Intercepting high-maneuverability hypersonic targets in near-space environments poses significant challenges due to their extreme speeds and evasive capabilities.To address these challenges,this study presents an inte...Intercepting high-maneuverability hypersonic targets in near-space environments poses significant challenges due to their extreme speeds and evasive capabilities.To address these challenges,this study presents an integrated approach that combines a Three-Dimensional Finite-Time Optimal Cooperative Guidance Law(FTOC)with an Information Fusion Anti-saturation Predefined-time Observer(IFAPO).The proposed FTOC guidance law employs a nonlinear,non-quadratic finite-time optimal control strategy designed for rapid convergence within the limited timeframes of near-space interceptions,avoiding the need for remaining flight time estimation or linear decoupling inherent in traditional methods.To complement the guidance strategy,the IFAPO leverages multi-source information fusion theory and incorporates anti-saturation mechanisms to enhance target maneuver estimation.This method ensures accurate and real-time prediction of target acceleration while maintaining predefined convergence performance,even under complex interception conditions.By integrating the FTOC guidance law and IFAPO,the approach optimizes cooperative missile positioning,improves interception success rates,and minimizes fuel consumption,addressing practical constraints in military applications.Simulation results and comparative analyses confirm the effectiveness of the integrated approach,demonstrating its capability to achieve cooperative interception of highly maneuvering targets with enhanced efficiency and reduced economic costs,aligning with realistic combat scenarios.展开更多
High complexity and uncertainty of air combat pose significant challenges to target intention prediction.Current interpolation methods for data pre-processing and wrangling have limitations in capturing interrelations...High complexity and uncertainty of air combat pose significant challenges to target intention prediction.Current interpolation methods for data pre-processing and wrangling have limitations in capturing interrelationships among intricate variable patterns.Accordingly,this study proposes a Mogrifier gate recurrent unit-D(Mog-GRU-D)model to address the com-bat target intention prediction issue under the incomplete infor-mation condition.The proposed model directly processes miss-ing data while reducing the independence between inputs and output states.A total of 1200 samples from twelve continuous moments are captured through the combat simulation system,each of which consists of seven dimensional features.To bench-mark the experiment,a missing valued dataset has been gener-ated by randomly removing 20%of the original data.Extensive experiments demonstrate that the proposed model obtains the state-of-the-art performance with an accuracy of 73.25%when dealing with incomplete information.This study provides possi-ble interpretations for the principle of target interactive mecha-nism,highlighting the model’s effectiveness in potential air war-fare implementation.展开更多
The effect of the information delay, which was caused by thc naturc of the distance sensors and wireless communication systems, on the string stability of platoon of automated vehicles was studied. The longitudinal ve...The effect of the information delay, which was caused by thc naturc of the distance sensors and wireless communication systems, on the string stability of platoon of automated vehicles was studied. The longitudinal vehicle dynamics model was built by taking the information delay into consideration, and three typical information frameworks, i.e., leader-predecessor framework (LPF), multiple-predecessors framework (MPF) and predecessor-successor framework (PSF), were defined and their related spacing error dynamics models in frequency domain were proposed. The string stability of platoon of automated vehicles was analyzed for the LPF, MPF and PSF, respectively. Meanwhile, the related sufficient string stable conditions were also obtained. The results demonstrate that the string stability can be guaranteed tbr the LPF and PSF with considering the information delay, but the ranges of the control gains of the control laws are smaller than those without considering the information delay. For the MPF, the "weak" string stability, which can be guaranteed without considering the information delay, cannot be obtained with considering the information delay. The comparative simulations further demonstrate that the LPF shows better string stability, but the PSF shows better string scalable performance.展开更多
To aim at the multimode character of the data from the airplane detecting system, the paper combines Dempster- Shafer evidence theory and subjective Bayesian algorithm and makes to propose a mixed structure multimode ...To aim at the multimode character of the data from the airplane detecting system, the paper combines Dempster- Shafer evidence theory and subjective Bayesian algorithm and makes to propose a mixed structure multimode data fusion algorithm. The algorithm adopts a prorated algorithm relate to the incertitude evaluation to convert the probability evaluation into the precognition probability in an identity frame, and ensures the adaptability of different data from different source to the mixed system. To guarantee real time fusion, a combination of time domain fusion and space domain fusion is established, this not only assure the fusion of data chain in different time of the same sensor, but also the data fusion from different sensors distributed in different platforms and the data fusion among different modes. The feasibility and practicability are approved through computer simulation.展开更多
