期刊文献+
共找到1,415篇文章
< 1 2 71 >
每页显示 20 50 100
Task assignment in ground-to-air confrontation based on multiagent deep reinforcement learning 被引量:3
1
作者 Jia-yi Liu Gang Wang +2 位作者 Qiang Fu Shao-hua Yue Si-yuan Wang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第1期210-219,共10页
The scale of ground-to-air confrontation task assignments is large and needs to deal with many concurrent task assignments and random events.Aiming at the problems where existing task assignment methods are applied to... The scale of ground-to-air confrontation task assignments is large and needs to deal with many concurrent task assignments and random events.Aiming at the problems where existing task assignment methods are applied to ground-to-air confrontation,there is low efficiency in dealing with complex tasks,and there are interactive conflicts in multiagent systems.This study proposes a multiagent architecture based on a one-general agent with multiple narrow agents(OGMN)to reduce task assignment conflicts.Considering the slow speed of traditional dynamic task assignment algorithms,this paper proposes the proximal policy optimization for task assignment of general and narrow agents(PPOTAGNA)algorithm.The algorithm based on the idea of the optimal assignment strategy algorithm and combined with the training framework of deep reinforcement learning(DRL)adds a multihead attention mechanism and a stage reward mechanism to the bilateral band clipping PPO algorithm to solve the problem of low training efficiency.Finally,simulation experiments are carried out in the digital battlefield.The multiagent architecture based on OGMN combined with the PPO-TAGNA algorithm can obtain higher rewards faster and has a higher win ratio.By analyzing agent behavior,the efficiency,superiority and rationality of resource utilization of this method are verified. 展开更多
关键词 Ground-to-air confrontation Task assignment General and narrow agents Deep reinforcement learning Proximal policy optimization(PPO)
下载PDF
Multi-UAV Collaborative Mission Planning Method for Self-Organized Sensor Data Acquisition
2
作者 Shijie Yang Jiateng Yuan +3 位作者 Zhipeng Zhang Zhibo Chen Hanchao Zhang Xiaohui Cui 《Computers, Materials & Continua》 SCIE EI 2024年第10期1529-1563,共35页
In recent years,sensor technology has been widely used in the defense and control of sensitive areas in cities,or in various scenarios such as early warning of forest fires,monitoring of forest pests and diseases,and ... In recent years,sensor technology has been widely used in the defense and control of sensitive areas in cities,or in various scenarios such as early warning of forest fires,monitoring of forest pests and diseases,and protection of endangered animals.Deploying sensors to collect data and then utilizing unmanned aerial vehicle(UAV)to collect the data stored in the sensors has replaced traditional manual data collection as the dominant method.The current strategies for efficient data collection in above scenarios are still imperfect,and the low quality of the collected data and the excessive energy consumed by UAV flights are still the main problems faced in data collection.With regards this,this paper proposes a multi-UAV mission planning method for self-organized sensor data acquisition by comprehensively utilizing the techniques of self-organized sensor clustering,multi-UAV mission area allocation,and sub-area data acquisition scheme optimization.The improvedα-hop clustering method utilizes the average transmission distance to reduce the size of the collection sensors,and the K-Dimensional method is used to form a multi-UAV cooperative workspace,and then,the genetic algorithm is used to trade-off the speed with the age of