenge of the incomplete dataset and achieved a prediction accuracy of 88%.In comparison with other commonly used Machine Learning models the proposed BN-based approach proved an improved performance on predicting the rock mass quality with the incomplete dataset.By utilizing the established BN,a further sensitivity analysis is conducted to quantitatively evaluate the importance of the various parameters,results indicate that the rock strength and fractures parameter exert the most significant influence on rock mass quality. 展开更多
关键词 Rock mass quality Tunnel faces Incomplete multi-source dataset Improved Swin Transformer Bayesian networks
下载PDF
Optimization of jamming formation of USV offboard active decoy clusters based on an improved PSO algorithm
4
作者 Zhaodong Wu Yasong Luo Shengliang Hu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第2期529-540,共12页
Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for t... Offboard active decoys(OADs)can effectively jam monopulse radars.However,for missiles approaching from a particular direction and distance,the OAD should be placed at a specific location,posing high requirements for timing and deployment.To improve the response speed and jamming effect,a cluster of OADs based on an unmanned surface vehicle(USV)is proposed.The formation of the cluster determines the effectiveness of jamming.First,based on the mechanism of OAD jamming,critical conditions are identified,and a method for assessing the jamming effect is proposed.Then,for the optimization of the cluster formation,a mathematical model is built,and a multi-tribe adaptive particle swarm optimization algorithm based on mutation strategy and Metropolis criterion(3M-APSO)is designed.Finally,the formation optimization problem is solved and analyzed using the 3M-APSO algorithm under specific scenarios.The results show that the improved algorithm has a faster convergence rate and superior performance as compared to the standard Adaptive-PSO algorithm.Compared with a single OAD,the optimal formation of USV-OAD cluster effectively fills the blind area and maximizes the use of jamming resources. 展开更多
关键词 Electronic countermeasure Offboard active decoy USV cluster jamming formation optimization Improved PSO algorithm
下载PDF
A multi-source information fusion layer counting method for penetration fuze based on TCN-LSTM
5
作者 Yili Wang Changsheng Li Xiaofeng Wang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期463-474,共12页
When employing penetration ammunition to strike multi-story buildings,the detection methods using acceleration sensors suffer from signal aliasing,while magnetic detection methods are susceptible to interference from ... When employing penetration ammunition to strike multi-story buildings,the detection methods using acceleration sensors suffer from signal aliasing,while magnetic detection methods are susceptible to interference from ferromagnetic materials,thereby posing challenges in accurately determining the number of layers.To address this issue,this research proposes a layer counting method for penetration fuze that incorporates multi-source information fusion,utilizing both the temporal convolutional network(TCN)and the long short-term memory(LSTM)recurrent network.By leveraging the strengths of these two network structures,the method extracts temporal and high-dimensional features from the multi-source physical field during the penetration process,establishing a relationship between the multi-source physical field and the distance between the fuze and the target plate.A simulation model is developed to simulate the overload and magnetic field of a projectile penetrating multiple layers of target plates,capturing the multi-source physical field signals and their patterns during the penetration process.The analysis reveals that the proposed multi-source fusion layer counting method reduces errors by 60% and 50% compared to single overload layer counting and single magnetic anomaly signal layer counting,respectively.The model's predictive performance is evaluated under various operating conditions,including different ratios of added noise to random sample positions,penetration speeds,and spacing between target plates.The maximum errors in fuze penetration time predicted by the three modes are 0.08 ms,0.12 ms,and 0.16 ms,respectively,confirming the robustness of the proposed model.Moreover,the model's predictions indicate that the fitting degree for large interlayer spacings is superior to that for small interlayer spacings due to the influence of stress waves. 展开更多
关键词 Penetration fuze Temporal convolutional network(TCN) Long short-term memory(LSTM) Layer counting multi-source fusion
下载PDF
Multi-source heterogeneous data access management framework and key technologies for electric power Internet of Things
