期刊文献+
共找到21,684篇文章
< 1 2 250 >
每页显示 20 50 100
An Air Defense Weapon Target Assignment Method Based on Multi-Objective Artificial Bee Colony Algorithm
1
作者 Huaixi Xing Qinghua Xing 《Computers, Materials & Continua》 SCIE EI 2023年第9期2685-2705,共21页
With the advancement of combat equipment technology and combat concepts,new requirements have been put forward for air defense operations during a group target attack.To achieve high-efficiency and lowloss defensive o... With the advancement of combat equipment technology and combat concepts,new requirements have been put forward for air defense operations during a group target attack.To achieve high-efficiency and lowloss defensive operations,a reasonable air defense weapon assignment strategy is a key step.In this paper,a multi-objective and multi-constraints weapon target assignment(WTA)model is established that aims to minimize the defensive resource loss,minimize total weapon consumption,and minimize the target residual effectiveness.An optimization framework of air defense weapon mission scheduling based on the multiobjective artificial bee colony(MOABC)algorithm is proposed.The solution for point-to-point saturated attack targets at different operational scales is achieved by encoding the nectar with real numbers.Simulations are performed for an imagined air defense scenario,where air defense weapons are saturated.The non-dominated solution sets are obtained by the MOABC algorithm to meet the operational demand.In the case where there are more weapons than targets,more diverse assignment schemes can be selected.According to the inverse generation distance(IGD)index,the convergence and diversity for the solutions of the non-dominated sorting genetic algorithm III(NSGA-III)algorithm and the MOABC algorithm are compared and analyzed.The results prove that the MOABC algorithm has better convergence and the solutions are more evenly distributed among the solution space. 展开更多
关键词 Weapon target assignment multi-objective artificial bee colony air defense defensive resource loss total weapon consumption target residual effectiveness
下载PDF
Joint target assignment and power allocation in the netted C-MIMO radar when tracking multi-targets in the presence of self-defense blanket jamming
2
作者 Zhengjie Li Junwei Xie +1 位作者 Haowei Zhang Jiahao Xie 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第6期414-427,共14页
The netted radar system(NRS)has been proved to possess unique advantages in anti-jamming and improving target tracking performance.Effective resource management can greatly ensure the combat capability of the NRS.In t... The netted radar system(NRS)has been proved to possess unique advantages in anti-jamming and improving target tracking performance.Effective resource management can greatly ensure the combat capability of the NRS.In this paper,based on the netted collocated multiple input multiple output(CMIMO)radar,an effective joint target assignment and power allocation(JTAPA)strategy for tracking multi-targets under self-defense blanket jamming is proposed.An architecture based on the distributed fusion is used in the radar network to estimate target state parameters.By deriving the predicted conditional Cramer-Rao lower bound(PC-CRLB)based on the obtained state estimation information,the objective function is formulated.To maximize the worst case tracking accuracy,the proposed JTAPA strategy implements an online target assignment and power allocation of all active nodes,subject to some resource constraints.Since the formulated JTAPA is non-convex,we propose an efficient two-step solution strategy.In terms of the simulation results,the proposed algorithm can effectively improve tracking performance in the worst case. 展开更多
关键词 Netted radar system MIMO Target assignment Power allocation Multi-targets tracking Self-defense blanket jamming
下载PDF
Evaluation method and optimization strategies of resilience for air&space defense system of systems based on kill network theory and improved self-information quantity 被引量:3
3
作者 Qi Han Bo Pang +4 位作者 Sen Li Ning Li Peng-song Guo Cheng-li Fan Wei-min Li 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第3期219-239,共21页
Resilience of air&space defense system of systems(SoSs)is critical to national air defense security.However,the research on it is still scarce.In this study,the resilience of air&space defense SoSs is firstly ... Resilience of air&space defense system of systems(SoSs)is critical to national air defense security.However,the research on it is still scarce.In this study,the resilience of air&space defense SoSs is firstly defined and the kill network theory is established by combining super network and kill chain theory.Two cases of the SoSs are considered:(a)The kill chains are relatively homogenous;(b)The kill chains are relatively heterogenous.Meanwhile,two capability assessment methods,which are based on the number of kill chains and improved self-information quantity,respectively,are proposed.The improved self-information quantity modeled based on nodes and edges can achieve qualitative and quantitative assessment of the combat capability by using linguistic Pythagorean fuzzy sets.Then,a resilient evaluation index consisting of risk response,survivability,and quick recovery is proposed accordingly.Finally,network models for regional air defense and anti-missile SoSs are established respectively,and the resilience measurement results are verified and analyzed under different attack and recovery strategies,and the optimization strategies are also proposed.The proposed theory and method can meet different demands to evaluate combat capability and optimize resilience of various types of air&space defense and similar SoSs. 展开更多