information(AoI)of the collected information and the energy consumption to form the multi-UAV data collection operation scheme.The combined optimization scheme in paper improves the performance by 95.56%and 58.21%,respectively,compared to the traditional baseline model.In order to verify the excellent generalization and applicability of the proposed method in real scenarios,the simulation test is conducted by introducing the digital elevation model data of the real terrain,and the results show that the relative error values of the proposed method and the performance test of the actual flight of the UAV are within the error interval of±10%.Then,the advantages and disadvantages of the present method with the existing mainstream schemes are tested,and the results show that the present method has a huge advantage in terms of space and time complexity,and at the same time,the accuracy for data extraction is relatively improved by 10.46%and 12.71%.Finally,by eliminating the clustering process and the subtask assignment process,the AoI performance decreases by 3.46×and 4.45×,and the energy performance decreases by 3.52×and 4.47×.This paper presents a comprehensive and detailed proactive optimization of the existing challenges faced in the field of data acquisition by means of a series of combinatorial optimizations. 展开更多
关键词 Unmanned aerial vehicle sensor self-organization path planning multi-uav task assignment
下载PDF
Max-Min Adaptive Ant Colony Optimization Approach to Multi-UAVs Coordinated Trajectory Replanning in Dynamic and Uncertain Environments 被引量:33
3
作者 Hai-bin Duan,Xiang-yin Zhang,Jiang Wu,Guan-jun MaSchool of Automation Science and Electrical Engineering,Beihang University,Beijing 100191,P.R.China 《Journal of Bionic Engineering》 SCIE EI CSCD 2009年第2期161-173,共13页
Multiple Uninhabited Aerial Vehicles (multi-UAVs) coordinated trajectory replanning is one of the most complicated global optimum problems in multi-UAVs coordinated control. Based on the construction of the basic mode... Multiple Uninhabited Aerial Vehicles (multi-UAVs) coordinated trajectory replanning is one of the most complicated global optimum problems in multi-UAVs coordinated control. Based on the construction of the basic model of multi-UAVs coordinated trajectory replanning, which includes problem description, threat modeling, constraint conditions, coordinated function and coordination mechanism, a novel Max-Min adaptive Ant Colony Optimization (ACO) approach is presented in detail. In view of the characteristics of multi-UAVs coordinated trajectory replanning in dynamic and uncertain environments, the minimum and maximum pheromone trails in ACO are set to enhance the searching capability, and the point pheromone is adopted to achieve the collision avoidance between UAVs at the trajectory planner layer. Considering the simultaneous arrival and the air-space collision avoidance, an Estimated Time of Arrival (ETA) is decided first. Then the trajectory and flight velocity of each UAV are determined. Simulation experiments are performed under the complicated combating environment containing some static threats and popup threats. The results demonstrate the feasibility and the effectiveness of the proposed approach. 展开更多
关键词 Multiple Uninhabited Aerial Vehicles (multi-uavs) Ant Colony Optimization (ACO) trajectory replanning collision avoidance Estimated Time of Arrival (ETA)
下载PDF
Adaptive Cascaded High-Resolution Source Localization Based on Collaboration of Multi-UAVs 被引量:4
4
作者 Yi He Jianfeng Li Xiaofei Zhang 《China Communications》 SCIE CSCD 2020年第4期165-179,共15页