Due to the complex features of rock mass blastability assessment systems, an evaluation model of rock mass blastability was established on the basis of the unascertained measurement (UM) theory and the actual charac...Due to the complex features of rock mass blastability assessment systems, an evaluation model of rock mass blastability was established on the basis of the unascertained measurement (UM) theory and the actual characteristics of the project. Considering a comprehensive range of intact rock properties and discontinuous structures of rock mass, twelve main factors influencing the evaluation blastability of rock mass were taken into account in the UM model, and the blastability evaluation index system of rock mass was constructed. The unascertained evaluation indices corresponding to the selected factors for the actual situation were solved both qualitatively and quantitatively. Then, the UM function of each evaluation index was obtained based on the initial data for the analysis of the blastability of six rock mass at a highway improvement cutting site in North Wales. The index weights of the factors were calculated by entropy theory, and credible degree identification (CDI) criteria were established according to the UM theory. The results of rock mass blastability evaluation were obtained by the CDI criteria. The results show that the UM model assessment results agree well with the actual records, and are consistent with those of the fuzzy sets evaluation method. Meanwhile, the unascertained superiority degree of rock mass blastability of samples S1-$6 which can be calculated by scoring criteria are 3.428 5, 3.453 3, 4.058 7, 3.675 9, 3.516 7 and 3.289 7, respectively. Furthermore, the proposed method can take into account large amount of uncertain information in blastability evaluation, which can provide an effective, credible and feasible way for estimating the blastability of rock mass. Engineering practices show that it can complete the blastability assessment systematically and scientifically without any assumption by the proposed model, which can be applied to practical engineering.展开更多
This paper presents a method for detecting the small infrared target under complex background. An algorithm, named local mutation weighted information entropy (LMWIE), is proposed to suppress background. Then, the g...This paper presents a method for detecting the small infrared target under complex background. An algorithm, named local mutation weighted information entropy (LMWIE), is proposed to suppress background. Then, the grey value of targets is enhanced by calculating the local energy. Image segmentation based on the adaptive threshold is used to solve the problems that the grey value of noise is enhanced with the grey value improvement of targets. Experimental results show that compared with the adaptive Butterworth high-pass filter method, the proposed algorithm is more effective and faster for the infrared small target detection.展开更多
Data processing of small samples is an important and valuable research problem in the electronic equipment test. Because it is difficult and complex to determine the probability distribution of small samples, it is di...Data processing of small samples is an important and valuable research problem in the electronic equipment test. Because it is difficult and complex to determine the probability distribution of small samples, it is difficult to use the traditional probability theory to process the samples and assess the degree of uncertainty. Using the grey relational theory and the norm theory, the grey distance information approach, which is based on the grey distance information quantity of a sample and the average grey distance information quantity of the samples, is proposed in this article. The definitions of the grey distance information quantity of a sample and the average grey distance information quantity of the samples, with their characteristics and algorithms, are introduced. The correlative problems, including the algorithm of estimated value, the standard deviation, and the acceptance and rejection criteria of the samples and estimated results, are also proposed. Moreover, the information whitening ratio is introduced to select the weight algorithm and to compare the different samples. Several examples are given to demonstrate the application of the proposed approach. The examples show that the proposed approach, which has no demand for the probability distribution of small samples, is feasible and effective.展开更多
Radar radio frequency (RF) stealth is very important in electronic war (EW), and waveform design and selection. Existing evaluation rules of radar RF stealth include too many parameters of radar and interceptors, ...Radar radio frequency (RF) stealth is very important in electronic war (EW), and waveform design and selection. Existing evaluation rules of radar RF stealth include too many parameters of radar and interceptors, such as Schleher interception factor, which makes it difficult to evaluate radar RF stealth technologies if interceptor parameters are unknown. In communication, security capacity has been presented to describe the possible ability to communicate in complete security. Since the essential of the secu- rity capacity is to have the interceptor get none valued information from the emitter, this paper is proposed to study security infor- mation factors taking advantage of mutual information to evaluate radar RF stealth under some conditions. Through analyzing mutual information obtained by the radar and the interceptor, this paper defines the security information factor with and without cooperative jamming. Furthermore, this paper deduces the ratio of the match filter to the match incoherent filter and discuss mutual information received by the interceptor. Numerical simulations illustrate radar RF stealth effects based on the security information factor concept under different conditions.展开更多