关键词 network optimization THEORY
下载PDF
Request pattern change-based cache pollution attack detection and defense in edge computing
4
作者 Junwei Wang Xianglin Wei +3 位作者 Jianhua Fan Qiang Duan Jianwei Liu Yangang Wang 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1212-1220,共9页
Through caching popular contents at the network edge,wireless edge caching can greatly reduce both the content request latency at mobile devices and the traffic burden at the core network.However,popularity-based cach... Through caching popular contents at the network edge,wireless edge caching can greatly reduce both the content request latency at mobile devices and the traffic burden at the core network.However,popularity-based caching strategies are vulnerable to Cache Pollution Attacks(CPAs)due to the weak security protection at both edge nodes and mobile devices.In CPAs,through initiating a large number of requests for unpopular contents,malicious users can pollute the edge caching space and degrade the caching efficiency.This paper firstly integrates the dynamic nature of content request and mobile devices into the edge caching framework,and introduces an eavesdroppingbased CPA strategy.Then,an edge caching mechanism,which contains a Request Pattern Change-based Cache Pollution Detection(RPC2PD)algorithm and an Attack-aware Cache Defense(ACD)algorithm,is proposed to defend against CPAs.Simulation results show that the proposed mechanism could effectively suppress the effects of CPAs on the caching performance and improve the cache hit ratio. 展开更多
关键词 Mobile edge computing Cache pollution attack Flash crowd
下载PDF
Pointing Fingers from A Glass House The fundamental purpose of the increase in China’s defense budget is to safeguard national security and meet the challenges of global changes unseen in a century
5
作者 Wang Keyu 《China Report ASEAN》 2023年第4期32-33,共2页
On March 5,the Ministry of Finance released the 2023 government budget draft report,according to which China’s defense budget of 2023 will be 1.55 trillion yuan(US$224.79 billion),an increase of 7.2 percent year on y... On March 5,the Ministry of Finance released the 2023 government budget draft report,according to which China’s defense budget of 2023 will be 1.55 trillion yuan(US$224.79 billion),an increase of 7.2 percent year on year,which is only 0.1 percentage points higher than 2022.The release of the defense budget attracted the attention of many foreign media outlets,some of which delivered distorted interpretations and exaggerated“China’s threat of force.”On March 6,Tan Kefei,spokesperson for the delegation of the People’s Liberation Army and the People’s Armed Police Force to the First Session of the 14th National People’s Congress,said that China has adhered to the principle of coordinated development of national defense and economic development. 展开更多
关键词 BUDGET delegation outlet
下载PDF
Ripple-effect analysis for operational architecture of air defense systems with supernetwork modeling 被引量:5
6
作者 Zhigang Zou Fuxian Liu +2 位作者 Shiman Sun Lu Xia Chengli Fan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第2期249-264,共16页
In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork model... In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork modeling approach for the OAADS is put for- ward by extending granular computing. Based on that operational units and links are equal to different information granularities, the supernetwork framework of the OAADS is constructed as a “four- network within two-layer” structure by forming dynamic operating coalitions, and measuring indexes of the ripple-effect analysis for the OAADS are given combining with Laplace spectral radius. In this framework, via analyzing multidimensional attributes which inherit relations between operational units in different granular scales, an extended granular computing is put forward integrating with a topological structure. Then the operation process within the supernetwork framework, including transformation relations be- tween two layers in the vertical view and mapping relations among functional networks in the horizontal view, is studied in quantity. As the application case shows, comparing with previous modeling approaches, the supernetwork model can validate and analyze the operation mechanism in the air defense architecture, and the ripple-effect analysis can be used to confirm the key operational unit with micro and macro viewpoints. 展开更多
关键词 operational architecture air defense system super-network model Laplace spectral radius ripple-effect analysis.
