With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 pre...With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 presents a new business model of“Internet of everything,intelligent leading,data driving,shared services,cross-border integration,and universal innovation”.The network boundaries are becoming increasingly blurred,NCMS is facing security risks such as equipment unauthorized use,account theft,static and extensive access control policies,unauthorized access,supply chain attacks,sensitive data leaks,and industrial control vulnerability attacks.Traditional security architectures mainly use information security technology,which cannot meet the active security protection requirements of NCMS.In order to solve the above problems,this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS.It adopts the zero trust concept and effectively integrates multiple security capabilities such as network,equipment,cloud computing environment,application,identity,and data.It adopts a new access control mode of“continuous verification+dynamic authorization”,classified access control mechanisms such as attribute-based access control,rolebased access control,policy-based access control,and a new data security protection system based on blockchain,achieving“trustworthy subject identity,controllable access behavior,and effective protection of subject and object resources”.This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises,and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations.展开更多
To address the current problems of poor generality,low real-time,and imperfect information transmission of the battlefield target intelligence system,this paper studies the battlefield target intelligence system from ...To address the current problems of poor generality,low real-time,and imperfect information transmission of the battlefield target intelligence system,this paper studies the battlefield target intelligence system from the top-level perspective of multi-service joint warfare.First,an overall planning and analysis method of architecture modeling is proposed with the idea of a bionic analogy for battlefield target intelligence system architecture modeling,which reduces the difficulty of the planning and design process.The method introduces the Department of Defense architecture framework(DoDAF)modeling method,the multi-living agent(MLA)theory modeling method,and other combinations for planning and modeling.A set of rapid planning methods that can be applied to model the architecture of various types of complex systems is formed.Further,the liveness analysis of the battlefield target intelligence system is carried out,and the problems of the existing system are presented from several aspects.And the technical prediction of the development and construction is given,which provides directional ideas for the subsequent research and development of the battlefield target intelligence system.In the end,the proposed architecture model of the battlefield target intelligence system is simulated and verified by applying the colored Petri nets(CPN)simulation software.The analysis demonstrates the reasonable integrity of its logic.展开更多
Radio frequency identification (RFID) has prominent advantages compared with other autoidentification technologies. Combining RFID with network technology, physical object tracking and information sharing can possib...Radio frequency identification (RFID) has prominent advantages compared with other autoidentification technologies. Combining RFID with network technology, physical object tracking and information sharing can possibly be carried out in an innovative way. Regarding open-loop RFID applications, RFID public services infrastructure (PSI) is presented, PSI architecture is designed, and service modules are implemented, and a demonstrative application system, blood management and traceability system, is studied to verify PSI. Experimental results show the feasibility of the proposed architecture and the usability of PSI framework software.展开更多
In this paper,a novel method of ultra-lightweight convolution neural network(CNN)design based on neural architecture search(NAS)and knowledge distillation(KD)is proposed.It can realize the automatic construction of th...In this paper,a novel method of ultra-lightweight convolution neural network(CNN)design based on neural architecture search(NAS)and knowledge distillation(KD)is proposed.It can realize the automatic construction of the space target inverse synthetic aperture radar(ISAR)image recognition model with ultra-lightweight and high accuracy.This method introduces the NAS method into the radar image recognition for the first time,which solves the time-consuming and labor-consuming problems in the artificial design of the space target ISAR image automatic recognition model(STIIARM).On this basis,the NAS model’s knowledge is transferred to the student model with lower computational complexity by the flow of the solution procedure(FSP)distillation method.Thus,the decline of recognition accuracy caused by the direct compression of model structural parameters can be effectively avoided,and the ultralightweight STIIARM can be obtained.In the method,the Inverted Linear Bottleneck(ILB)and Inverted Residual Block(IRB)are firstly taken as each block’s basic structure in CNN.And the expansion ratio,output filter size,number of IRBs,and convolution kernel size are set as the search parameters to construct a hierarchical decomposition search space.Then,the recognition accuracy and computational complexity are taken as the objective function and constraint conditions,respectively,and the global optimization model of the CNN architecture search is established.Next,the simulated annealing(SA)algorithm is used as the search strategy to search out the lightweight and high accuracy STIIARM directly.After that,based on the three principles of similar block structure,the same corresponding channel number,and the minimum computational complexity,the more lightweight student model is designed,and the FSP matrix pairing between the NAS model and student model is completed.Finally,by minimizing the loss between the FSP matrix pairs of the NAS model and student model,the student model’s weight adjustment is completed.Thus the ultra-lightweight and high accuracy STIIARM is obtained.The proposed method’s effectiveness is verified by the simulation experiments on the ISAR image dataset of five types of space targets.展开更多
