By broadcasting false Global Navigation Satellite System (GNSS) signals, spoofing attacks will induce false position and time fixes within the victim receiver. In this article, we propose a Sparse Decomposition (SD)-b...
详细信息
With the development of military intelligence, higher requirements are put forward for automatic term recognition in military field. In view of the characteristics of flexible and diverse naming of military requiremen...
详细信息
Consensus control in multi-agent systems has received significant attention and practical implementation across various domains. However, managing consensus control under unknown dynamics remains a significant challen...
详细信息
For real-time edge systems such as autonomous driving,not only the correctness of task functions,but also the response and processing time of tasks should be *** the hardware selection phase of a real-time system,time...
详细信息
For real-time edge systems such as autonomous driving,not only the correctness of task functions,but also the response and processing time of tasks should be *** the hardware selection phase of a real-time system,time series analyses must be performed on the hardware platform running real-time *** present,the common method of worst-case execution time(WCET)analysis focuses mainly on analyzing the impact of hardware platform architecture or task execution process on the task running ***,different tasks in an autopilot system have different levels of urgency,and preemption between tasks is the main factor that affects the task execution *** key problem is how to quantify the time fluctuation caused by task preemption for each subtask of the autopilot system running on a fixed hardware *** paper presents a time analysis method for a real-time application based on a queuing theory and preemptive scheduling strategy,which assigns different priorities to tasks according to their time urgency and preemptive scheduling according to task *** an experimental case study,the impact of the running time of each subtask in a real-time application with task priority preemptive scheduling is analyzed,along with the impact of changes in hardware platform performance on such real-time applications.
To address the problem of aeroengine PID parameter optimization and tuning, this work employs the excellent performance of the sparrow search algorithm (SSA) with high convergence accuracy and fast convergence speed t...
详细信息
Due to the turbulent external business environment, the complexity of internal relations of the organization and the emergence of subversive IT roles, the business-IT alignment(BITA)has become increasingly difficult. ...
详细信息
Due to the turbulent external business environment, the complexity of internal relations of the organization and the emergence of subversive IT roles, the business-IT alignment(BITA)has become increasingly difficult. The unsuccessful realization of BITA will lead to the waste of organizational resources, the reduction of return on investment and eventually the loss of competitive advantage. In recent years, coevolution has received widespread attention due to its ability to describe the dynamic relationship between IT and business. Multiple principles such as quickening learning action loops and adopt suitable organizing principles for achieving business and IT coevolution(BITC) are obtained. However, the continuous BITC is still hard to be achieved because of the lack of complete BITC management. This paper focuses on the management process of the BITC and how to perform it gradually. A coevolution framework combines the enterprise architecture(EA) approach with the coevolution analysis is proposed, which contains the design of EA, the sensing and governance of the misalignment and the procedure of the EA misalignment *** steps for the governance and prevention of misalignment are discussed in particular. Through comparison with the principles,characteristics and methods of coevolution in the literature, the proposed framework is evaluated. The results show that the proposed framework is effective for BITC implementation.
With the increasing demand for space situational awareness and space environment monitoring, space target discovery, tracking, identification and classification technologies have been developed accordingly. At present...
With the increasing demand for space situational awareness and space environment monitoring, space target discovery, tracking, identification and classification technologies have been developed accordingly. At present, the integrated development of machine learning, artificial intelligence and other multidisciplinary disciplines has greatly promoted the progress of space target detection and identification technology. The inverse synthetic aperture radar image can reflect the fine structural features of space targets, which is important for feature extraction and recognition and classification of space targets. In this paper, three aspects of target recognition technologies based on RCS, HRRP and ISAR imaging are reviewed respectively, and the target recognition methods based on ISAR images are mainly discussed and validated. First, the basic problems and common methods of current RCS, HRRP, and ISAR image target recognition are introduced; then, a summary is made for ISAR image target recognition techniques; finally, the still existing problems of current ISAR image target recognition and the next development prospects are discussed.
Addressing the limited field of view of CMOS grayscale cameras, complex lighting conditions, and the paucity of image features in industrial applications, this paper proposes a novel image stitching method for CMOS gr...
详细信息
Based on rectangular partition and bilinear interpolation,we construct an alternating-direction implicit(ADI)finite volume element method,which combined the merits of finite volume element method and alternating direc...
详细信息
Based on rectangular partition and bilinear interpolation,we construct an alternating-direction implicit(ADI)finite volume element method,which combined the merits of finite volume element method and alternating direction implicit method to solve a viscous wave equation with variable *** paper presents a general procedure to construct the alternating-direction implicit finite volume element method and gives computational *** error estimate in L2 norm is obtained for the *** with the finite volume element method of the same convergence order,our method is more effective in terms of running time with the increasing of the computing *** experiments are presented to show the efficiency of our method and numerical results are provided to support our theoretical analysis.
A C2 computing framework for unmanned systems to perform complex tasks is proposed using methods of system of systems engineering, which is formed by combining the macro-scale command and control (C2) process mechanis...
详细信息
A C2 computing framework for unmanned systems to perform complex tasks is proposed using methods of system of systems engineering, which is formed by combining the macro-scale command and control (C2) process mechanism model (PREA loop) and micro-scale C2 process mechanism model (OODA loop). Guided by PREA loop and OODA loop, the computing framework is divided into four steps and three kinds of transformations. The four steps are design, construction, operation monitoring, and assessment. The three transformations are tactical feedback, campaign feedback, and strategic feedback. A C2 organization model of joint landing combat force is established against the background of a typical complex task of joint landing operation, and the C2 computing framework based on the PREA &OODA is used to implement the C2 activities of the joint landing combat force. The influence of the computing framework on the performance of unmanned systems under different task conditions is verified, including task coordination load, task efficiency and sensitivity of unmanned systems response. Authors
暂无评论