下载PDF
Multi-agent decision support system for missile defense based on improved PSO algorithm 被引量:5
7
作者 Zilong Cheng Li Fan Yulin Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2017年第3期514-525,共12页
Ballistic missile defense system (BMDS) is important for its special role in ensuring national security and maintaining strategic balance. Research on modeling and simulation of the BMDS beforehand is essential as dev... Ballistic missile defense system (BMDS) is important for its special role in ensuring national security and maintaining strategic balance. Research on modeling and simulation of the BMDS beforehand is essential as developing a real one requires lots of manpower and resources. BMDS is a typical complex system for its nonlinear, adaptive and uncertainty characteristics. The agent-based modeling method is well suited for the complex system whose overall behaviors are determined by interactions among individual elements. A multi-agent decision support system (DSS), which includes missile agent, radar agent and command center agent, is established based on the studies of structure and function of BMDS. Considering the constraints brought by radar, intercept missile, offensive missile and commander, the objective function of DSS is established. In order to dynamically generate the optimal interception plan, the variable neighborhood negative selection particle swarm optimization (VNNSPSO) algorithm is proposed to support the decision making of DSS. The proposed algorithm is compared with the standard PSO, constriction factor PSO (CFPSO), inertia weight linear decrease PSO (LDPSO), variable neighborhood PSO (VNPSO) algorithm from the aspects of convergence rate, iteration number, average fitness value and standard deviation. The simulation results verify the efficiency of the proposed algorithm. The multi-agent DSS is developed through the Repast simulation platform and the constructed DSS can generate intercept plans automatically and support three-dimensional dynamic display of missile defense process. 展开更多
关键词 agent-based modeling missile defense system decision support system (DSS) variable neighborhood negative selection particle swarm optimization (PSO)
下载PDF
Optimal index shooting policy for layered missile defense system 被引量:1
8
作者 LI Longyue FAN Chengli +2 位作者 XING Qinghua XU Hailong ZHAO Huizhen 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第1期118-129,共12页
In order to cope with the increasing threat of the ballistic missile(BM)in a shorter reaction time,the shooting policy of the layered defense system needs to be optimized.The main decisionmaking problem of shooting op... In order to cope with the increasing threat of the ballistic missile(BM)in a shorter reaction time,the shooting policy of the layered defense system needs to be optimized.The main decisionmaking problem of shooting optimization is how to choose the next BM which needs to be shot according to the previous engagements and results,thus maximizing the expected return of BMs killed or minimizing the cost of BMs penetration.Motivated by this,this study aims to determine an optimal shooting policy for a two-layer missile defense(TLMD)system.This paper considers a scenario in which the TLMD system wishes to shoot at a collection of BMs one at a time,and to maximize the return obtained from BMs killed before the system demise.To provide a policy analysis tool,this paper develops a general model for shooting decision-making,the shooting engagements can be described as a discounted reward Markov decision process.The index shooting policy is a strategy that can effectively balance the shooting returns and the risk that the defense mission fails,and the goal is to maximize the return obtained from BMs killed before the system demise.The numerical results show that the index policy is better than a range of competitors,especially the mean returns and the mean killing BM number. 展开更多
关键词 Gittins index shooting policy layered missile defense multi-armed bandits problem Markov decision process
下载PDF
Automated integration of real-time and non-real-time defense systems
9
作者 Emre Dalkıran Tolga Onel +1 位作者 Okan Topçu Kadir Alpaslan Demir 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2021年第2期657-670,共14页
