期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
A capture probability analytic model for the electromagnetic launched anti-torpedo torpedo 被引量:1
1
作者 Bao-qi Wu Xiao-cun Guan +1 位作者 Shao-hua Guan Jing-bin Shi 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2022年第2期261-270,共10页
With the unique characteristics,electromagnetic launch technology is applicable to launch shipborne anti-torpedo torpedo(ATT).This paper aims to establish an analytic model to pre-evaluate the capture probability of t... With the unique characteristics,electromagnetic launch technology is applicable to launch shipborne anti-torpedo torpedo(ATT).This paper aims to establish an analytic model to pre-evaluate the capture probability of the electromagnetic launched ATT.The mathematics model of the multi-stage coilgun and the trajectory of the ATT is established for analysis.The influence factors of the capture probability are analyzed respectively,including the entry point dispersion of the ATT and the position dispersion of the incoming torpedo.Adopting the advanced angle interception mode,the ATT search model is obtained according to the positional relationship,and the course error is synthetically calculated according to the differentiation of implicit function.A geometric method to calculate the integral boundaries of the probability density function is proposed,based on the relative motion of the ATT and the incoming target.To verify the proposed integral model,the digital simulation and comparison is conducted.The results reveal that the variation trends and the calculation value of the proposed analytic model are coincident with the statistic results from Monte Carlo method.And implications of the results regarding the analytic model are discussed. 展开更多
关键词 Electromagnetic launch Anti-torpedo torpedo Analytic model Dispersion variance Integral boundary
下载PDF
Interception probability simulation and analysis of salvo of two electromagnetic coil launched anti-torpedo torpedoes 被引量:1
2
作者 Bao-qi Wu Guang-sen Wang +1 位作者 Xiao-cun Guan Biao Wu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2022年第11期2065-2073,共9页
Electromagnetic coil launch is an important branch of electromagnetic launch(EML)technology,which is suitable for launching anti-torpedo torpedo(ATT).This paper focuses on the EML parameters and the interception proba... Electromagnetic coil launch is an important branch of electromagnetic launch(EML)technology,which is suitable for launching anti-torpedo torpedo(ATT).This paper focuses on the EML parameters and the interception probability of the EML two ATTs salvo.Based on the launching model of a multi-stage coil launcher,the trajectory model of the ATT and the attacking torpedo,a calculation method for the EML two ATTs salvo parameters is proposed,with the conditions of capture and interception given reasonably.An adaptive particle swarm optimization(APSO)algorithm is proposed to calculate the optimal launching parameters,by designing the adaptive inertia weight and time-varying study factors.According to the analysis of the simulation with Monte Carlo method,EML will improve the interception probability effectively,and the interception probability is affected by the launching range.The results demonstrate good performance of the proposed APSO in calculating EML parameters for the two ATTs salvo in certain combat situation.Implications of these results are particular regarding the command and decision in the anti-torpedo combat. 展开更多
关键词 Interception probability Electromagnetic coil launch Anti-torpedo torpedo Adaptive PSO
下载PDF
Physical Frame Time-Slot Switching-A New Switching Technique over DWDM
3
作者 许登元 窦军 涂建平 《Journal of Electronic Science and Technology of China》 2005年第3期208-212,263,共6页
A novel technique called physical frame time-slot switching (PFTS) is discussed and its technical and application aspects are analyzed. The format of the ethernet media access control (MAC) frame is borrowed in de... A novel technique called physical frame time-slot switching (PFTS) is discussed and its technical and application aspects are analyzed. The format of the ethernet media access control (MAC) frame is borrowed in defining the physical frame for PFTS and the transmission time for the maximum size of the MAC frame is defined as a physical frame time-slot (PFT). Consequently, user data can be fed into PFTS and switched in a single layer sub-network in an asynchronous mode. 展开更多
关键词 physical frame time-slot switching three dimension ethernet MAN ethernet-like physical frame single user plane architecture
下载PDF
An adaptive distributed auction algorithm and its application to multi-AUV task assignment
4
作者 WANG Yu LI HuiPing YAO Yao 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2023年第5期1235-1244,共10页