Effective information fusion is very important in hybrid source localization. In this paper, the performance analysis of conventional joint direction of arrival(DOA) and time difference of arrival(TDOA) system is deri... Effective information fusion is very important in hybrid source localization. In this paper, the performance analysis of conventional joint direction of arrival(DOA) and time difference of arrival(TDOA) system is derived and it is shown that this hybrid system may inferior to the single system when the ratio of angular measurements error to distance measurements error exceeds a threshold. To avoid this problem, an effective DOA/TDOA adaptive cascaded(DTAC) technique is presented. The rotation feature of UAVs and spatial filtering technique are applied to gain the signal-to-noise ratio(SNR), which leads to more accurate estimation of time delay by using DOAs. Nevertheless, the time delay estimation precision is still limited by the sampling frequency, which is constrained by the finite load of UAV. To break through the limitation, an enhanced self-delay-compensation(SDC) method is proposed, which aims at detecting the overlooked time delay within the sampling interval by adding a tiny time delay. Finally, the position of the source is estimated by the Chan algorithm. Compared to DOA-only algorithm, TDOA-only algorithm and joint DOA/TDOA(JDT) algorithm, the proposed method shows better localization accuracy regardless of different SNRs and sampling frequencies. Numerical simulations are presented to validate the effectiveness and robustness of the proposed algorithm. 展开更多
关键词 source localization multi-uavs ADAPTIVE cascaded HIGH-RESOLUTION direction of arrival(DOA) time difference of arrival(TDOA) self-delay-compensation(SDC)
下载PDF
Research on virtual entity decision model for LVC tactical confrontation of army units 被引量:1
5
作者 GAO Ang GUO Qisheng +3 位作者 DONG Zhiming TANG Zaijiang ZHANG Ziwei FENG Qiqi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第5期1249-1267,共19页
According to the requirements of the live-virtual-constructive(LVC)tactical confrontation(TC)on the virtual entity(VE)decision model of graded combat capability,diversified actions,real-time decision-making,and genera... According to the requirements of the live-virtual-constructive(LVC)tactical confrontation(TC)on the virtual entity(VE)decision model of graded combat capability,diversified actions,real-time decision-making,and generalization for the enemy,the confrontation process is modeled as a zero-sum stochastic game(ZSG).By introducing the theory of dynamic relative power potential field,the problem of reward sparsity in the model can be solved.By reward shaping,the problem of credit assignment between agents can be solved.Based on the idea of meta-learning,an extensible multi-agent deep reinforcement learning(EMADRL)framework and solving method is proposed to improve the effectiveness and efficiency of model solving.Experiments show that the model meets the requirements well and the algorithm learning efficiency is high. 展开更多
关键词 live-virtual-constructive(LVC) army unit tactical confrontation(TC) intelligent decision model multi-agent deep reinforcement learning
下载PDF
From Innocence to Suffering to Awareness:Nada Confrontation in Francis Macomber
6
作者 史晶 《海外英语》 2013年第8X期198-199,205,共3页
The Short Happy Life of Francis Macomber is a quintessential Hemingway tale of one man's attempt to overcome an in ternal struggle by mastering the external world. Francis Macomber discovers his own bravery and st... The Short Happy Life of Francis Macomber is a quintessential Hemingway tale of one man's attempt to overcome an in ternal struggle by mastering the external world. Francis Macomber discovers his own bravery and strength when he ignores his self-consciousness and relies on instinct. This essay will examine Hemingway's code and how it confronts nada thus analyze Macomber's change from innocent to suffering to aware. 展开更多