Sensor scheduling is used to improve the sensing performance in the estimation of targets’states.However,few papers are on the sensor scheduling for target detection with guiding information.This letter can remedy th...Sensor scheduling is used to improve the sensing performance in the estimation of targets’states.However,few papers are on the sensor scheduling for target detection with guiding information.This letter can remedy this deficiency.A risk-based target detection method with guiding information is provided firstly,based on which,the sensor scheduling approach is aiming at reducing the risk and uncertainty in target detection,namely risk-based sensor scheduling method.What should be stressed is that the Prediction Formula in sensor scheduling is proposed.Lastly,some examples are conducted to stress the effectiveness of this proposed method.展开更多
Unmanned aerial vehicle(UAV)was introduced as a novel traffic device to collect road traffic information and its cruise route planning problem was considered.Firstly,a multi-objective optimization model was proposed a...Unmanned aerial vehicle(UAV)was introduced as a novel traffic device to collect road traffic information and its cruise route planning problem was considered.Firstly,a multi-objective optimization model was proposed aiming at minimizing the total cruise distance and the number of UAVs used,which used UAV maximum cruise distance,the number of UAVs available and time window of each monitored target as constraints.Then,a novel multi-objective evolutionary algorithm was proposed.Next,a case study with three time window scenarios was implemented.The results show that both the total cruise distance and the number of UAVs used continue to increase with the time window constraint becoming narrower.Compared with the initial optimal solutions,the optimal total cruise distance and the number of UAVs used fall by an average of 30.93% and 31.74%,respectively.Finally,some concerns using UAV to collect road traffic information were discussed.展开更多
Fuzzy entropy was designed for non convex fuzzy membership function using well known Hamming distance measure.The proposed fuzzy entropy had the same structure as that of convex fuzzy membership case.Design procedure ...Fuzzy entropy was designed for non convex fuzzy membership function using well known Hamming distance measure.The proposed fuzzy entropy had the same structure as that of convex fuzzy membership case.Design procedure of fuzzy entropy was proposed by considering fuzzy membership through distance measure,and the obtained results contained more flexibility than the general fuzzy membership function.Furthermore,characteristic analyses for non convex function were also illustrated.Analyses on the mutual information were carried out through the proposed fuzzy entropy and similarity measure,which was also dual structure of fuzzy entropy.By the illustrative example,mutual information was discussed.展开更多
Inverse synthetic aperture radar (ISAR) image can be represented and reconstructed by sparse recovery (SR) approaches. However, the existing SR algorithms, which are used for ISAR imaging, have suffered from high comp...Inverse synthetic aperture radar (ISAR) image can be represented and reconstructed by sparse recovery (SR) approaches. However, the existing SR algorithms, which are used for ISAR imaging, have suffered from high computational cost and poor imaging quality under a low signal to noise ratio (SNR) condition. This paper proposes a fast decoupled ISAR imaging method by exploiting the inherent structural sparse information of the targets. Firstly, the ISAR imaging problem is decoupled into two sub-problems. One is range direction imaging and the other is azimuth direction focusing. Secondly, an efficient two-stage SR method is proposed to obtain higher resolution range profiles by using jointly sparse information. Finally, the residual linear Bregman iteration via fast Fourier transforms (RLBI-FFT) is proposed to perform the azimuth focusing on low SNR efficiently. Theoretical analysis and simulation results show that the proposed method has better performence to efficiently implement higher-resolution ISAR imaging under the low SNR condition.展开更多
Cooperative autonomous air combat of multiple unmanned aerial vehicles(UAVs)is one of the main combat modes in future air warfare,which becomes even more complicated with highly changeable situation and uncertain info...Cooperative autonomous air combat of multiple unmanned aerial vehicles(UAVs)is one of the main combat modes in future air warfare,which becomes even more complicated with highly changeable situation and uncertain information of the opponents.As such,this paper presents a cooperative decision-making method based on incomplete information dynamic game to generate maneuver strategies for multiple UAVs in air combat.Firstly,a cooperative situation assessment model is presented to measure the overall combat situation.Secondly,an incomplete information dynamic game model is proposed to model the dynamic process of air combat,and a dynamic Bayesian network is designed to infer the tactical intention of the opponent.Then a reinforcement learning framework based on multiagent deep deterministic policy gradient is established to obtain the perfect Bayes-Nash equilibrium solution of the air combat game model.Finally,a series of simulations are conducted to verify the effectiveness of the proposed method,and the simulation results show effective synergies and cooperative tactics.展开更多