6
作者 Pengtian Guo Kai Xiao +1 位作者 Xiaohui Wang Daoxing Li 《Global Energy Interconnection》 EI CSCD 2024年第1期94-105,共12页
The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall... The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT. 展开更多
关键词 Power Internet of Things Object model High concurrency access Zero trust mechanism multi-source heterogeneous data
下载PDF
Runout prediction of potential landslides based on the multi-source data collaboration analysis on historical cases
7
作者 Jun Sun Yu Zhuang Ai-guo Xing 《China Geology》 CAS CSCD 2024年第2期264-276,共13页
Long runout landslides involve a massive amount of energy and can be extremely hazardous owing to their long movement distance,high mobility and strong destructive power.Numerical methods have been widely used to pred... Long runout landslides involve a massive amount of energy and can be extremely hazardous owing to their long movement distance,high mobility and strong destructive power.Numerical methods have been widely used to predict the landslide runout but a fundamental problem remained is how to determine the reliable numerical parameters.This study proposes a framework to predict the runout of potential landslides through multi-source data collaboration and numerical analysis of historical landslide events.Specifically,for the historical landslide cases,the landslide-induced seismic signal,geophysical surveys,and possible in-situ drone/phone videos(multi-source data collaboration)can validate the numerical results in terms of landslide dynamics and deposit features and help calibrate the numerical(rheological)parameters.Subsequently,the calibrated numerical parameters can be used to numerically predict the runout of potential landslides in the region with a similar geological setting to the recorded events.Application of the runout prediction approach to the 2020 Jiashanying landslide in Guizhou,China gives reasonable results in comparison to the field observations.The numerical parameters are determined from the multi-source data collaboration analysis of a historical case in the region(2019 Shuicheng landslide).The proposed framework for landslide runout prediction can be of great utility for landslide risk assessment and disaster reduction in mountainous regions worldwide. 展开更多
关键词 Landslide runout prediction Drone survey multi-source data collaboration DAN3D numerical modeling Jianshanying landslide Guizhou Province Geological hazards survey engineering
下载PDF
Open World Recognition of Communication Jamming Signals 被引量:2
8
作者 Yan Tang Zhijin Zhao +4 位作者 Jie Chen Shilian Zheng Xueyi Ye Caiyi Lou Xiaoniu Yang 《China Communications》 SCIE CSCD 2023年第6期199-214,共16页
To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is proposed.The algorithm can recognize known jamming classes,detect new(unknown)jamming c... To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is proposed.The algorithm can recognize known jamming classes,detect new(unknown)jamming classes,and unsupervised cluseter new classes.The network of SNN-OWR is trained supervised with paired input data consisting of two samples from a known dataset.On the one hand,the network is required to have the ability to distinguish whether two samples are from the same class.On the other hand,the latent distribution of known class is forced to approach their own unique Gaussian distribution,which is prepared for the subsequent open set testing.During the test,the unknown class detection process based on Gaussian probability density function threshold is designed,and an unsupervised clustering algorithm of the unknown jamming is realized by using the prior knowledge of known classes.The simulation results show that when the jamming-to-noise ratio is more than 0d B,the accuracy of SNN-OWR algorithm for known jamming classes recognition,unknown jamming detection and unsupervised clustering of unknown jamming is about 95%.This indicates that the SNN-OWR algorithm can make the effect of the recognition of unknown jamming be almost the same as that of known jamming. 展开更多
关键词 communication jamming signals Siamese Neural Network Open World Recognition unsupervised clustering of new jamming type Gaussian probability density function
下载PDF
Multi-source Data-driven Identification of Urban Functional Areas:A Case of Shenyang,China 被引量:3
9
作者 XUE Bing XIAO Xiao +2 位作者 LI Jingzhong ZHAO Bingyu FU Bo 《Chinese Geographical Science》 SCIE CSCD 2023年第1期21-35,共15页