In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork model...In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork modeling approach for the OAADS is put for- ward by extending granular computing. Based on that operational units and links are equal to different information granularities, the supernetwork framework of the OAADS is constructed as a “four- network within two-layer” structure by forming dynamic operating coalitions, and measuring indexes of the ripple-effect analysis for the OAADS are given combining with Laplace spectral radius. In this framework, via analyzing multidimensional attributes which inherit relations between operational units in different granular scales, an extended granular computing is put forward integrating with a topological structure. Then the operation process within the supernetwork framework, including transformation relations be- tween two layers in the vertical view and mapping relations among functional networks in the horizontal view, is studied in quantity. As the application case shows, comparing with previous modeling approaches, the supernetwork model can validate and analyze the operation mechanism in the air defense architecture, and the ripple-effect analysis can be used to confirm the key operational unit with micro and macro viewpoints.展开更多
To improve the agility, dynamics, composability, reusability, and development efficiency restricted by monolithic federation object model (FOM), a modular FOM is proposed by high level architecture (HLA) evolved p...To improve the agility, dynamics, composability, reusability, and development efficiency restricted by monolithic federation object model (FOM), a modular FOM is proposed by high level architecture (HLA) evolved product development group. This paper reviews the state-of-the-art of HLA evolved modular FOM. In particular, related concepts, the overall impact on HLA standards, extension principles, and merging processes are discussed. Also permitted and restricted combinations, and merging rules are provided, and the influence on HLA interface specification is given. The comparison between modular FOM and base object model (BOM) is performed to illustrate the importance of their combination. The applications of modular FOM are summarized. Finally, the significance to facilitate compoable simulation both in academia and practice is presented and future directions are pointed out.展开更多
To analyze the behavioral model of the command,control,communication,computer,intelligence,surveillance,reconnaissance(C4ISR)architecture,we propose an executable modeling and analyzing approach to it.First,the meta c...To analyze the behavioral model of the command,control,communication,computer,intelligence,surveillance,reconnaissance(C4ISR)architecture,we propose an executable modeling and analyzing approach to it.First,the meta concept model of the C4ISR architecture is introduced.According to the meta concept model,we construct the executable meta models of the C4ISR architecture by extending the meta models of fUML.Then,we define the concrete syntax and executable activity algebra(EAA)semantics for executable models.The semantics functions are introduced to translating the syntax description of executable models into the item of EAA.To support the execution of models,we propose the executable rules which are the structural operational semantics of EAA.Finally,an area air defense of the C4ISR system is used to illustrate the feasibility of the approach.展开更多
The flexibility of traditional image processing system is limited because those system are designed for specific applications. In this paper, a new TMS320C64x-based multi-DSP parallel computing architecture is present...The flexibility of traditional image processing system is limited because those system are designed for specific applications. In this paper, a new TMS320C64x-based multi-DSP parallel computing architecture is presented. It has many promising characteristics such as powerful computing capability, broad I/O bandwidth, topology flexibility, and expansibility. The parallel system performance is evaluated by practical experiment.展开更多
How to recognize targets with similar appearances from remote sensing images(RSIs) effectively and efficiently has become a big challenge. Recently, convolutional neural network(CNN) is preferred in the target classif...How to recognize targets with similar appearances from remote sensing images(RSIs) effectively and efficiently has become a big challenge. Recently, convolutional neural network(CNN) is preferred in the target classification due to the powerful feature representation ability and better performance. However,the training and testing of CNN mainly rely on single machine.Single machine has its natural limitation and bottleneck in processing RSIs due to limited hardware resources and huge time consuming. Besides, overfitting is a challenge for the CNN model due to the unbalance between RSIs data and the model structure.When a model is complex or the training data is relatively small,overfitting occurs and leads to a poor predictive performance. To address these problems, a distributed CNN architecture for RSIs target classification is proposed, which dramatically increases the training speed of CNN and system scalability. It improves the storage ability and processing efficiency of RSIs. Furthermore,Bayesian regularization approach is utilized in order to initialize the weights of the CNN extractor, which increases the robustness and flexibility of the CNN model. It helps prevent the overfitting and avoid the local optima caused by limited RSI training images or the inappropriate CNN structure. In addition, considering the efficiency of the Na¨?ve Bayes classifier, a distributed Na¨?ve Bayes classifier is designed to reduce the training cost. Compared with other algorithms, the proposed system and method perform the best and increase the recognition accuracy. The results show that the distributed system framework and the proposed algorithms are suitable for RSIs target classification tasks.展开更多