As an essential part of the industrial Internet of Things(IoT)in power systems,the development of advanced metering infrastructure(AMI)facilitates services such as energy monitoring,load forecasting,and demand respons...As an essential part of the industrial Internet of Things(IoT)in power systems,the development of advanced metering infrastructure(AMI)facilitates services such as energy monitoring,load forecasting,and demand response.However,there is a growing risk of privacy disclosure with the wide installation of smart meters,for they transmit readings and sensitive data simultaneously.To guarantee the confidentiality of the sensitive information and authenticity of smart meter readings,we proposed a privacy-preserving scheme based on digital watermarking and elliptic-curve cryptography(ECC)asymmetric encryption.The sensitive data are encrypted using the public key and are hidden in the collected readings using digital watermark.Only the authorized user can extract watermark and can decrypt the confidential data using its private key.The proposed method realizes secure end-to-end confidentiality of the sensitive information.It has faster computing speed and can verify the data source and ensure the authenticity of readings.The example results show that the proposed method has little influence on the original data and unauthorized access cannot be completed within a reasonable time.On embedded hardware,the processing speed of the proposed method is better than the existing methods.展开更多
In a measurement system, new representation methods are necessary to maintain the uncertainty and to supply more powerful ability for reasoning and transformation between numerical system and symbolic system. A grey m...In a measurement system, new representation methods are necessary to maintain the uncertainty and to supply more powerful ability for reasoning and transformation between numerical system and symbolic system. A grey measurement system is discussed from the point of view of intelligent sensors and incomplete information processing compared with a numerical and symbolized measurement system. The methods of grey representation and information processing are proposed for data collection and reasoning. As a case study, multi-ultrasonic sensor systems are demonstrated to verify the effectiveness of the proposed methods.展开更多
Model combat information conditions are always uncertain and varied, the uncertain interval theory is therefore introduced into the research of multiple fighters suppressing the integrated air defense system(IADS) pro...Model combat information conditions are always uncertain and varied, the uncertain interval theory is therefore introduced into the research of multiple fighters suppressing the integrated air defense system(IADS) problem. Considering that the combat information conditions are uncertain intervals, the payoff function of the game for multiple fighters suppressing the IADS is modeled.Using the operation rules for interval numbers and the possibility degree, an improved chaotic particle swarm optimization(CPSO)is designed to solve the proposed model so as to obtain the optimal game solution. Comparison simulations are performed to analyze the influence of the weapons consumption and the distances of non-escaped zone and jamming on air combat result. Simulation results suggest that Nash equilibrium is achieved and verify the effectiveness of the proposed method.展开更多
基金supported by the National Natural Science Foundation of China(Grant No.61773142).
文摘Intercepting high-maneuverability hypersonic targets in near-space environments poses significant challenges due to their extreme speeds and evasive capabilities.To address these challenges,this study presents an integrated approach that combines a Three-Dimensional Finite-Time Optimal Cooperative Guidance Law(FTOC)with an Information Fusion Anti-saturation Predefined-time Observer(IFAPO).The proposed FTOC guidance law employs a nonlinear,non-quadratic finite-time optimal control strategy designed for rapid convergence within the limited timeframes of near-space interceptions,avoiding the need for remaining flight time estimation or linear decoupling inherent in traditional methods.To complement the guidance strategy,the IFAPO leverages multi-source information fusion theory and incorporates anti-saturation mechanisms to enhance target maneuver estimation.This method ensures accurate and real-time prediction of target acceleration while maintaining predefined convergence performance,even under complex interception conditions.By integrating the FTOC guidance law and IFAPO,the approach optimizes cooperative missile positioning,improves interception success rates,and minimizes fuel consumption,addressing practical constraints in military applications.Simulation results and comparative analyses confirm the effectiveness of the integrated approach,demonstrating its capability to achieve cooperative interception of highly maneuvering targets with enhanced efficiency and reduced economic costs,aligning with realistic combat scenarios.
基金supported by the Aeronautical Science Foundation of China(2020Z023053002).