Urban functional area(UFA)is a core scientific issue affecting urban sustainability.The current knowledge gap is mainly reflected in the lack of multi-scale quantitative interpretation methods from the perspective of ... Urban functional area(UFA)is a core scientific issue affecting urban sustainability.The current knowledge gap is mainly reflected in the lack of multi-scale quantitative interpretation methods from the perspective of human-land interaction.In this paper,based on multi-source big data include 250 m×250 m resolution cell phone data,1.81×105 Points of Interest(POI)data and administrative boundary data,we built a UFA identification method and demonstrated empirically in Shenyang City,China.We argue that the method we built can effectively identify multi-scale multi-type UFAs based on human activity and further reveal the spatial correlation between urban facilities and human activity.The empirical study suggests that the employment functional zones in Shenyang City are more concentrated in central cities than other single functional zones.There are more mix functional areas in the central city areas,while the planned industrial new cities need to develop comprehensive functions in Shenyang.UFAs have scale effects and human-land interaction patterns.We suggest that city decision makers should apply multi-sources big data to measure urban functional service in a more refined manner from a supply-demand perspective. 展开更多
关键词 human-land relationship multi-source big data urban functional area identification method Shenyang City
下载PDF
Multi-Source Data Privacy Protection Method Based on Homomorphic Encryption and Blockchain 被引量:2
10
作者 Ze Xu Sanxing Cao 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期861-881,共21页
Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemin... Multi-Source data plays an important role in the evolution of media convergence.Its fusion processing enables the further mining of data and utilization of data value and broadens the path for the sharing and dissemination of media data.However,it also faces serious problems in terms of protecting user and data privacy.Many privacy protectionmethods have been proposed to solve the problemof privacy leakage during the process of data sharing,but they suffer fromtwo flaws:1)the lack of algorithmic frameworks for specific scenarios such as dynamic datasets in the media domain;2)the inability to solve the problem of the high computational complexity of ciphertext in multi-source data privacy protection,resulting in long encryption and decryption times.In this paper,we propose a multi-source data privacy protection method based on homomorphic encryption and blockchain technology,which solves the privacy protection problem ofmulti-source heterogeneous data in the dissemination ofmedia and reduces ciphertext processing time.We deployed the proposedmethod on theHyperledger platformfor testing and compared it with the privacy protection schemes based on k-anonymity and differential privacy.The experimental results showthat the key generation,encryption,and decryption times of the proposedmethod are lower than those in data privacy protection methods based on k-anonymity technology and differential privacy technology.This significantly reduces the processing time ofmulti-source data,which gives it potential for use in many applications. 展开更多
关键词 Homomorphic encryption blockchain technology multi-source data data privacy protection privacy data processing
下载PDF
Jamming-Aided Secure Communication in Ultra-Dense LEO Integrated Satellite-Terrestrial Networks 被引量:2
11
作者 Yongpeng Shi Jiajia Liu +1 位作者 Jiadai Wang Yijie Xun 《China Communications》 SCIE CSCD 2023年第7期43-56,共14页
The ultra-dense low earth orbit(LEO)integrated satellite-terrestrial networks(UDLEO-ISTN)can bring lots of benefits in terms of wide coverage,high capacity,and strong robustness.Meanwhile,the broadcasting and open nat... The ultra-dense low earth orbit(LEO)integrated satellite-terrestrial networks(UDLEO-ISTN)can bring lots of benefits in terms of wide coverage,high capacity,and strong robustness.Meanwhile,the broadcasting and open natures of satellite links also reveal many challenges for transmission security protection,especially for eavesdropping defence.How to efficiently take advantage of the LEO satellite’s density and ensure the secure communication by leveraging physical layer security with the cooperation of jammers deserves further investigation.To our knowledge,using satellites as jammers in UDLEO-ISTN is still a new problem since existing works mainly focused on this issue only from the aspect of terrestrial networks.To this end,we study in this paper the cooperative secrecy communication problem in UDLEOISTN by utilizing several satellites to send jamming signal to the eavesdroppers.An iterative scheme is proposed as our solution to maximize the system secrecy energy efficiency(SEE)via jointly optimizing transmit power allocation and user association.Extensive experiment results verify that our designed optimization scheme can significantly enhance the system SEE and achieve the optimal power allocation and user association strategies. 展开更多