A virtual reconfigurable architecture(VRA)-based evolvable hardware is proposed for automatic synthesis of combinational logic circuits at gate-level.The proposed VRA is implemented by a Celoxica RC1000 peripheral com...A virtual reconfigurable architecture(VRA)-based evolvable hardware is proposed for automatic synthesis of combinational logic circuits at gate-level.The proposed VRA is implemented by a Celoxica RC1000 peripheral component interconnect(PCI)board with an Xilinx Virtex xcv2000E field programmable gate array(FPGA).To improve the quality of the evolved circuits,the VRA works through a two-stage evolution: finding a functional circuit and minimizing the number of logic gates used in a feasible circuit.To optimize the algorithm performance in the two-stage evolutionary process and set free the user from the time-consuming process of mutation parameter tuning,a self-adaptive mutation rate control(SAMRC)scheme is introduced.In the evolutionary process,the mutation rate control parameters are encoded as additional genes in the chromosome and also undergo evolutionary operations.The efficiency of the proposed methodology is tested with the evolutions of a 4-bit even parity function,a 2-bit multiplier,and a 3-bit multiplier.The obtained results demonstrate that our scheme improves the evolutionary design of combinational logic circuits in terms of quality of the evolved circuit as well as the computational effort,when compared to the existing evolvable hardware approaches.展开更多
The contribution rate of equipment system-of-systems architecture(ESoSA)is an important index to evaluate the equipment update,development,and architecture optimization.Since the traditional ESoSA contribution rate ev...The contribution rate of equipment system-of-systems architecture(ESoSA)is an important index to evaluate the equipment update,development,and architecture optimization.Since the traditional ESoSA contribution rate evaluation method does not make full use of the fuzzy information and uncertain information in the equipment system-of-systems(ESoS),and the Bayesian network is an effective tool to solve the uncertain information,a new ESoSA contribution rate evaluation method based on the fuzzy Bayesian network(FBN)is proposed.Firstly,based on the operation loop theory,an ESoSA is constructed considering three aspects:reconnaissance equipment,decision equipment,and strike equipment.Next,the fuzzy set theory is introduced to construct the FBN of ESoSA to deal with fuzzy information and uncertain information.Furthermore,the fuzzy importance index of the root node of the FBN is used to calculate the contribution rate of the ESoSA,and the ESoSA contribution rate evaluation model based on the root node fuzzy importance is established.Finally,the feasibility and rationality of this method are validated via an empirical case study of aviation ESoSA.Compared with traditional methods,the evaluation method based on FBN takes various failure states of equipment into consideration,is free of acquiring accurate probability of traditional equipment failure,and models the uncertainty of the relationship between equipment.The proposed method not only supplements and improves the ESoSA contribution rate assessment method,but also broadens the application scope of the Bayesian network.展开更多
In this paper,we consider a multi-UAV surveillance scenario where a team of unmanned aerial vehicles(UAVs)synchronously covers an area for monitoring the ground conditions.In this scenario,we adopt the leader-follower...In this paper,we consider a multi-UAV surveillance scenario where a team of unmanned aerial vehicles(UAVs)synchronously covers an area for monitoring the ground conditions.In this scenario,we adopt the leader-follower control mode and propose a modified Lyapunov guidance vector field(LGVF)approach for improving the precision of surveillance trajectory tracking.Then,in order to adopt to poor communication conditions,we propose a prediction-based synchronization method for keeping the formation consistently.Moreover,in order to adapt the multi-UAV system to dynamic and uncertain environment,this paper proposes a hierarchical dynamic task scheduling architecture.In this architecture,we firstly classify all the algorithms that perform tasks according to their functions,and then modularize the algorithms based on plugin technology.Afterwards,integrating the behavior model and plugin technique,this paper designs a three-layer control flow,which can efficiently achieve dynamic task scheduling.In order to verify the effectiveness of our architecture,we consider a multi-UAV traffic monitoring scenario and design several cases to demonstrate the online adjustment from three levels,respectively.展开更多