Various application domains require the integration of distributed real-time or near-real-time systems with non-real-time systems.Smart cities,smart homes,ambient intelligent systems,or network-centric defense systems... Various application domains require the integration of distributed real-time or near-real-time systems with non-real-time systems.Smart cities,smart homes,ambient intelligent systems,or network-centric defense systems are among these application domains.Data Distribution Service(DDS)is a communication mechanism based on Data-Centric Publish-Subscribe(DCPS)model.It is used for distributed systems with real-time operational constraints.Java Message Service(JMS)is a messaging standard for enterprise systems using Service Oriented Architecture(SOA)for non-real-time operations.JMS allows Java programs to exchange messages in a loosely coupled fashion.JMS also supports sending and receiving messages using a messaging queue and a publish-subscribe interface.In this article,we propose an architecture enabling the automated integration of distributed real-time and non-real-time systems.We test our proposed architecture using a distributed Command,Control,Communications,Computers,and Intelligence(C4I)system.The system has DDS-based real-time Combat Management System components deployed to naval warships,and SOA-based non-real-time Command and Control components used at headquarters.The proposed solution enables the exchange of data between these two systems efficiently.We compare the proposed solution with a similar study.Our solution is superior in terms of automation support,ease of implementation,scalability,and performance. 展开更多
关键词 Systems integration System of systems Systems engineering Software engineering C4I systems Defense systems Data distribution service DDS integration Java message service JMS
下载PDF
Intercepts allocation for layered defense
10
作者 Longyue Li Fuxian Liu +2 位作者 Guangzheng Long Pengsong Guo Yingying Mei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第3期602-611,共10页
One important mission of the strategic defense is to develop an integrated, layered ballistic missile defense system(BMDS). Considering the problem of assigning limited defense weapons to incoming ballistic missiles... One important mission of the strategic defense is to develop an integrated, layered ballistic missile defense system(BMDS). Considering the problem of assigning limited defense weapons to incoming ballistic missiles, we illustrate how defense weapons, ballistic missiles, kill probability and effectiveness of defense(ED) are interrelated and how to understand this relationship for achieving the best allocation plan. Motivated by the queueing theory, in which the available resources are not sufficient to satisfy the demands placed upon them at all times, the layered deployed defense weapon is modeled as a queueing system to shoot Poisson arrived targets. Simultaneously, examples, of optimum intercepts allocation problems under different constraints are presented. The four theorems determine the allocation rules of intercepts to targets that maximize ED or minimize the cost to achieve a required ED. 展开更多
关键词 intercepts allocation layered defense queueing theory effectiveness of defense
下载PDF
Analysis Criteria for Defense Expenditure Performance - Economy, Efficiency, and Effectiveness
11
作者 Ling Yang He Gui 《Proceedings of Business and Economic Studies》 2021年第5期117-123,共7页
Based on the analysis of public expenditure performance,this article discusses the economy,efficiency,and effectiveness of defense expenditure performance,explains the relationship of the three,and emphasizes their un... Based on the analysis of public expenditure performance,this article discusses the economy,efficiency,and effectiveness of defense expenditure performance,explains the relationship of the three,and emphasizes their unity,interaction,and priority.The defense expenditure performance evaluation system,which is a comprehensive assessment of processes and results,is put forward along with the unification of economy,efficiency,and effectiveness.This system can be used to analyze whether the allocation and use of defense funds have achieved the strategic objectives of the Department of Defense. 展开更多
关键词 Defense expenditure performance ECONOMY Efficiency and effectiveness
下载PDF
Threat evaluation method of warships formation air defense based on AR(p)-DITOPSIS 被引量:3
12
作者 SUN Haiwen XIE Xiaofang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2019年第2期297-307,共11页
For the target threat evaluation of warships formation air defense, the sample data are frequently insufficient and even incomplete. The existing evaluation methods rely too much on expertise and are difficult to carr... For the target threat evaluation of warships formation air defense, the sample data are frequently insufficient and even incomplete. The existing evaluation methods rely too much on expertise and are difficult to carry out for the dynamic evaluation on time series. In order to solve these problems, a threat evaluation method based on the AR(p)(auto regressive(AR))-dynamic improved technique for order preference by similarity to ideal solution(DITOPSIS) method is proposed. The AR(p) model is adopted to predict the missing data on the time series. Then, the entropy weight method is applied to solve each index weight at the objective point. Kullback-Leibler divergence(KLD) is used to improve the traditional TOPSIS, and to carry out the target threat evaluation. The Poisson distribution is used to assign the weight value.Simulation results show that the improved AR(p)-DITOPSIS threat evaluation method can synthetically take into account the target threat degree in time series and is more suitable for the threat evaluation under the condition of missing the target data than the traditional TOPSIS method. 展开更多