文摘High complexity and uncertainty of air combat pose significant challenges to target intention prediction.Current interpolation methods for data pre-processing and wrangling have limitations in capturing interrelationships among intricate variable patterns.Accordingly,this study proposes a Mogrifier gate recurrent unit-D(Mog-GRU-D)model to address the com-bat target intention prediction issue under the incomplete infor-mation condition.The proposed model directly processes miss-ing data while reducing the independence between inputs and output states.A total of 1200 samples from twelve continuous moments are captured through the combat simulation system,each of which consists of seven dimensional features.To bench-mark the experiment,a missing valued dataset has been gener-ated by randomly removing 20%of the original data.Extensive experiments demonstrate that the proposed model obtains the state-of-the-art performance with an accuracy of 73.25%when dealing with incomplete information.This study provides possi-ble interpretations for the principle of target interactive mecha-nism,highlighting the model’s effectiveness in potential air war-fare implementation.
基金Project(20070006011) supported by the Doctoral Foundation of Ministry of Education of China
文摘The effect of the information delay, which was caused by thc naturc of the distance sensors and wireless communication systems, on the string stability of platoon of automated vehicles was studied. The longitudinal vehicle dynamics model was built by taking the information delay into consideration, and three typical information frameworks, i.e., leader-predecessor framework (LPF), multiple-predecessors framework (MPF) and predecessor-successor framework (PSF), were defined and their related spacing error dynamics models in frequency domain were proposed. The string stability of platoon of automated vehicles was analyzed for the LPF, MPF and PSF, respectively. Meanwhile, the related sufficient string stable conditions were also obtained. The results demonstrate that the string stability can be guaranteed tbr the LPF and PSF with considering the information delay, but the ranges of the control gains of the control laws are smaller than those without considering the information delay. For the MPF, the "weak" string stability, which can be guaranteed without considering the information delay, cannot be obtained with considering the information delay. The comparative simulations further demonstrate that the LPF shows better string stability, but the PSF shows better string scalable performance.
文摘To aim at the multimode character of the data from the airplane detecting system, the paper combines Dempster- Shafer evidence theory and subjective Bayesian algorithm and makes to propose a mixed structure multimode data fusion algorithm. The algorithm adopts a prorated algorithm relate to the incertitude evaluation to convert the probability evaluation into the precognition probability in an identity frame, and ensures the adaptability of different data from different source to the mixed system. To guarantee real time fusion, a combination of time domain fusion and space domain fusion is established, this not only assure the fusion of data chain in different time of the same sensor, but also the data fusion from different sensors distributed in different platforms and the data fusion among different modes. The feasibility and practicability are approved through computer simulation.
基金Project(50934006) supported by the National Natural Science Foundation of ChinaProject(2010CB732004) supported by the National Basic Research Program of China+1 种基金Project(2009ssxt230) supported by the Central South University Innovation Fund,ChinaProject(CX2011B119) supported by the Graduated Students’Research and Innovation Fund of Hunan Province,China
文摘Due to the complex features of rock mass blastability assessment systems, an evaluation model of rock mass blastability was established on the basis of the unascertained measurement (UM) theory and the actual characteristics of the project. Considering a comprehensive range of intact rock properties and discontinuous structures of rock mass, twelve main factors influencing the evaluation blastability of rock mass were taken into account in the UM model, and the blastability evaluation index system of rock mass was constructed. The unascertained evaluation indices corresponding to the selected factors for the actual situation were solved both qualitatively and quantitatively. Then, the UM function of each evaluation index was obtained based on the initial data for the analysis of the blastability of six rock mass at a highway improvement cutting site in North Wales. The index weights of the factors were calculated by entropy theory, and credible degree identification (CDI) criteria were established according to the UM theory. The results of rock mass blastability evaluation were obtained by the CDI criteria. The results show that the UM model assessment results agree well with the actual records, and are consistent with those of the fuzzy sets evaluation method. Meanwhile, the unascertained superiority degree of rock mass blastability of samples S1-$6 which can be calculated by scoring criteria are 3.428 5, 3.453 3, 4.058 7, 3.675 9, 3.516 7 and 3.289 7, respectively. Furthermore, the proposed method can take into account large amount of uncertain information in blastability evaluation, which can provide an effective, credible and feasible way for estimating the blastability of rock mass. Engineering practices show that it can complete the blastability assessment systematically and scientifically without any assumption by the proposed model, which can be applied to practical engineering.