Combat system effectiveness simulation (CSES) is a special type of complex system simulation. Three non-functional requirements (NFRs), i.e. model composability, domain specific modeling, and model evolvability, are g...Combat system effectiveness simulation (CSES) is a special type of complex system simulation. Three non-functional requirements (NFRs), i.e. model composability, domain specific modeling, and model evolvability, are gaining higher priority from CSES users when evaluating different modeling methodologies for CSES. Traditional CSES modeling methodologies are either domain-neutral (lack of domain characteristics consideration and limited support for model composability) or domain-oriented (lack of openness and evolvability) and fall short of the three NFRs. Inspired by the concept of architecture in systems engineering and software engineering fields, we extend it into a concept of model architecture for complex simulation systems, and propose a model architecture-oriented modeling methodology in which the model architecture plays a central role in achieving the three NFRs. Various model-driven engineering (MDE) approaches and technologies, including simulation modeling platform (SMP), unified modeling language (UML), domain specific modeling (DSM), eclipse modeling framework (EMF), graphical modeling framework (GMF), and so forth, are applied where possible in representing the CSES model architecture and its components' behaviors from physical and cognitive domain aspects. A prototype CSES system, called weapon effectiveness simulation system (WESS), and a non-trivial air-combat simulation example are presented to demonstrate the methodology.展开更多
From the view of information flow, a super-network equilibrium optimization model is proposed to compute the solution of the operation architecture which is made up of a perceptive level, a command level and a firepow...From the view of information flow, a super-network equilibrium optimization model is proposed to compute the solution of the operation architecture which is made up of a perceptive level, a command level and a firepower level. Firstly, the optimized conditions of the perceptive level, command level and firepower level are analyzed respectively based on the demand of information relation,and then the information supply-and-demand equilibrium model of the operation architecture super-network is established. Secondly,a variational inequality transformation(VIT) model for equilibrium optimization of the operation architecture is given. Thirdly, the contraction projection algorithm for solving the operation architecture super-network equilibrium optimization model with fuzzy demands is designed. Finally, numerical examples are given to prove the validity and rationality of the proposed method, and the influence of fuzzy demands on the super-network equilibrium solution of operation architecture is discussed.展开更多
This paper summarized the classification of colorful tree species and the application principles on landscape architecture and briefly introduced the present application situation of colorful tree species in China. It...This paper summarized the classification of colorful tree species and the application principles on landscape architecture and briefly introduced the present application situation of colorful tree species in China. It also raised suggestions related to the introduction and application of the colorful tree species.展开更多
文摘With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 presents a new business model of“Internet of everything,intelligent leading,data driving,shared services,cross-border integration,and universal innovation”.The network boundaries are becoming increasingly blurred,NCMS is facing security risks such as equipment unauthorized use,account theft,static and extensive access control policies,unauthorized access,supply chain attacks,sensitive data leaks,and industrial control vulnerability attacks.Traditional security architectures mainly use information security technology,which cannot meet the active security protection requirements of NCMS.In order to solve the above problems,this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS.It adopts the zero trust concept and effectively integrates multiple security capabilities such as network,equipment,cloud computing environment,application,identity,and data.It adopts a new access control mode of“continuous verification+dynamic authorization”,classified access control mechanisms such as attribute-based access control,rolebased access control,policy-based access control,and a new data security protection system based on blockchain,achieving“trustworthy subject identity,controllable access behavior,and effective protection of subject and object resources”.This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises,and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations.
基金supported by the National Natural Science Foundation of China(41927801).
文摘To address the current problems of poor generality,low real-time,and imperfect information transmission of the battlefield target intelligence system,this paper studies the battlefield target intelligence system from the top-level perspective of multi-service joint warfare.First,an overall planning and analysis method of architecture modeling is proposed with the idea of a bionic analogy for battlefield target intelligence system architecture modeling,which reduces the difficulty of the planning and design process.The method introduces the Department of Defense architecture framework(DoDAF)modeling method,the multi-living agent(MLA)theory modeling method,and other combinations for planning and modeling.A set of rapid planning methods that can be applied to model the architecture of various types of complex systems is formed.Further,the liveness analysis of the battlefield target intelligence system is carried out,and the problems of the existing system are presented from several aspects.And the technical prediction of the development and construction is given,which provides directional ideas for the subsequent research and development of the battlefield target intelligence system.In the end,the proposed architecture model of the battlefield target intelligence system is simulated and verified by applying the colored Petri nets(CPN)simulation software.The analysis demonstrates the reasonable integrity of its logic.