关键词 Hemingway’s code Nada confrontation INNOCENT suffe
下载PDF
Resilient Time-Varying Formation-Tracking of Multi-UAV Systems Against Composite Attacks: A Two-Layered Framework 被引量:2
7
作者 Xin Gong Michael V.Basin +2 位作者 Zhiguang Feng Tingwen Huang Yukang Cui 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期969-984,共16页
This paper studies the countermeasure design problems of distributed resilient time-varying formation-tracking control for multi-UAV systems with single-way communications against composite attacks,including denial-of... This paper studies the countermeasure design problems of distributed resilient time-varying formation-tracking control for multi-UAV systems with single-way communications against composite attacks,including denial-of-services(DoS)attacks,false-data injection attacks,camouflage attacks,and actuation attacks(AAs).Inspired by the concept of digital twin,a new two-layered protocol equipped with a safe and private twin layer(TL)is proposed,which decouples the above problems into the defense scheme against DoS attacks on the TL and the defense scheme against AAs on the cyber-physical layer.First,a topologyrepairing strategy against frequency-constrained DoS attacks is implemented via a Zeno-free event-triggered estimation scheme,which saves communication resources considerably.The upper bound of the reaction time needed to launch the repaired topology after the occurrence of DoS attacks is calculated.Second,a decentralized adaptive and chattering-relief controller against potentially unbounded AAs is designed.Moreover,this novel adaptive controller can achieve uniformly ultimately bounded convergence,whose error bound can be given explicitly.The practicability and validity of this new two-layered protocol are shown via a simulation example and a UAV swarm experiment equipped with both Ultra-WideBand and WiFi communication channels. 展开更多
关键词 Composite attacks multi-uav systems resilient control time-varying formation-tracking
下载PDF
Path planning method for controlling multi-UAVs to reach multi-waypoints simultaneously under the view of visual navigation
8
作者 杨东晓 李杰 +1 位作者 李大林 关震宇 《Journal of Beijing Institute of Technology》 EI CAS 2013年第3期308-312,共5页
Abstract: There is a high demand for unmanned aerial vehicle (UAV) flight stability when using vi- sion as a detection method for navigation control. To meet such demand, a new path planning meth- od for controllin... Abstract: There is a high demand for unmanned aerial vehicle (UAV) flight stability when using vi- sion as a detection method for navigation control. To meet such demand, a new path planning meth- od for controlling multi-UAVs is studied to reach multi-waypoints simultaneously under the view of visual navigation technology. A model based on the stable-shortest pythagorean-hodograph (PH) curve is established, which could not only satisfy the demands of visual navigation and control law, but also be easy to compute. Based on the model, a planning algorithm to guide multi-UAVs to reach multi-waypoints at the same time without collisions is developed. The simulation results show that the paths have shorter distance and smaller curvature than traditional methods, which could help to avoid collisions. 展开更多
关键词 path planning multi-uavs visual navigation reaching multi-waypoints simultaneously
下载PDF
Tensor-Centric Warfare V: Topology of Systems Confrontation
9
作者 Vladimir Ivancevic Peyam Pourbeik Darryn Reid 《Intelligent Control and Automation》 2019年第1期13-45,共33页
