As the intensity of confrontation in the neighbourhood continues to escalate, the air defence threat facing our country is growing, and information-based air defence is facing unprecedented challenges. On the basis of...
详细信息
ISBN:
(数字)9798331522216
ISBN:
(纸本)9798331522223
As the intensity of confrontation in the neighbourhood continues to escalate, the air defence threat facing our country is growing, and information-based air defence is facing unprecedented challenges. On the basis of existing aviation detection means, comprehensive analysis of airborne targets is the primary task of exploring the laws of information-based air defence. Among them, the civil-military identification of flying targets is crucial to the military's operational decision-making and battlefield control. Hence, this study focuses on trajectory signal processing, machine learning intelligent recognition based on manual sequence features, and improvement of TSFRESH feature extraction to enhance its timeliness. Specifically, we design a rule-based filtering method to effectively remove wild-value data from the original trajectory data. And then we propose a support vector machine model based on manual sequence features. Effective trajectory features are extracted based on TSFRESH, and the support vector machine model is used to achieve the classification of military and civilian aircraft. Meanwhile to shorten the TSFRESH feature extraction time, we use the mutual information method to downscale the extracted features to speed up the classification time. Experiments show that this method can achieve the task of classifying military and civilian aircraft based on trajectory information and significantly reduce the running time.
Threshold ring signature confirms that t signers are participating in the signature and keep them anonymous. It is a generalization of ring signature, and has many important applications such as whistleblower, e-votin...
详细信息
We investigate tolerant testing and distance estimation problems in distribution testing when the amount of memory is limited. In particular, our aim is to provide a good estimate of the distance measure (in total var...
详细信息
The climate of contemporary instruction is changing because of the fast improvement of instructive methodologies. This review looks at a scope of new instructive innovations, including their purposes, benefits, hardsh...
详细信息
Cybersecurity is critical in today’s digital world, where the severity of threats from software vulnerabilities grows significantly each year. Many techniques have been developed to analyze vulnerabilities in source ...
详细信息
Audio deepfake refers to the technology of synthesizing speech using deep learning or large model algorithms. Compared to human voice, synthetic deepfake speech exhibits artifacts at global and local levels, which can...
详细信息
In this paper, we construct Error-Correcting Graph Codes. An error-correcting graph code of distance δ is a family C of graphs, on a common vertex set of size n, such that if we start with any graph in C, we would ha...
详细信息
This paper presents a novel pipeline for estimating room layouts and reconstructing the 3D shapes of indoor objects. This task remains challenging due to occlusions of indoor scenes, which lead to incomplete shape and...
详细信息
Audio-to-talking face generation stands at the forefront of advancements in generative AI. It bridges the gap between audio and visual representations by generating synchronized and realistic talking faces. Despite re...
详细信息
Linear time-invariant (LTI) electrically small antennas have high radiation quality factors, leading to a challenging tradeoff between efficiency and bandwidth. Bandwidth limitations distort broadband signals, limitin...
详细信息
暂无评论