基金supported by the National High Technology Research and Development Program of China(863 Program)(2006AA4A119).
文摘Radio frequency identification (RFID) has prominent advantages compared with other autoidentification technologies. Combining RFID with network technology, physical object tracking and information sharing can possibly be carried out in an innovative way. Regarding open-loop RFID applications, RFID public services infrastructure (PSI) is presented, PSI architecture is designed, and service modules are implemented, and a demonstrative application system, blood management and traceability system, is studied to verify PSI. Experimental results show the feasibility of the proposed architecture and the usability of PSI framework software.
文摘In this paper,a novel method of ultra-lightweight convolution neural network(CNN)design based on neural architecture search(NAS)and knowledge distillation(KD)is proposed.It can realize the automatic construction of the space target inverse synthetic aperture radar(ISAR)image recognition model with ultra-lightweight and high accuracy.This method introduces the NAS method into the radar image recognition for the first time,which solves the time-consuming and labor-consuming problems in the artificial design of the space target ISAR image automatic recognition model(STIIARM).On this basis,the NAS model’s knowledge is transferred to the student model with lower computational complexity by the flow of the solution procedure(FSP)distillation method.Thus,the decline of recognition accuracy caused by the direct compression of model structural parameters can be effectively avoided,and the ultralightweight STIIARM can be obtained.In the method,the Inverted Linear Bottleneck(ILB)and Inverted Residual Block(IRB)are firstly taken as each block’s basic structure in CNN.And the expansion ratio,output filter size,number of IRBs,and convolution kernel size are set as the search parameters to construct a hierarchical decomposition search space.Then,the recognition accuracy and computational complexity are taken as the objective function and constraint conditions,respectively,and the global optimization model of the CNN architecture search is established.Next,the simulated annealing(SA)algorithm is used as the search strategy to search out the lightweight and high accuracy STIIARM directly.After that,based on the three principles of similar block structure,the same corresponding channel number,and the minimum computational complexity,the more lightweight student model is designed,and the FSP matrix pairing between the NAS model and student model is completed.Finally,by minimizing the loss between the FSP matrix pairs of the NAS model and student model,the student model’s weight adjustment is completed.Thus the ultra-lightweight and high accuracy STIIARM is obtained.The proposed method’s effectiveness is verified by the simulation experiments on the ISAR image dataset of five types of space targets.
基金supported by the National Natural Science Foundation of China(61272011)
文摘In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork modeling approach for the OAADS is put for- ward by extending granular computing. Based on that operational units and links are equal to different information granularities, the supernetwork framework of the OAADS is constructed as a “four- network within two-layer” structure by forming dynamic operating coalitions, and measuring indexes of the ripple-effect analysis for the OAADS are given combining with Laplace spectral radius. In this framework, via analyzing multidimensional attributes which inherit relations between operational units in different granular scales, an extended granular computing is put forward integrating with a topological structure. Then the operation process within the supernetwork framework, including transformation relations be- tween two layers in the vertical view and mapping relations among functional networks in the horizontal view, is studied in quantity. As the application case shows, comparing with previous modeling approaches, the supernetwork model can validate and analyze the operation mechanism in the air defense architecture, and the ripple-effect analysis can be used to confirm the key operational unit with micro and macro viewpoints.
基金supported by the National Natural Science Foundation of China(6067406960574056).
文摘To improve the agility, dynamics, composability, reusability, and development efficiency restricted by monolithic federation object model (FOM), a modular FOM is proposed by high level architecture (HLA) evolved product development group. This paper reviews the state-of-the-art of HLA evolved modular FOM. In particular, related concepts, the overall impact on HLA standards, extension principles, and merging processes are discussed. Also permitted and restricted combinations, and merging rules are provided, and the influence on HLA interface specification is given. The comparison between modular FOM and base object model (BOM) is performed to illustrate the importance of their combination. The applications of modular FOM are summarized. Finally, the significance to facilitate compoable simulation both in academia and practice is presented and future directions are pointed out.
