期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Adaptive dynamic reconfiguration mechanism of unmanned swarm topology based on an evolutionary game
1
作者 YU Minggang NIU Yanjie +4 位作者 LIU Xueda ZHANG Dongge ZHENG Peng HE Ming LUO Ling 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第3期598-614,共17页
Autonomous cooperation of unmanned swarms is the research focus on“new combat forces”and“disruptive technologies”in military fields.The mechanism design is the fundamental way to realize autonomous cooperation.Fac... Autonomous cooperation of unmanned swarms is the research focus on“new combat forces”and“disruptive technologies”in military fields.The mechanism design is the fundamental way to realize autonomous cooperation.Facing the realistic requirements of a swarm network dynamic adjustment under the background of high dynamics and strong confrontation and aiming at the optimization of the coordination level,an adaptive dynamic reconfiguration mechanism of unmanned swarm topology based on an evolutionary game is designed.This paper analyzes military requirements and proposes the basic framework of autonomous cooperation of unmanned swarms,including the emergence of swarm intelligence,information network construction and collaborative mechanism design.Then,based on the framework,the adaptive dynamic reconfiguration mechanism is discussed in detail from two aspects:topology dynamics and strategy dynamics.Next,the unmanned swarms’community network is designed,and the network characteristics are analyzed.Moreover,the mechanism characteristics are analyzed by numerical simulation,focusing on the impact of key parameters,such as cost,benefit coefficient and adjustment rate on the level of swarm cooperation.Finally,the conclusion is made,which is expected to provide a theoretical reference and decision support for cooperative mode design and combat effectiveness generation of unmanned swarm operations. 展开更多
关键词 unmanned swarm operation autonomous collaboration topology reconstruction evolutionary game
下载PDF
An executable modeling and analyzing approach to C4ISR architecture 被引量:3
2
作者 HE Hongyue ZHU Weixing +1 位作者 LI Ruiyang DENG Qiaoyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第1期109-117,共9页
To analyze the behavioral model of the command,control,communication,computer,intelligence,surveillance,reconnaissance(C4ISR)architecture,we propose an executable modeling and analyzing approach to it.First,the meta c... To analyze the behavioral model of the command,control,communication,computer,intelligence,surveillance,reconnaissance(C4ISR)architecture,we propose an executable modeling and analyzing approach to it.First,the meta concept model of the C4ISR architecture is introduced.According to the meta concept model,we construct the executable meta models of the C4ISR architecture by extending the meta models of fUML.Then,we define the concrete syntax and executable activity algebra(EAA)semantics for executable models.The semantics functions are introduced to translating the syntax description of executable models into the item of EAA.To support the execution of models,we propose the executable rules which are the structural operational semantics of EAA.Finally,an area air defense of the C4ISR system is used to illustrate the feasibility of the approach. 展开更多
关键词 COMMAND control communication computer INTELLIGENCE SURVEILLANCE reconnaissance(C4ISR)architecture meta model executable model algebraic semantics
下载PDF
A branch and price algorithm for the robust WSOS scheduling problem
3
作者 LI Ruiyang HE Ming +2 位作者 HE Hongyue WANG Zhixue YANG Cheng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第3期658-667,共10页
To analyze and optimize the weapon system of systems(WSOS)scheduling process,a new method based on robust capabilities for WSOS scheduling optimization is proposed.First,we present an activity network to represent the... To analyze and optimize the weapon system of systems(WSOS)scheduling process,a new method based on robust capabilities for WSOS scheduling optimization is proposed.First,we present an activity network to represent the military mission.The member systems need to be reasonably assigned to perform different activities in the mission.Then we express the problem as a set partitioning formulation with novel columns(activity flows).A heuristic branch-and-price algorithm is designed based on the model of the WSOS scheduling problem(WSOSSP).The algorithm uses the shortest resource-constrained path planning to generate robust activity flows that meet the capability requirements.Finally,we discuss this method in several test cases.The results show that the solution can reduce the makespan of the mission remarkably. 展开更多
关键词 weapon system of systems(WSOS) robust optimization scheduling decision BRANCH-AND-PRICE column generation
下载PDF
Dual Attribute Adversarial Camouflage toward camouflaged object detection 被引量:2
4
作者 Yang Wang Zheng Fang +3 位作者 Yun-fei Zheng Zhen Yang Wen Tong Tie-yong Cao 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第4期166-175,共10页
The object detectors can precisely detect the camouflaged object beyond human perception.The investigations reveal that the CNNs-based(Convolution Neural Networks)detectors are vulnerable to adversarial attacks.Some w... The object detectors can precisely detect the camouflaged object beyond human perception.The investigations reveal that the CNNs-based(Convolution Neural Networks)detectors are vulnerable to adversarial attacks.Some works can fool detectors by crafting the adversarial camouflage attached to the object,leading to wrong prediction.It is hard for military operations to utilize the existing adversarial camouflage due to its conspicuous appearance.Motivated by this,this paper proposes the Dual Attribute Adversarial Camouflage(DAAC)for evading the detection by both detectors and humans.Generating DAAC includes two steps:(1)Extracting features from a specific type of scene to generate individual soldier digital camouflage;(2)Attaching the adversarial patch with scene features constraint to the individual soldier digital camouflage to generate the adversarial attribute of DAAC.The visual effects of the individual soldier digital camouflage and the adversarial patch will be improved after integrating with the scene features.Experiment results show that objects camouflaged by DAAC are well integrated with background and achieve visual concealment while remaining effective in fooling object detectors,thus evading the detections by both detectors and humans in the digital domain.This work can serve as the reference for crafting the adversarial camouflage in the physical world. 展开更多
关键词 Adversarial camouflage Digital camouflage generation Visual concealment Object detection Adversarial patch
下载PDF
Network Protocol Recognition Based on Convolutional Neural Network 被引量:3
5
作者 Wenbo Feng Zheng Hong +3 位作者 Lifa Wu Menglin Fu Yihao Li Peihong Lin 《China Communications》 SCIE CSCD 2020年第4期125-139,共15页
How to correctly acquire the appropriate features is a primary problem in network protocol recognition field.Aiming to avoid the trouble of artificially extracting features in traditional methods and improve recogniti... How to correctly acquire the appropriate features is a primary problem in network protocol recognition field.Aiming to avoid the trouble of artificially extracting features in traditional methods and improve recognition accuracy,a network protocol recognition method based on Convolutional Neural Network(CNN)is proposed.The method utilizes deep learning technique,and it processes network flows automatically.Firstly,normalization is performed on the intercepted network flows and they are mapped into two-dimensional matrix which will be used as the input of CNN.Then,an improved classification model named Ptr CNN is built,which can automatically extract the appropriate features of network protocols.Finally,the classification model is trained to recognize the network protocols.The proposed approach is compared with several machine learning methods.Experimental results show that the tailored CNN can not only improve protocol recognition accuracy but also ensure the fast convergence of classification model and reduce the classification time. 展开更多
关键词 convolutional NEURAL NETWORK PROTOCOL RECOGNITION NETWORK FLOW CLASSIFICATION model
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部