In this paper, as a new contribution to the tensor-centric warfare (TCW) series [1] [2] [3] [4], we extend the kinetic TCW-framework to include non-kinetic effects, by addressing a general systems confrontation [5], w... In this paper, as a new contribution to the tensor-centric warfare (TCW) series [1] [2] [3] [4], we extend the kinetic TCW-framework to include non-kinetic effects, by addressing a general systems confrontation [5], which is waged not only in the traditional physical Air-Land-Sea domains, but also simultaneously across multiple non-physical domains, including cyberspace and social networks. Upon this basis, this paper attempts to address a more general analytical scenario using rigorous topological methods to introduce a two-level topological representation of modern armed conflict;in doing so, it extends from the traditional red-blue model of conflict to a red-blue-green model, where green represents various neutral elements as active factions;indeed, green can effectively decide the outcomes from red-blue conflict. System confrontations at various stages of the scenario will be defined by the non-equilibrium phase transitions which are superficially characterized by sudden entropy growth. These will be shown to have the underlying topology changes of the systems-battlespace. The two-level topological analysis of the systems-battlespace is utilized to address the question of topology changes in the combined battlespace. Once an intuitive analysis of the combined battlespace topology is performed, a rigorous topological analysis follows using (co)homological invariants of the combined systems-battlespace manifold. 展开更多
关键词 Tensor-Centric Warfare SYSTEMS confrontation Systems-Battlespace TOPOLOGY Cobordisms and MORSE Functions Morse-Smale Homology Morse-Witten Cohomology Hodge-De Rham Theory
下载PDF
On the Confrontation Between Masculinism and Feminism in The Great Gatsby
10
作者 LI Bao-feng JIA Xue-ying 《Sino-US English Teaching》 2015年第11期874-880,共7页
In The Great Gatsby, Fitzgerald depicts the conflicts and contradictions between men and women about society, family, love, and money, literally mirroring the patriarchal society constantly challenged by feminism in t... In The Great Gatsby, Fitzgerald depicts the conflicts and contradictions between men and women about society, family, love, and money, literally mirroring the patriarchal society constantly challenged by feminism in the 1920s of America. This paper intends to compare the features of masculinism and feminism in three aspects: gender, society, and morality. Different identifications of gender role between men and women lead to female protests against male superiority and pursuits of individual liberation. Meanwhile, male unshaken egotism and gradually expanded individualism of women enable them both in lack of sound moral standards. But compared with the female, male moral pride drives them with much more proper moral judge, which reflects Fitzgerald's support of the masculine society. Probing into the confrontation between masculinism and feminism, it is beneficial for further study on how to achieve equal coexistence and harmony between men and women. 展开更多
关键词 The Great Gatsby confrontation masculinism FEMINISM
下载PDF
The Confrontation between the East and the West or the Fusion of the East and the West
11
作者 苏雪莲 《教育界(高等教育)》 2012年第2期32-32,共1页
关键词 职业技术教育 教学理论 教育体制 人才培养
下载PDF
Confrontation Between Kodak and Fuji
12
《China's Foreign Trade》 2001年第3期46-46,共1页
关键词 KODAK confrontation Between Kodak and Fuji
下载PDF
Research on Cyberspace Attack and Defense Confrontation Technology
13
作者 Chengjun ZHOU 《International Journal of Technology Management》 2015年第3期11-14,共4页