关键词 AR(p) model Kullback-Leibler DIVERGENCE (KLD) dynamic improved technique for order PREFERENCE by similarity to ideal solution (DITOPSIS) time series THREAT evaluation
下载PDF
A novel plant defensin from Chinese mistletoe,Viscum coloratum (Kom.) Nakai 被引量:1
13
作者 Shi Lei Liu Xiu Bao Du Jing Lin Kong Hui Jiang 《Chinese Chemical Letters》 SCIE CAS CSCD 2007年第1期55-58,共4页
作为 defensin 厘米说出的新奇多肽从中国槲寄生被孤立, Viscum coloratum (Kom ) Nakai。氨基酸顺序被 Edman 降级, endoproteinase Lys-C 消化,和 MALDI-TOF 质谱学的联合决定。原结构是 ATCSAPSGRF KGACFSSNTC SNICKTLEGL KDGHCTG... 作为 defensin 厘米说出的新奇多肽从中国槲寄生被孤立, Viscum coloratum (Kom ) Nakai。氨基酸顺序被 Edman 降级, endoproteinase Lys-C 消化,和 MALDI-TOF 质谱学的联合决定。原结构是 ATCSAPSGRF KGACFSSNTC SNICKTLEGL KDGHCTGLAC YCSRNC。 展开更多
关键词 药用植物 槲寄生 植物防御素 粘毒素 多肽 一级结构
下载PDF
CRSG:A congestion control routing algorithm for security defense based on social psychology and game theory in DTN 被引量:1
14
作者 王珵珺 龚正虎 +2 位作者 陶勇 张子文 赵宝康 《Journal of Central South University》 SCIE EI CAS 2013年第2期440-450,共11页
The inherent selfishness of each node for the enhancement of message successful delivery ratio and the network overall performance improvement are reflected in the contradiction relationship of competition and coopera... The inherent selfishness of each node for the enhancement of message successful delivery ratio and the network overall performance improvement are reflected in the contradiction relationship of competition and cooperation in delay/disruption tolerant networks (DTN). In particular, the existence of malicious node aggravates this contradiction. To resolve this contradiction, social relationship theory and group theory of social psychology were adopted to do an in-depth analysis. The concrete balancing approach which leveraged Nash equilibrium theory of game theory was proposed to resolve this contradiction in reality. Thus, a new congestion control routing algorithm for security defense based on social psychology and game theory (CRSG) was put forward. Through the experiment, this algorithm proves that it can enhance the message successful delivery ratio by more than 15% and reduce the congestion ratio over 15% as well. This algorithm balances the contradiction relationship between the two key performance targets and made all nodes exhibit strong cooperation relationship in DTN. 展开更多
关键词 社会心理学 路由算法 拥塞控制 安全防御 博弈论 中央 性能指标 合作关系
下载PDF
Defense Against Poisoning Attack via Evaluating TrainingSamples Using Multiple Spectral Clustering Aggregation Method 被引量:2
15
作者 Wentao Zhao Pan Li +2 位作者 Chengzhang Zhu Dan Liu Xiao Liu 《Computers, Materials & Continua》 SCIE EI 2019年第6期817-832,共16页
The defense techniques for machine learning are critical yet challenging due tothe number and type of attacks for widely applied machine learning algorithms aresignificantly increasing. Among these attacks, the poison... The defense techniques for machine learning are critical yet challenging due tothe number and type of attacks for widely applied machine learning algorithms aresignificantly increasing. Among these attacks, the poisoning attack, which disturbsmachine learning algorithms by injecting poisoning samples, is an attack with the greatestthreat. In this paper, we focus on analyzing the characteristics of positioning samples andpropose a novel sample evaluation method to defend against the poisoning attack cateringfor the characteristics of poisoning samples. To capture the intrinsic data characteristicsfrom heterogeneous aspects, we first evaluate training data by multiple criteria, each ofwhich is reformulated from a spectral clustering. Then, we integrate the multipleevaluation scores generated by the multiple criteria through the proposed multiplespectral clustering aggregation (MSCA) method. Finally, we use the unified score as theindicator of poisoning attack samples. Experimental results on intrusion detection datasets show that MSCA significantly outperforms the K-means outlier detection in terms ofdata legality evaluation and poisoning attack detection. 展开更多
关键词 Poisoning attack sample evaluation spectral clustering ensemble learning.
