In order to solve the problem of effectiveness evaluation of military communication network (MCN) under complex application conditions, an intelligent evaluation method based on BP neural network is proposed. Based on...
详细信息
Cloud manufacturing (CMfg), integrating distributed manufacturing resources as services to cloud center, aims at intelligent, green, and economic customized manufacturing. The optimal composition of services to fulfil...
详细信息
In the increasingly systematic and networked environment of aerospace equipment, the space-based information service capability is not only affected by the platform and payload capacity of the mission spacecraft, but ...
详细信息
In order to study changes in the effectiveness of reconnaissance satellite system (RSS) in supporting maritime operations, based on the key factors of dynamic confrontation system of the offensive and defensive partie...
详细信息
Aiming at the complexity of space-based information system (SIS) effectiveness evaluation and the coupling and interaction of various combat capabilities, a data-driven operational effectiveness evaluation model is pr...
详细信息
In this paper a method is introduced to simulate the complexsystem by ABMS. space system can be considered a complexsystem that is composed of many satellites,which need a powerful and flexible method to study, MAS ...
详细信息
Following the high-speed development of information technology,we increasingly attach important to the information *** development of independent self-controlled SW&HW(software and hardware) was *** to the faultin...
详细信息
Following the high-speed development of information technology,we increasingly attach important to the information *** development of independent self-controlled SW&HW(software and hardware) was *** to the faultiness of independent self-controlled industry,the integration and verification of foundational SW&HW must be largely *** the basis of analyzing the whole process of integration and verification of foundational SW&HW,the technologysystem was advanced,and the process,the content and the flow were provided,and the environment of integration and verification was constructed.
Focused on scale problems, this study demonstrated the importance of scale system selection, and necessity of scale system evaluation. The mutually exclusivity of complete consistency under different scale systems has...
详细信息
ISBN:
(纸本)9781618040169
Focused on scale problems, this study demonstrated the importance of scale system selection, and necessity of scale system evaluation. The mutually exclusivity of complete consistency under different scale systems has been proved using mathematical contradiction method, and conclusions with practical significances has been obtained through experimental method in this study that the exponential scale is more reasonable than other scales in reciprocal scale system. Although there are some errors exist in the method used by this study, there are also certain practical significances for the analysis that how to increase the accuracy of AHP method.
There are many uncertainties in multiple-attribute decision making problems so that the reliability and correctness of decision making results depend on the scientifically and reasonably confirmation of attribute weig...
详细信息
ISBN:
(纸本)9781618040169
There are many uncertainties in multiple-attribute decision making problems so that the reliability and correctness of decision making results depend on the scientifically and reasonably confirmation of attribute weights. Combination assigning method based on optimal eigenvectors which uses multi-objective optimization to integrate subjective and objective weightings was presented in the study so that the limitations of both subjective assigning method and objective assigning method have been overcome. Furthermore, decision making model based on TOPSIS method was also established to obtain more reasonable and scientific method of weightings confirmation method for multi-attribute decision making problems.
The Internet of Things brings convenience to people’s lives and it is also vulnerable to external attacks due to its own vulnerability. For this reason, analyzing the vulnerability of the Internet of Things is very n...
详细信息
暂无评论