The task assignment of multi-agent system has attracted considerable attention;however,the contradiction between computational complexity and assigning performance remains to be resolved.In this paper,a novel consensu... The task assignment of multi-agent system has attracted considerable attention;however,the contradiction between computational complexity and assigning performance remains to be resolved.In this paper,a novel consensus-based adaptive optimization auction(CAOA)algorithm is proposed to greatly reduce the computation load while attaining enhanced system payoff.A new optimization scheme is designed to optimize the critical control parameter in the price update role of auction algorithm which can reduce the searching complexity in obtaining a better bidding price.With this new scheme,the CAOA algorithm is designed.Then the developed algorithm is applied to the multi-AUV task assignment problem for underwater detection mission in complex environments.The simulation and comparison studies verify the effectiveness and advantage of the CAOA algorithm. 展开更多
关键词 task assignment multi-agent systems consensus-based adaptive optimization auction intelligent algorithm multiple AUVs
原文传递
FAANet: feature-aligned attention network for real-time multiple object tracking in UAV videos 被引量:3
5
作者 梁振起 王景石 +1 位作者 肖刚 曾柳 《Chinese Optics Letters》 SCIE EI CAS CSCD 2022年第8期6-11,共6页
Multiple object tracking(MOT)in unmanned aerial vehicle(UAV)videos has attracted attention.Because of the observation perspectives of UAV,the object scale changes dramatically and is relatively small.Besides,most MOT ... Multiple object tracking(MOT)in unmanned aerial vehicle(UAV)videos has attracted attention.Because of the observation perspectives of UAV,the object scale changes dramatically and is relatively small.Besides,most MOT algorithms in UAV videos cannot achieve real-time due to the tracking-by-detection paradigm.We propose a feature-aligned attention network(FAANet).It mainly consists of a channel and spatial attention module and a feature-aligned aggregation module.We also improve the real-time performance using the joint-detection-embedding paradigm and structural re-parameterization technique.We validate the effectiveness with extensive experiments on UAV detection and tracking benchmark,achieving new state-of-the-art 44.0 MOTA,64.6 IDF1 with 38.24 frames per second running speed on a single 1080Ti graphics processing unit. 展开更多
关键词 multiple object tracking unmanned aerial vehicle feature alignment deep learning
原文传递
A Class of Second-Order Consensus Protocol in Multi-Agent Systems with Multiple Input Delays 被引量:2
6
作者 WU Huai GAO Kai AN Baoran 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2019年第5期1280-1289,共10页
This paper is concerned with the consensus problems for second-order multi-agent systems with multiple input delays. Different from all standard consensus algorithms with uniform delays, the authors aim to find the la... This paper is concerned with the consensus problems for second-order multi-agent systems with multiple input delays. Different from all standard consensus algorithms with uniform delays, the authors aim to find the largest input-delay margin which can guarantee the consensus for the case when delays are nonuniform. Based on frequency domain analysis and matrix theory, an upper bound for maximum tolerable input-delay is given in terms of the relationship with scaling strengths and largest eigenvalue of the Lapalician matrix. Simulation results are provided to illustrate the obtained results. 展开更多
关键词 CONSENSUS MULTIPLE input DELAYS SECOND-ORDER MULTI-AGENT systems
原文传递
Finite-time coordinated path-following control of leader-following multi-agent systems 被引量:2
7
作者 Weibin CHEN Yangyang CHEN Ya ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第10期1511-1521,共11页
This paper presents applications of the continuous feedback method to achieve path-following and a formation moving along the desired orbits within a finite time.It is assumed that the topology for the virtual leader ... This paper presents applications of the continuous feedback method to achieve path-following and a formation moving along the desired orbits within a finite time.It is assumed that the topology for the virtual leader and followers is directed.An additional condition of the so-called barrier function is designed to make all agents move within a limited area.A novel continuous finite-time path-following control law is first designed based on the barrier function and backstepping.Then a novel continuous finite-time formation algorithm is designed by regarding the path-following errors as disturbances.The settling-time properties of the resulting system are studied in detail and simulations are presented to validate the proposed strategies. 展开更多
关键词 FINITE-TIME Coordinated path-following Multi-agent systems Barrier function
原文传递
An incremental software architecture recovery technique driven by code changes
8
作者 Li WANG Xianglong KONG +1 位作者 Jiahui WANG Bixin LI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第5期664-677,共14页
It is difficult to keep software architecture up to date with code changes during software evolution.Inconsistency is caused by the limitations of standard development specifications and human power resources,which ma... It is difficult to keep software architecture up to date with code changes during software evolution.Inconsistency is caused by the limitations of standard development specifications and human power resources,which may impact software maintenance.To solve this problem,we propose an incremental software architecture recovery(ISAR)technique.Our technique obtains dependency information from changed code blocks and identifies different strength-level dependencies.Then,we use double classifiers to recover the architecture based on the method of mapping code-level changes to architecture-level updates.ISAR is evaluated on 10 open-source projects,and the results show that it performs more effectively and efficiently than the compared techniques.We also find that the impact of low-quality architectural documentation on effectiveness remains stable during software evolution. 展开更多