文摘To analyze the behavioral model of the command,control,communication,computer,intelligence,surveillance,reconnaissance(C4ISR)architecture,we propose an executable modeling and analyzing approach to it.First,the meta concept model of the C4ISR architecture is introduced.According to the meta concept model,we construct the executable meta models of the C4ISR architecture by extending the meta models of fUML.Then,we define the concrete syntax and executable activity algebra(EAA)semantics for executable models.The semantics functions are introduced to translating the syntax description of executable models into the item of EAA.To support the execution of models,we propose the executable rules which are the structural operational semantics of EAA.Finally,an area air defense of the C4ISR system is used to illustrate the feasibility of the approach.
基金This project was supported by the National Natural Science Foundation of China (60135020).
文摘The flexibility of traditional image processing system is limited because those system are designed for specific applications. In this paper, a new TMS320C64x-based multi-DSP parallel computing architecture is presented. It has many promising characteristics such as powerful computing capability, broad I/O bandwidth, topology flexibility, and expansibility. The parallel system performance is evaluated by practical experiment.
基金supported by the National Natural Science Foundation of China(U1435220)
文摘How to recognize targets with similar appearances from remote sensing images(RSIs) effectively and efficiently has become a big challenge. Recently, convolutional neural network(CNN) is preferred in the target classification due to the powerful feature representation ability and better performance. However,the training and testing of CNN mainly rely on single machine.Single machine has its natural limitation and bottleneck in processing RSIs due to limited hardware resources and huge time consuming. Besides, overfitting is a challenge for the CNN model due to the unbalance between RSIs data and the model structure.When a model is complex or the training data is relatively small,overfitting occurs and leads to a poor predictive performance. To address these problems, a distributed CNN architecture for RSIs target classification is proposed, which dramatically increases the training speed of CNN and system scalability. It improves the storage ability and processing efficiency of RSIs. Furthermore,Bayesian regularization approach is utilized in order to initialize the weights of the CNN extractor, which increases the robustness and flexibility of the CNN model. It helps prevent the overfitting and avoid the local optima caused by limited RSI training images or the inappropriate CNN structure. In addition, considering the efficiency of the Na¨?ve Bayes classifier, a distributed Na¨?ve Bayes classifier is designed to reduce the training cost. Compared with other algorithms, the proposed system and method perform the best and increase the recognition accuracy. The results show that the distributed system framework and the proposed algorithms are suitable for RSIs target classification tasks.
基金Projects(61203308,61309014)supported by the National Natural Science Foundation of China
文摘A virtual reconfigurable architecture(VRA)-based evolvable hardware is proposed for automatic synthesis of combinational logic circuits at gate-level.The proposed VRA is implemented by a Celoxica RC1000 peripheral component interconnect(PCI)board with an Xilinx Virtex xcv2000E field programmable gate array(FPGA).To improve the quality of the evolved circuits,the VRA works through a two-stage evolution: finding a functional circuit and minimizing the number of logic gates used in a feasible circuit.To optimize the algorithm performance in the two-stage evolutionary process and set free the user from the time-consuming process of mutation parameter tuning,a self-adaptive mutation rate control(SAMRC)scheme is introduced.In the evolutionary process,the mutation rate control parameters are encoded as additional genes in the chromosome and also undergo evolutionary operations.The efficiency of the proposed methodology is tested with the evolutions of a 4-bit even parity function,a 2-bit multiplier,and a 3-bit multiplier.The obtained results demonstrate that our scheme improves the evolutionary design of combinational logic circuits in terms of quality of the evolved circuit as well as the computational effort,when compared to the existing evolvable hardware approaches.
基金supported by the National Key Research and Development Project(2018YFB1700802)the National Natural Science Foundation of China(72071206)the Science and Technology Innovation Plan of Hunan Province(2020RC4046).