This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network spa... This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network space attack defense confrontation system, and analyzes its feasibility. The technology and the system can provide technical support for the system in the network space of our country development, and safeguard security of network space in China, promote the development of the network space security industry of China, it plays an important role and significance to speed up China' s independent controllable security products development. 展开更多
关键词 Intrusion prevention system Attack and defense confrontation Attack tracing Active defense
下载PDF
Cooperation Benefits Both Sides While Confrontation Harms——Thoughts on Strategic Positioning of Sino-U.S. Relations
14
作者 Ma Zhengang 《China International Studies》 2006年第1期35-54,共20页
关键词 rate RELATIONS Thoughts on Strategic Positioning of Sino-U.S Cooperation Benefits Both Sides While confrontation Harms
下载PDF
Constructive Confrontation --Intel Practice Rooted in American Values
15
作者 Li Xin 《俪人(教师)》 2014年第2期232-233,共2页
关键词 英语学习 学习方法 阅读知识 阅读材料
下载PDF
糖尿病患者自我厌恶现状及影响因素分析 被引量:1
16
作者 夏冬梅 周映婷 +2 位作者 李玉龙 秦新飞 严如谊 《护理学杂志》 CSCD 北大核心 2024年第4期83-85,91,共4页
目的了解糖尿病患者自我厌恶现状及其影响因素,为医护人员采取针对性干预改善糖尿病患者心理健康提供参考。方法采用一般情况调查表、自我厌恶量表、医学应对问卷和领悟社会支持量表对274例2型糖尿病患者进行调查。结果糖尿病患者自我... 目的了解糖尿病患者自我厌恶现状及其影响因素,为医护人员采取针对性干预改善糖尿病患者心理健康提供参考。方法采用一般情况调查表、自我厌恶量表、医学应对问卷和领悟社会支持量表对274例2型糖尿病患者进行调查。结果糖尿病患者自我厌恶得分(35.46±6.39)分,年龄、糖尿病相关并发症、回避应对、领悟社会支持总分是自我厌恶的主要影响因素(均P<0.05),可预测总变异的49.6%。结论糖尿病患者自我厌恶为中等偏高水平,护理人员应加强对糖尿病患者自我厌恶水平的评估和筛查,加强对年轻、有糖尿病相关并发症的患者的干预,帮助患者减少其回避行为,并增强其领悟社会支持水平,从而降低其自我厌恶水平。 展开更多
关键词 糖尿病 自我厌恶 应对 回避 面对 社会支持 并发症 影响因素
下载PDF
攻防对抗视角下的网络安全主动防御体系研究 被引量:1
17
作者 李庆华 郭晓黎 +3 位作者 张锋军 张小军 石凯 许杰 《信息安全与通信保密》 2024年第1期77-85,共9页
为了解决纵深防御体系中防御能力固化、灵活性不足等问题,从攻防对抗视角出发,提出一种网络安全主动防御体系。首先,基于情报收集、监测预警、防御指挥和防御行动等要素的详细描述,设计了用于规划主动防御系统的能力组成框架;其次,选择... 为了解决纵深防御体系中防御能力固化、灵活性不足等问题,从攻防对抗视角出发,提出一种网络安全主动防御体系。首先,基于情报收集、监测预警、防御指挥和防御行动等要素的详细描述,设计了用于规划主动防御系统的能力组成框架;其次,选择网络杀伤链、ATT&CK知识库和OODA循环法则,设计了一个以攻助防的防御模型,并分析了引入博弈论进行防御算法设计的优势;最后,以实现为目标,构想了一个典型应用场景,以期为安全能力的体系化设计提供有益借鉴。 展开更多
关键词 网络安全 攻防对抗 主动防御 ATT&CK OODA
下载PDF
无人集群博弈对抗系统仿真验证及决策关键技术综述
18
作者 梁晓龙 杨爱武 +4 位作者 张佳强 侯岳奇 王宁 黄骁 龚俊斌 《系统仿真学报》 CAS CSCD 北大核心 2024年第4期805-816,共12页
无人集群博弈对抗是一种新兴的作战样式,在智能化战争扮演着至关重要的作用,其核心是自主生成博弈对抗决策序列,为集群“赋能”。分析了无人集群博弈对抗系统仿真验证的进展;从基于专家系统和博弈论的技术、基于群体智能和优化理论的技... 无人集群博弈对抗是一种新兴的作战样式,在智能化战争扮演着至关重要的作用,其核心是自主生成博弈对抗决策序列,为集群“赋能”。分析了无人集群博弈对抗系统仿真验证的进展;从基于专家系统和博弈论的技术、基于群体智能和优化理论的技术,以及基于神经网络和强化学习的技术三个方面论述了自主决策关键技术,以及课题组在自主决策上开展的相关工作;提出了无人集群博弈对抗的发展方向。 展开更多
关键词 无人集群 博弈对抗 自主决策 系统仿真验证
下载PDF
基于改进鲸鱼算法的多无人机协同欺骗干扰技术
19
作者 丁宸聪 叶紫晴 《电讯技术》 北大核心 2024年第1期67-73,共7页
多机协同对组网雷达系统进行航迹欺骗干扰属于大规模优化问题,往往需要利用群体智能算法优化无人机的飞行任务,然而采用传统群体智能算法优化时往往会出现收敛速度慢、求解精度低等问题。针对这一问题,对标准鲸鱼优化算法进行了改进,提... 多机协同对组网雷达系统进行航迹欺骗干扰属于大规模优化问题,往往需要利用群体智能算法优化无人机的飞行任务,然而采用传统群体智能算法优化时往往会出现收敛速度慢、求解精度低等问题。针对这一问题,对标准鲸鱼优化算法进行了改进,提出了一种基于改进鲸鱼优化算法的多无人机协同欺骗干扰技术。首先建立了多无人机协同欺骗干扰组网雷达的数学模型以及对应的优化函数,然后在标准鲸鱼优化算法的基础上引入了自适应惯性权值,提高了算法的全局搜索能力和收敛速度。仿真实验表明,固定无人机数量为9架时,利用改进鲸鱼、标准鲸鱼、粒子群、蚁群4种算法分别优化多机协同欺骗干扰模型,得出改进鲸鱼优化算法平均运行时间最短,迭代次数最少,同时优化产生的实际航迹与理论值误差最小;逐步增加无人机数量至20架,利用上述四种算法进行模型求解时得出改进鲸鱼优化算法在不同无人机架数的条件下产生的假目标航迹条数均优于其他3种算法。 展开更多
关键词 多无人机(multi-uav)协同 航迹欺骗干扰 组网雷达 改进鲸鱼优化算法
下载PDF
军事系统的复杂性对抗
20
作者 段晓君 赵城利 +1 位作者 晏良 王泽龙 《国防科技》 2024年第3期134-142,共9页
阐释军事复杂系统的内涵,总结未来作战的复杂性来源,分析军事系统的典型复杂性特征及度量。军事系统的复杂性对抗,即将复杂性作为一种给对手制造多重困境的武器用于军事对抗,旨在最小化自身复杂性的同时最大化对手所面临的复杂性。通过... 阐释军事复杂系统的内涵,总结未来作战的复杂性来源,分析军事系统的典型复杂性特征及度量。军事系统的复杂性对抗,即将复杂性作为一种给对手制造多重困境的武器用于军事对抗,旨在最小化自身复杂性的同时最大化对手所面临的复杂性。通过采取特定行动塑造利于己方的态势,利用复杂自适应特点针对对手施加复杂攻击手段,从复杂性视角来指导未来作战。军事系统是一类特殊的复杂系统。未来作战正向全域拓展,作战资源要素规模显著增长、资源调度及决策明显加速,使得军事系统的复杂性急剧增长。发展迷雾混淆意图、快变抑慢变、分布对集中、多域制单域等复杂性对抗途径,可创造形成军事系统决策优势,达到以复杂性制胜的作战目的。 展开更多
关键词 军事系统 复杂性来源 复杂性度量 复杂性对抗
下载PDF
上一页 1 2 71 下一页 到第
使用帮助 返回顶部