基金supported by the National Natural Science Foundation of China (61171194)
文摘This paper presents a method for detecting the small infrared target under complex background. An algorithm, named local mutation weighted information entropy (LMWIE), is proposed to suppress background. Then, the grey value of targets is enhanced by calculating the local energy. Image segmentation based on the adaptive threshold is used to solve the problems that the grey value of noise is enhanced with the grey value improvement of targets. Experimental results show that compared with the adaptive Butterworth high-pass filter method, the proposed algorithm is more effective and faster for the infrared small target detection.
文摘Data processing of small samples is an important and valuable research problem in the electronic equipment test. Because it is difficult and complex to determine the probability distribution of small samples, it is difficult to use the traditional probability theory to process the samples and assess the degree of uncertainty. Using the grey relational theory and the norm theory, the grey distance information approach, which is based on the grey distance information quantity of a sample and the average grey distance information quantity of the samples, is proposed in this article. The definitions of the grey distance information quantity of a sample and the average grey distance information quantity of the samples, with their characteristics and algorithms, are introduced. The correlative problems, including the algorithm of estimated value, the standard deviation, and the acceptance and rejection criteria of the samples and estimated results, are also proposed. Moreover, the information whitening ratio is introduced to select the weight algorithm and to compare the different samples. Several examples are given to demonstrate the application of the proposed approach. The examples show that the proposed approach, which has no demand for the probability distribution of small samples, is feasible and effective.
基金supported by the National Natural Science Foundation of China(61371170)the Priority Academic Program Development of Jiangsu Higher Education Institutions
文摘Radar radio frequency (RF) stealth is very important in electronic war (EW), and waveform design and selection. Existing evaluation rules of radar RF stealth include too many parameters of radar and interceptors, such as Schleher interception factor, which makes it difficult to evaluate radar RF stealth technologies if interceptor parameters are unknown. In communication, security capacity has been presented to describe the possible ability to communicate in complete security. Since the essential of the secu- rity capacity is to have the interceptor get none valued information from the emitter, this paper is proposed to study security infor- mation factors taking advantage of mutual information to evaluate radar RF stealth under some conditions. Through analyzing mutual information obtained by the radar and the interceptor, this paper defines the security information factor with and without cooperative jamming. Furthermore, this paper deduces the ratio of the match filter to the match incoherent filter and discuss mutual information received by the interceptor. Numerical simulations illustrate radar RF stealth effects based on the security information factor concept under different conditions.
基金supported by National Natural Science Foundation(grant 61573374)。
文摘Sensor scheduling is used to improve the sensing performance in the estimation of targets’states.However,few papers are on the sensor scheduling for target detection with guiding information.This letter can remedy this deficiency.A risk-based target detection method with guiding information is provided firstly,based on which,the sensor scheduling approach is aiming at reducing the risk and uncertainty in target detection,namely risk-based sensor scheduling method.What should be stressed is that the Prediction Formula in sensor scheduling is proposed.Lastly,some examples are conducted to stress the effectiveness of this proposed method.
基金Project(2009AA11Z220)supported by the National High Technology Research and Development Program of China
文摘Unmanned aerial vehicle(UAV)was introduced as a novel traffic device to collect road traffic information and its cruise route planning problem was considered.Firstly,a multi-objective optimization model was proposed aiming at minimizing the total cruise distance and the number of UAVs used,which used UAV maximum cruise distance,the number of UAVs available and time window of each monitored target as constraints.Then,a novel multi-objective evolutionary algorithm was proposed.Next,a case study with three time window scenarios was implemented.The results show that both the total cruise distance and the number of UAVs used continue to increase with the time window constraint becoming narrower.Compared with the initial optimal solutions,the optimal total cruise distance and the number of UAVs used fall by an average of 30.93% and 31.74%,respectively.Finally,some concerns using UAV to collect road traffic information were discussed.
基金Work supported by the Second Stage of Brain Korea 21 Projects Work(2010-0020163) supported by the Priority Research Centers Program through the National Research Foundation (NRF) funded by the Ministry of Education,Science and Technology of Korea
文摘Fuzzy entropy was designed for non convex fuzzy membership function using well known Hamming distance measure.The proposed fuzzy entropy had the same structure as that of convex fuzzy membership case.Design procedure of fuzzy entropy was proposed by considering fuzzy membership through distance measure,and the obtained results contained more flexibility than the general fuzzy membership function.Furthermore,characteristic analyses for non convex function were also illustrated.Analyses on the mutual information were carried out through the proposed fuzzy entropy and similarity measure,which was also dual structure of fuzzy entropy.By the illustrative example,mutual information was discussed.