文摘The contribution rate of equipment system-of-systems architecture(ESoSA)is an important index to evaluate the equipment update,development,and architecture optimization.Since the traditional ESoSA contribution rate evaluation method does not make full use of the fuzzy information and uncertain information in the equipment system-of-systems(ESoS),and the Bayesian network is an effective tool to solve the uncertain information,a new ESoSA contribution rate evaluation method based on the fuzzy Bayesian network(FBN)is proposed.Firstly,based on the operation loop theory,an ESoSA is constructed considering three aspects:reconnaissance equipment,decision equipment,and strike equipment.Next,the fuzzy set theory is introduced to construct the FBN of ESoSA to deal with fuzzy information and uncertain information.Furthermore,the fuzzy importance index of the root node of the FBN is used to calculate the contribution rate of the ESoSA,and the ESoSA contribution rate evaluation model based on the root node fuzzy importance is established.Finally,the feasibility and rationality of this method are validated via an empirical case study of aviation ESoSA.Compared with traditional methods,the evaluation method based on FBN takes various failure states of equipment into consideration,is free of acquiring accurate probability of traditional equipment failure,and models the uncertainty of the relationship between equipment.The proposed method not only supplements and improves the ESoSA contribution rate assessment method,but also broadens the application scope of the Bayesian network.
基金Project(2017YFB1301104)supported by the National Key Research and Development Program of ChinaProjects(61906212,61802426)supported by the National Natural Science Foundation of China。
文摘In this paper,we consider a multi-UAV surveillance scenario where a team of unmanned aerial vehicles(UAVs)synchronously covers an area for monitoring the ground conditions.In this scenario,we adopt the leader-follower control mode and propose a modified Lyapunov guidance vector field(LGVF)approach for improving the precision of surveillance trajectory tracking.Then,in order to adopt to poor communication conditions,we propose a prediction-based synchronization method for keeping the formation consistently.Moreover,in order to adapt the multi-UAV system to dynamic and uncertain environment,this paper proposes a hierarchical dynamic task scheduling architecture.In this architecture,we firstly classify all the algorithms that perform tasks according to their functions,and then modularize the algorithms based on plugin technology.Afterwards,integrating the behavior model and plugin technique,this paper designs a three-layer control flow,which can efficiently achieve dynamic task scheduling.In order to verify the effectiveness of our architecture,we consider a multi-UAV traffic monitoring scenario and design several cases to demonstrate the online adjustment from three levels,respectively.
基金supported by the National Natural Science Foundation of China(61273198)
文摘Combat system effectiveness simulation (CSES) is a special type of complex system simulation. Three non-functional requirements (NFRs), i.e. model composability, domain specific modeling, and model evolvability, are gaining higher priority from CSES users when evaluating different modeling methodologies for CSES. Traditional CSES modeling methodologies are either domain-neutral (lack of domain characteristics consideration and limited support for model composability) or domain-oriented (lack of openness and evolvability) and fall short of the three NFRs. Inspired by the concept of architecture in systems engineering and software engineering fields, we extend it into a concept of model architecture for complex simulation systems, and propose a model architecture-oriented modeling methodology in which the model architecture plays a central role in achieving the three NFRs. Various model-driven engineering (MDE) approaches and technologies, including simulation modeling platform (SMP), unified modeling language (UML), domain specific modeling (DSM), eclipse modeling framework (EMF), graphical modeling framework (GMF), and so forth, are applied where possible in representing the CSES model architecture and its components' behaviors from physical and cognitive domain aspects. A prototype CSES system, called weapon effectiveness simulation system (WESS), and a non-trivial air-combat simulation example are presented to demonstrate the methodology.
基金supported by the National Natural Science Foundation of China (71771216,71701209)Shaanxi Natural Science Foundation (2019 JQ-250)。
文摘From the view of information flow, a super-network equilibrium optimization model is proposed to compute the solution of the operation architecture which is made up of a perceptive level, a command level and a firepower level. Firstly, the optimized conditions of the perceptive level, command level and firepower level are analyzed respectively based on the demand of information relation,and then the information supply-and-demand equilibrium model of the operation architecture super-network is established. Secondly,a variational inequality transformation(VIT) model for equilibrium optimization of the operation architecture is given. Thirdly, the contraction projection algorithm for solving the operation architecture super-network equilibrium optimization model with fuzzy demands is designed. Finally, numerical examples are given to prove the validity and rationality of the proposed method, and the influence of fuzzy demands on the super-network equilibrium solution of operation architecture is discussed.
文摘This paper summarized the classification of colorful tree species and the application principles on landscape architecture and briefly introduced the present application situation of colorful tree species in China. It also raised suggestions related to the introduction and application of the colorful tree species.