下载PDF
From Bilateralism to Multilateralism:Evoluuon and Prospects of ASEAN Defense Cooperation
16
作者 He Tao 《China International Studies》 2014年第6期91-108,共18页
关键词 东盟 合作 防务 主义 双边 区域性 国防
下载PDF
Description of trauma among French service members in the Department of Defense Trauma Registry: Understanding the nature of trauma and the care provided
17
作者 Marc A.Schweizer Jud C.Janak +1 位作者 Zsolt T.Stockinger Tristan Monchal 《Military Medical Research》 SCIE CAS CSCD 2019年第4期275-283,共9页
Background:Since 2001,the French Armed Forces have sustained many casualties during the Global War on Terror;however,even today,there is no French Military trauma registry.Some French service members(SMs)were treated ... Background:Since 2001,the French Armed Forces have sustained many casualties during the Global War on Terror;however,even today,there is no French Military trauma registry.Some French service members(SMs)were treated in US Military Medical Treatment Facilities(MTFs)and were recorded in the US Department of Defense Trauma Registry(Do DTR).Our objective was to conduct a descriptive analysis of the injuries sustained by French SMs reported in the Do DTR and subsequent care provided to them to assist in understanding the importance of building a French Military trauma registry.Methods:Using Do DTR data collected from 2001 to 2017,a retrospective descriptive analysis was conducted.We identified 59 French SMs treated in US MTFs.The characteristics of the SMs’demographics,injuries,care provided to them,and discharge outcomes were summarized.Results:Among the 59 French SMs identified,46(78%)sustained battle injuries(BIs)and 13(22%)sustained nonbattle injuries(NBIs).There were 47(80%)SMs injured in Afghanistan(Opération Pamir),while 12(20%)were injured in Opération Chammal in Iraq and Syria.Explosives accounted for 52.5%of injuries,while 25.4%were due to gunshot wounds;all were BIs.The majority of reported injuries were penetrating(59.3%),most of which were BIs(71.7%).The mean Injury Severity Score for BIs was 12(SD=8.9)compared to 6(SD=1.7)for NBIs.Around half of SMs(n=30;51%)were injured in Afghanistan between the years 2008–2010.Among a total of 246 injuries sustained by 59 patients,extremities were the body part most prone to BIs followed by the head and face.Four SMs died after admission(6.8%).Conclusions:The Do DTR provides extensive data on trauma injuries that can be used to inform injury prevention and clinical care.The majority of injuries sustained by French SMs were BIs,caused by explosives,and predominantly occurring to the extremities;these findings are similar to those of other studies conducted in combat zones.There is a need to establish a French Military trauma registry to improve the combat casualty care provided to French SMs,and its creation may benefit from the Do DTR model. 展开更多