基金supported by the National Natural Science Foundation of China(61671469)
文摘Inverse synthetic aperture radar (ISAR) image can be represented and reconstructed by sparse recovery (SR) approaches. However, the existing SR algorithms, which are used for ISAR imaging, have suffered from high computational cost and poor imaging quality under a low signal to noise ratio (SNR) condition. This paper proposes a fast decoupled ISAR imaging method by exploiting the inherent structural sparse information of the targets. Firstly, the ISAR imaging problem is decoupled into two sub-problems. One is range direction imaging and the other is azimuth direction focusing. Secondly, an efficient two-stage SR method is proposed to obtain higher resolution range profiles by using jointly sparse information. Finally, the residual linear Bregman iteration via fast Fourier transforms (RLBI-FFT) is proposed to perform the azimuth focusing on low SNR efficiently. Theoretical analysis and simulation results show that the proposed method has better performence to efficiently implement higher-resolution ISAR imaging under the low SNR condition.
基金supported by the National Natural Science Foundation of China(Grant No.61933010 and 61903301)Shaanxi Aerospace Flight Vehicle Design Key Laboratory。
文摘Cooperative autonomous air combat of multiple unmanned aerial vehicles(UAVs)is one of the main combat modes in future air warfare,which becomes even more complicated with highly changeable situation and uncertain information of the opponents.As such,this paper presents a cooperative decision-making method based on incomplete information dynamic game to generate maneuver strategies for multiple UAVs in air combat.Firstly,a cooperative situation assessment model is presented to measure the overall combat situation.Secondly,an incomplete information dynamic game model is proposed to model the dynamic process of air combat,and a dynamic Bayesian network is designed to infer the tactical intention of the opponent.Then a reinforcement learning framework based on multiagent deep deterministic policy gradient is established to obtain the perfect Bayes-Nash equilibrium solution of the air combat game model.Finally,a series of simulations are conducted to verify the effectiveness of the proposed method,and the simulation results show effective synergies and cooperative tactics.
基金Project(SGZJHZ00HLJS2000871)supported by the State Grid Science and Technology Project,China。
文摘As an essential part of the industrial Internet of Things(IoT)in power systems,the development of advanced metering infrastructure(AMI)facilitates services such as energy monitoring,load forecasting,and demand response.However,there is a growing risk of privacy disclosure with the wide installation of smart meters,for they transmit readings and sensitive data simultaneously.To guarantee the confidentiality of the sensitive information and authenticity of smart meter readings,we proposed a privacy-preserving scheme based on digital watermarking and elliptic-curve cryptography(ECC)asymmetric encryption.The sensitive data are encrypted using the public key and are hidden in the collected readings using digital watermark.Only the authorized user can extract watermark and can decrypt the confidential data using its private key.The proposed method realizes secure end-to-end confidentiality of the sensitive information.It has faster computing speed and can verify the data source and ensure the authenticity of readings.The example results show that the proposed method has little influence on the original data and unauthorized access cannot be completed within a reasonable time.On embedded hardware,the processing speed of the proposed method is better than the existing methods.
基金the National Natural Science Foundation of China (6070308360575033).
文摘In a measurement system, new representation methods are necessary to maintain the uncertainty and to supply more powerful ability for reasoning and transformation between numerical system and symbolic system. A grey measurement system is discussed from the point of view of intelligent sensors and incomplete information processing compared with a numerical and symbolized measurement system. The methods of grey representation and information processing are proposed for data collection and reasoning. As a case study, multi-ultrasonic sensor systems are demonstrated to verify the effectiveness of the proposed methods.
基金supported by the National Natural Science Foundation of China(616034116057317250875132)
文摘Model combat information conditions are always uncertain and varied, the uncertain interval theory is therefore introduced into the research of multiple fighters suppressing the integrated air defense system(IADS) problem. Considering that the combat information conditions are uncertain intervals, the payoff function of the game for multiple fighters suppressing the IADS is modeled.Using the operation rules for interval numbers and the possibility degree, an improved chaotic particle swarm optimization(CPSO)is designed to solve the proposed model so as to obtain the optimal game solution. Comparison simulations are performed to analyze the influence of the weapons consumption and the distances of non-escaped zone and jamming on air combat result. Simulation results suggest that Nash equilibrium is achieved and verify the effectiveness of the proposed method.