Excitation of Extremely Low Frequency (ELF)/Very Low Frequency (VLF) from ionosphere,which is artificial modulated by High Frequency (HF) waves can provide a way of antenna generation for deep submarine communication....
详细信息
The classification and visualization for surface objects receives a great deal of attention for high spectral dimensional data processing. A lot of methods were proposed and applied in this problem over the past decad...
详细信息
Reinforcement Learning(RL) is the main cognition and decision method of Agent since its adaptation and exploration ability to the unknown environment, but it cannot ensure the convergence for the multi-Agent situation...
详细信息
The pipeline network interfered by the stray currents has been verified to be a complex nonlinear dynamical *** paper shows that the chaotic characteristic could be utilized in the stray currents *** prove this,this p...
详细信息
ISBN:
(纸本)9781538629185
The pipeline network interfered by the stray currents has been verified to be a complex nonlinear dynamical *** paper shows that the chaotic characteristic could be utilized in the stray currents *** prove this,this paper establishes an equivalent chaotic control *** we analyze this model by using Melnikov method and find out the condition under which the chaotic phenomenon will be *** order to get a sufficient proof for identifying the conclusion,simulation experiments are used to verify the validity of the control method.
Multi-Resolution Model and simulation(MRMS) technology is an important Aspect in the complex large systemsimulation field with important value to decrease model computation complexity to increase the simulation effic...
详细信息
ISBN:
(纸本)9789811136719
Multi-Resolution Model and simulation(MRMS) technology is an important Aspect in the complex large systemsimulation field with important value to decrease model computation complexity to increase the simulation efficiency. Since the bottleneck of the MRMS at the aspect of Model consistence maintenance, aggregation-disaggregation(A/D) algorithm, chained disaggregation problem and so on, this paper proposed a non-consistence A/D MRMS method which won't seek overtop Model consistence and allows cross Resolution interaction at the accept range of caused errors. Introduced the basic idea and the Agent Model with the parameterization A/D algorithm and Battle simulation experiment of Weapon Equipment SoS was took to validate it. The result indicated the ability of performance increase and the simulation errors caused by A/D operation can be controlled, What's more, this technology is easy to realize and so threw away a brick for the development of the MRMS application.
In allusion to the three problems of conventional D-S(Dempster-Shafer) evidence theory, this paper proposes an improved Dempster fusion rule based on weight preprocessing. By comparing the fusion results with conventi...
详细信息
ISBN:
(纸本)9781510840232
In allusion to the three problems of conventional D-S(Dempster-Shafer) evidence theory, this paper proposes an improved Dempster fusion rule based on weight preprocessing. By comparing the fusion results with conventional method and other improved methods, we conclude that the method in this paper is more superior in dealing with uncertainty, and more reasonable in processing the evidence weight.
The vulnerability of network or information system is the inherent reason for the existence of security risks and security risks. External threats exploit the vulnerability of the network or information system to laun...
详细信息
The vulnerability of network or information system is the inherent reason for the existence of security risks and security risks. External threats exploit the vulnerability of the network or information system to launch attacks. Therefore, in the field of network security risk assessment technology, security vulnerability analysis takes an important position and is the basis for a network security risk assessment. This paper mainly reviews the research status of network security vulnerability analysis methods, network security quantitative evaluation method and real-time evaluation method of network security.
This paper proposed a novel attack-defend game based on failure rate and mean time to repair. The game method can exclude irrational strategies and take network availability loss into account. It can also reduce compu...
详细信息
This paper proposed a novel attack-defend game based on failure rate and mean time to repair. The game method can exclude irrational strategies and take network availability loss into account. It can also reduce computation complexity. The experiment validates the application of game model optimization and attack prediction, and discusses further expansion of the method.
With the increment of the scale of the network, the task of large-scale network data becomes more difficult. In the process of network drawing, it is difficult to fully reflect its internal structure. This study propo...
详细信息
With the increment of the scale of the network, the task of large-scale network data becomes more difficult. In the process of network drawing, it is difficult to fully reflect its internal structure. This study proposes to model the whole network as a multi-particle simulationsystem, experiment results show that the proposed method can effectively reduce the time complexity of the network layout algorithm and efficiently show the network structure characteristics.
The traditional analysis simulations are generally based on the time stepping mechanism in HLA. This method will greatly affect the simulation efficiency due to in a period of time no events occurred. This paper attem...
详细信息
ISBN:
(纸本)9781510840232
The traditional analysis simulations are generally based on the time stepping mechanism in HLA. This method will greatly affect the simulation efficiency due to in a period of time no events occurred. This paper attempts to simulate high-level missile attack and defense using discrete event simulationtechnology, avoiding the idle phenomenon. This paper modifies the state diagram modeling method's shortcomings, that is, events can not be generated from the activities and activities can not be detailed. According to this method, the radar reconnaissance and interference equipments and missiles in missile attack and defense are simulated by discrete events which prove the effectiveness of solving missile attack and defense problems.
暂无评论