Seabed geoacoustic parameters and associated uncertainties are important for sonar performance prediction and related applications, and the feasibility of jointly using pressure and vector fields to increase geoacoust...
详细信息
Based on three-channel SAR-GMTI system, the velocity and location of the deceptive moving target generated by single jammer are studied. Study result shows that both the deceptive stationary target and moving target c...
详细信息
ISBN:
(纸本)9781509043118
Based on three-channel SAR-GMTI system, the velocity and location of the deceptive moving target generated by single jammer are studied. Study result shows that both the deceptive stationary target and moving target can be considered as moving target, and the estimated azimuth location which has nothing to do with the setting value is the same as jammer.
Parallel coordinates can visualize multidimensional data efficiently,during to its shortage in displaying time-varying data,we present a new method to add time dimension,which can extend parallel coordinates into 3D s...
详细信息
Parallel coordinates can visualize multidimensional data efficiently,during to its shortage in displaying time-varying data,we present a new method to add time dimension,which can extend parallel coordinates into 3D space(3D-Parallel Coordinates)consisted of attribute,range and time *** that timevarying multidimensional data can be displayed as polygonal line cluster for recording and analyzing.A technique called clipping shade is taken to highlight datasets around the current time,and results reveal that 3D-Parallel Coordinates can effectively analyze attribute's time-varying character.
Analized the task and general form of the software management;pionted out the shortages of the software repository on *** introduced the Role-Based Access Control model(RBAC model) which was introduced into the constr...
详细信息
Analized the task and general form of the software management;pionted out the shortages of the software repository on *** introduced the Role-Based Access Control model(RBAC model) which was introduced into the construction of software repository service by combining with the requirement of security management about software repository.A hierarchical access control model based on RBAC was proposed,and it database of the software repository based on RBAC was *** effective application of this model in the process of software management can ensure the convenience of software distribution;and meanwhile it can effectively improve the security of the software packages.
The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty-network boundary partition and protection. These two problems are discussed in this paper. A method of multidim...
详细信息
ISBN:
(纸本)9781509051557
The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty-network boundary partition and protection. These two problems are discussed in this paper. A method of multidimensional network boundary partition is proposed based on comprehensive analysis of existing schemes. And network boundary protection is studied based on standard rules of cyber warfare. Characteristic of network boundary protection technique is analyzed and methods are proposed about how to construct network boundary protection.
Heterogeneous multi-core platforms, e.g., ARM's ***, are a promising trend to improve the performance and energy efficiency of future mobile systems. However, the immediate benefits and the challenges to take adva...
详细信息
Downward-looking MIMO array 3-D synthetic aperture radar is a hot research recently, it overcomes the layover and can acquire more information with the affordable antenna elements. The multiple transmitters and receiv...
详细信息
In the evaluation of equipment system of systems(So S), equipment data has shown some new characters, such as big volume, wide range sources, and dynamic variance. The paper pointed out the idea to evaluate equipment ...
详细信息
ISBN:
(纸本)9781510803084
In the evaluation of equipment system of systems(So S), equipment data has shown some new characters, such as big volume, wide range sources, and dynamic variance. The paper pointed out the idea to evaluate equipment So S based on big data analysis techniques. The outline of the method is provided from two points of view, namely the big data processing techniques and equipment So S evaluation methods. Based on big data, equipment So S efficiency evaluation, counter evaluation, and other deeper level applications, such as intelligence processing and situation analysis, can be made. The method is a new method in the equipment So S evaluation field.
The main characteristic of FroBot is the dual-swing-legs propulsion mechanism, and it is necessary for us to conduct a series of experiments to study its propulsion model, both on land and underwater. As the propulsio...
详细信息
Under the background of system-of-systems (SoS) counterwork, it is more apparent that the simulation modeling of the equipment should be domain-specific, formal, automatic and composable. Current equipment effectivene...
详细信息
暂无评论