关键词 ultra-dense LEO satellite integrated satellite-terrestrial network physical layer security cooperative jamming
下载PDF
Recent trends of machine learning applied to multi-source data of medicinal plants
12
作者 Yanying Zhang Yuanzhong Wang 《Journal of Pharmaceutical Analysis》 SCIE CAS CSCD 2023年第12期1388-1407,共20页
In traditional medicine and ethnomedicine,medicinal plants have long been recognized as the basis for materials in therapeutic applications worldwide.In particular,the remarkable curative effect of traditional Chinese... In traditional medicine and ethnomedicine,medicinal plants have long been recognized as the basis for materials in therapeutic applications worldwide.In particular,the remarkable curative effect of traditional Chinese medicine during corona virus disease 2019(COVID-19)pandemic has attracted extensive attention globally.Medicinal plants have,therefore,become increasingly popular among the public.However,with increasing demand for and profit with medicinal plants,commercial fraudulent events such as adulteration or counterfeits sometimes occur,which poses a serious threat to the clinical outcomes and interests of consumers.With rapid advances in artificial intelligence,machine learning can be used to mine information on various medicinal plants to establish an ideal resource database.We herein present a review that mainly introduces common machine learning algorithms and discusses their application in multi-source data analysis of medicinal plants.The combination of machine learning algorithms and multi-source data analysis facilitates a comprehensive analysis and aids in the effective evaluation of the quality of medicinal plants.The findings of this review provide new possibilities for promoting the development and utilization of medicinal plants. 展开更多
关键词 Machine learning Medicinal plant multi-source data Data fusion Application
下载PDF
Towards reinforcement learning in UAV relay for anti-jamming maritime communications
13
作者 Chuhuan Liu Yi Zhang +3 位作者 Guohang Niu Luliang Jia Liang Xiao Jiangxia Luan 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1477-1485,共9页
Maritime communications with sea surface reflections and sea wave occlusions are susceptible to jamming attacks due to the wide geographical area and intensive wireless communication services.Unmanned Aerial Vehicles(... Maritime communications with sea surface reflections and sea wave occlusions are susceptible to jamming attacks due to the wide geographical area and intensive wireless communication services.Unmanned Aerial Vehicles(UAVs)help relay messages to improve communication performance,but the relay policy that depends on the rapidly changing maritime environments is difficult to optimize.In this paper,a reinforcement learning-based UAV relay policy for maritime communications is proposed to resist jamming attacks.Based on previous transmission performance,the relay location,the received power of the transmitted signal and the received jamming power,this scheme optimizes the UAV trajectory and relay power to save the energy consumption and decrease the Bit-Error-Rate(BER)of the maritime signals.A deep reinforcement learning-based scheme is also proposed,which designs a deep neural network with dueling architecture to further improve the communication performance and computational complexity.The performance bounds regarding the signal to interference plus noise ratio,energy consumption and the communication utility are provided based on the Nash equilibrium of the game against jamming,and the computational complexity of the proposed schemes is analyzed.Simulation results show that the proposed schemes improve the energy efficiency and decrease the BER compared with the benchmark. 展开更多
关键词 Maritime communications jamming Unmanned aerial vehicle RELAY Reinforcement learning
下载PDF
Numerical Analyses of Ice Jamming in Jacket Platform Conductor Array in Bohai Sea
14
作者 ZHAI Bi-yao YANG Fan +1 位作者 PAN Jun-ning XIE Dong-mei 《China Ocean Engineering》 SCIE EI CSCD 2023年第6期885-896,共12页