关键词 FRENCH SERVICE MEMBERS US MILITARY treatment facility TRAUMA REGISTRY
下载PDF
Optimization of Air Defense System Deployment Against Reconnaissance Drone Swarms 被引量:1
18
作者 Ning Li Zhenglian Su +2 位作者 Haifeng Ling Mumtaz Karatas Yujun Zheng 《Complex System Modeling and Simulation》 2023年第2期102-117,共16页
Due to their advantages in flexibility,scalability,survivability,and cost-effectiveness,drone swarms have been increasingly used for reconnaissance tasks and have posed great challenges to their opponents on modern ba... Due to their advantages in flexibility,scalability,survivability,and cost-effectiveness,drone swarms have been increasingly used for reconnaissance tasks and have posed great challenges to their opponents on modern battlefields.This paper studies an optimization problem for deploying air defense systems against reconnaissance drone swarms.Given a set of available air defense systems,the problem determines the location of each air defense system in a predetermined region,such that the cost for enemy drones to pass through the region would be maximized.The cost is calculated based on a counterpart drone path planning problem.To solve this adversarial problem,we first propose an exact iterative search algorithm for small-size problem instances,and then propose an evolutionary framework that uses a specific encoding-decoding scheme for large-size problem instances.We implement the evolutionary framework with six popular evolutionary algorithms.Computational experiments on a set of different test instances validate the effectiveness of our approach for defending against reconnaissance drone swarms. 展开更多
关键词 drone swarms anti-drone air defense systems deployment optimization evolutionary algorithms
原文传递
基于锥形掺镱光纤实现20 kW高光束质量激光输出 被引量:1
19
作者 肖虎 潘志勇 +15 位作者 陈子伦 马鹏飞 刘伟 杨欢 闫志平 王蒙 奚小明 李智贤 杨保来 杨林永 黄良金 黄值河 曹涧秋 王小林 王泽锋 陈金宝 《强激光与粒子束》 CAS CSCD 北大核心 2024年第1期94-96,共3页
锥形光纤能够有效兼顾非线性效应抑制和模式控制,具备实现高功率、高光束质量光纤激光的潜力。近期国防科技大学研制了锥形掺镱光纤,采用1 018 nm光纤激光后向级联泵浦实现了20.2 kW激光输出,光束质量β因子平均值优于2,拉曼抑制比为33... 锥形光纤能够有效兼顾非线性效应抑制和模式控制,具备实现高功率、高光束质量光纤激光的潜力。近期国防科技大学研制了锥形掺镱光纤,采用1 018 nm光纤激光后向级联泵浦实现了20.2 kW激光输出,光束质量β因子平均值优于2,拉曼抑制比为33 dB。研究结果展示了锥形光纤在实现万瓦级高光束质量激光方面的优势。 展开更多
关键词 光纤激光器 级联泵浦 锥形光纤 光束质量
下载PDF
基于组合圆锥构型的水下声学定位系统布站优化 被引量:1
20
作者 马顺南 路宇 +2 位作者 王炯琦 何章鸣 周萱影 《弹道学报》 CSCD 北大核心 2024年第2期10-20,共11页
在水下目标定位中,布站构型的共面约束会导致目标单点定位的几何精度因子(GDOP)理论最小值不能达到。为改善水下布站的观测矩阵,将单圆锥扩展为组合圆锥构型布站模式。然而,传统的优化算法易陷入局部最优且存在收敛效率低等问题。针对... 在水下目标定位中,布站构型的共面约束会导致目标单点定位的几何精度因子(GDOP)理论最小值不能达到。为改善水下布站的观测矩阵,将单圆锥扩展为组合圆锥构型布站模式。然而,传统的优化算法易陷入局部最优且存在收敛效率低等问题。针对以上问题,提出了一种改进的自适应粒子群算法。首先提出了一种有共面约束的水下声学定位系统组合圆锥构型,并证明了所提出的组合圆锥构型具有可叠加性、可旋转性以及GDOP旋转不变性;其次,针对布站优化指标单一的问题,构建了一种基于水下目标全局GDOP的布站优化准则;在此基础上提出了一种基于自适应粒子群的优化算法,并应用于组合圆锥构型下的水下声学定位系统布站优化。所提出的自适应粒子群算法能增强布站的全局最优性,提高算法收敛效率和水下目标的定位精度。 展开更多
关键词 水下声学定位 布站几何 组合圆锥构型 自适应粒子群算法 几何精度因子
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部