关键词 Architecture recovery Software evolution Code change
原文传递
Differential Privacy Trajectory Protection Method Based on Spatiotemporal Correlation
9
作者 Kangkang Dou Jian Liu 《国际计算机前沿大会会议论文集》 2020年第2期151-166,共16页
Location-based services provide service and convenience,while causing the leakage of track privacy.The existing trajectory privacy protection methods lack the consideration of the correlation between the noise sequenc... Location-based services provide service and convenience,while causing the leakage of track privacy.The existing trajectory privacy protection methods lack the consideration of the correlation between the noise sequence,the user’s original trajectory sequence,and the published trajectory sequence.And they are susceptible to noise filtering attacks using filtering methods.In view of this problem,a differential privacy trajectory protection method based on spatiotemporal correlation is proposed in this paper.With this method,the concept of correlation function was introduced to establish the correlation constraint of release track sequence,and the least square method was used to fit the user’s original track and the overall direction of noise sequence to construct noise candidate set.It ensured that the added noise sequence has spatiotemporal correlation with the user’s original track sequence and release track sequence.Also,it effectively resists attackers’denoising attacks,and reduces the risk of trajectory privacy leakage.Finally,comparative experiments were carried out on the real data sets.The experimental results show that this method effectively improves the privacy protection effect and the data availability of the release track,and it also has better practicability. 展开更多
关键词 Location-Based Services Trajectory privacy protection Spatiotemporal correlation Cross-correlation constraints Noise candidate set
原文传递
V2V Online Data Offloading Method Based on Vehicle Mobility
10
作者 Xianlang Hu Dafang Zhang +2 位作者 Shizhao Zhao Guangsheng Feng Hongwu Lv 《国际计算机前沿大会会议论文集》 2020年第1期44-60,共17页
As people are accustomed to getting information in the vehicles,mobile data offloading through Vehicular Ad Hoc Networks(VANETs)becomes prevalent nowadays.However,the impacts caused by the vehicle mobility(such as the... As people are accustomed to getting information in the vehicles,mobile data offloading through Vehicular Ad Hoc Networks(VANETs)becomes prevalent nowadays.However,the impacts caused by the vehicle mobility(such as the relative speed and direction between vehicles)have great effects on mobile data offloading.In this paper,a V2V online data offloading method is proposed based on vehicle mobility.In this mechanism,the network service process was divided into continuous and equal-sized time slots.Data were transmitted in a multicast manner for the sake of fairness.The data offloading problem was formalized to maximize the overall satisfaction of the vehicle users.In each time slot,a genetic algorithm was used to solve the maximizing problem to obtain a mobile data offloading strategy.And then,the performance of the algorithm was enhanced by improving the algorithm.The experiment results show that vehicle mobility has a great effect on mobile data offloading,and the mobile data offloading method proposed in the paper is effective. 展开更多
关键词 Vehicular Ad Hoc Networks Mobile data offloading Vehicle mobility Multicast manner Genetic algorithm
原文传递
Near-Optimal Transmission Optimization of Cache-Based SVC Vehicle Video
11
作者 Xianlang Hu He Dong +3 位作者 Xiangrui Kong Ruibing Li Guangsheng Feng Hongwu Lv 《国际计算机前沿大会会议论文集》 2020年第1期341-353,共13页
A problem of video streaming of scalable video coding(SVC)is studied in vehicular networks.To improve the performance of the video streaming services and alleviate the pressure on backhaul links,the small cell base st... A problem of video streaming of scalable video coding(SVC)is studied in vehicular networks.To improve the performance of the video streaming services and alleviate the pressure on backhaul links,the small cell base stations(SBS)is proposed with caching ability to assist the content delivery.In this paper,it introduced the problem of joint optimization of caching strategy and transmission path in SBS cache cluster.An integer programming problem was formulated to maximize the average quality of experience.In order to obtain the globally optimal solution,the primal problem was first relaxed,then an adaptive algorithm was used based on the joint KKT condition,and the branch definition algorithm was applied.Extensive simulations were performed to demonstrate the efficiency of our proposed caching strategy. 展开更多
关键词 SVC CACHE Transmission method Vehicle video
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部