Serious ice accumulating,pile-up and ice jamming occur around the conductor array of offshore jacket platforms during the winter every year in Bohai Sea,which could cause grave threats to the stability of platform str... Serious ice accumulating,pile-up and ice jamming occur around the conductor array of offshore jacket platforms during the winter every year in Bohai Sea,which could cause grave threats to the stability of platform structure,the safety of people and equipment,and even severer calamity.Therefore,the process of ice accumulation and ice jamming in the jacket platform area needs more concern.This study focuses on ice accumulation and jamming behaviors in the jacket platform conductor area by using a coupled two-dimensional hydro-ice dynamics model.A series of cases are conducted with different flow conditions,such as flow velocity,drifting direction and oscillatory flow.Through the simulation,the ice pile-up process is described and changes in ice-jamming thickness,ice pile-up location and ice pile-up volume are investigated.The differences in ice pile-up in the steady flow and oscillatory flow are analyzed.This study proposes a new approach to simulate the ice jamming process in the jacket platform conductor area,providing a reference for ice management on the platform. 展开更多
关键词 sea ice ice jamming conductor array numerical modeling hydro-ice dynamics
下载PDF
Received Power Based Unmanned Aerial Vehicles (UAVs) Jamming Detection and Nodes Classification Using Machine Learning
15
作者 Waleed Aldosari 《Computers, Materials & Continua》 SCIE EI 2023年第4期1253-1269,共17页
This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks onWireless Sensor Networks(WSNs).Jamming is a type of Denial of Service(DoS)attack and intentional ... This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks onWireless Sensor Networks(WSNs).Jamming is a type of Denial of Service(DoS)attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly.To defend and prevent such attacks,the first step is to detect them.The current detection approaches use centralized techniques to detect jamming,where each node collects information and forwards it to the base station.As a result,overhead and communication costs increased.In this work,we present a jamming attack and classify nodes into different categories based on their location to the jammer by employing a single node observer.As a result,we introduced a machine learning model that uses distance ratios and power received as features to detect such attacks.Furthermore,we considered several types of jammers transmitting at different power levels to evaluate the proposed metrics using MATLAB.With a detection accuracy of 99.7%for the k-nearest neighbors(KNN)algorithm and average testing accuracy of 99.9%,the presented solution is capable of efficiently and accurately detecting jamming attacks in wireless sensor networks. 展开更多
关键词 jamming attacks machine learning unmanned aerial vehicle(UAV) WSNS
下载PDF
Joint target assignment and power allocation in the netted C-MIMO radar when tracking multi-targets in the presence of self-defense blanket jamming
16
作者 Zhengjie Li Junwei Xie +1 位作者 Haowei Zhang Jiahao Xie 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第6期414-427,共14页
The netted radar system(NRS)has been proved to possess unique advantages in anti-jamming and improving target tracking performance.Effective resource management can greatly ensure the combat capability of the NRS.In t... The netted radar system(NRS)has been proved to possess unique advantages in anti-jamming and improving target tracking performance.Effective resource management can greatly ensure the combat capability of the NRS.In this paper,based on the netted collocated multiple input multiple output(CMIMO)radar,an effective joint target assignment and power allocation(JTAPA)strategy for tracking multi-targets under self-defense blanket jamming is proposed.An architecture based on the distributed fusion is used in the radar network to estimate target state parameters.By deriving the predicted conditional Cramer-Rao lower bound(PC-CRLB)based on the obtained state estimation information,the objective function is formulated.To maximize the worst case tracking accuracy,the proposed JTAPA strategy implements an online target assignment and power allocation of all active nodes,subject to some resource constraints.Since the formulated JTAPA is non-convex,we propose an efficient two-step solution strategy.In terms of the simulation results,the proposed algorithm can effectively improve tracking performance in the worst case. 展开更多
关键词 Netted radar system MIMO Target assignment Power allocation Multi-targets tracking Self-defense blanket jamming
下载PDF
Threat Modeling and Application Research Based on Multi-Source Attack and Defense Knowledge
17
作者 Shuqin Zhang Xinyu Su +2 位作者 Peiyu Shi Tianhui Du Yunfei Han 《Computers, Materials & Continua》 SCIE EI 2023年第10期349-377,共29页
Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to u... Cyber Threat Intelligence(CTI)is a valuable resource for cybersecurity defense,but it also poses challenges due to its multi-source and heterogeneous nature.Security personnel may be unable to use CTI effectively to understand the condition and trend of a cyberattack and respond promptly.To address these challenges,we propose a novel approach that consists of three steps.First,we construct the attack and defense analysis of the cybersecurity ontology(ADACO)model by integrating multiple cybersecurity databases.Second,we develop the threat evolution prediction algorithm(TEPA),which can automatically detect threats at device nodes,correlate and map multisource threat information,and dynamically infer the threat evolution process.TEPA leverages knowledge graphs to represent comprehensive threat scenarios and achieves better performance in simulated experiments by combining structural and textual features of entities.Third,we design the intelligent defense decision algorithm(IDDA),which can provide intelligent recommendations for security personnel regarding the most suitable defense techniques.IDDA outperforms the baseline methods in the comparative experiment. 展开更多
关键词 multi-source data fusion threat modeling threat propagation path knowledge graph intelligent defense decision-making
下载PDF
Risk Analysis Using Multi-Source Data for Distribution Networks Facing Extreme Natural Disasters
18
作者 Jun Yang Nannan Wang +1 位作者 Jiang Wang Yashuai Luo 《Energy Engineering》 EI 2023年第9期2079-2096,共18页
Distribution networks denote important public infrastructure necessary for people’s livelihoods.However,extreme natural disasters,such as earthquakes,typhoons,and mudslides,severely threaten the safe and stable opera... Distribution networks denote important public infrastructure necessary for people’s livelihoods.However,extreme natural disasters,such as earthquakes,typhoons,and mudslides,severely threaten the safe and stable operation of distribution networks and power supplies needed for daily life.Therefore,considering the requirements for distribution network disaster prevention and mitigation,there is an urgent need for in-depth research on risk assessment methods of distribution networks under extreme natural disaster conditions.This paper accessesmultisource data,presents the data quality improvement methods of distribution networks,and conducts data-driven active fault diagnosis and disaster damage analysis and evaluation using data-driven theory.Furthermore,the paper realizes real-time,accurate access to distribution network disaster information.The proposed approach performs an accurate and rapid assessment of cross-sectional risk through case study.The minimal average annual outage time can be reduced to 3 h/a in the ring network through case study.The approach proposed in this paper can provide technical support to the further improvement of the ability of distribution networks to cope with extreme natural disasters. 展开更多
关键词 Distribution network disaster damage analysis fault judgment multi-source data
下载PDF
Evaluation and Improvement Strategies for Slow Traffic Systems Based on Multi-source Big Data:A Case Study of Shijingshan District of Beijing City
19
作者 LI Yiwen 《Journal of Landscape Research》 2023年第4期62-64,68,共4页
The slow traffic system is an important component of urban transportation,and the prerequisite and necessary condition for Beijing to continue promoting“green priority”are establishing a good urban slow traffic syst... The slow traffic system is an important component of urban transportation,and the prerequisite and necessary condition for Beijing to continue promoting“green priority”are establishing a good urban slow traffic system.Shijingshan District of Beijing City is taken as a research object.By analyzing and processing population distribution data,POI data,and shared bicycle data,the shortcomings and deficiencies of the current slow traffic system in Shijingshan District are explored,and corresponding solutions are proposed,in order to provide new ideas and methods for future urban planning from the perspective of data. 展开更多
关键词 multi-source data Slow traffic system Shijingshan District
下载PDF
Classification of Beijing Line 10 Subway Living Circle Based on Multi-source Big Data
20
作者 SUN Shuai LI Ziying 《Journal of Landscape Research》 2023年第3期53-58,共6页
In the first-tier cities,subway has become an important carrier and life focus of people’s daily travel activities.By studying the distribution of POIs of public service facilities around Metro Line 10,using GIS to q... In the first-tier cities,subway has become an important carrier and life focus of people’s daily travel activities.By studying the distribution of POIs of public service facilities around Metro Line 10,using GIS to quantitatively analyze the surrounding formats of subway stations,discussing the functional attributes of subway stations,and discussing the distribution of urban functions from a new perspective,this paper provided guidance and advice for the construction of service facilities. 展开更多
关键词 multi-source big data Subway living circle BEIJING GIS
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部