With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 pre...With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 presents a new business model of“Internet of everything,intelligent leading,data driving,shared services,cross-border integration,and universal innovation”.The network boundaries are becoming increasingly blurred,NCMS is facing security risks such as equipment unauthorized use,account theft,static and extensive access control policies,unauthorized access,supply chain attacks,sensitive data leaks,and industrial control vulnerability attacks.Traditional security architectures mainly use information security technology,which cannot meet the active security protection requirements of NCMS.In order to solve the above problems,this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS.It adopts the zero trust concept and effectively integrates multiple security capabilities such as network,equipment,cloud computing environment,application,identity,and data.It adopts a new access control mode of“continuous verification+dynamic authorization”,classified access control mechanisms such as attribute-based access control,rolebased access control,policy-based access control,and a new data security protection system based on blockchain,achieving“trustworthy subject identity,controllable access behavior,and effective protection of subject and object resources”.This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises,and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations.展开更多
In a time characterized by the availability of vast amounts of data,the effective utilization of information is critical for timely decision-making in military operations.However,processing large amounts of data requi...In a time characterized by the availability of vast amounts of data,the effective utilization of information is critical for timely decision-making in military operations.However,processing large amounts of data requires computational resources and time.Therefore,decision makers have used data-centric technologies to take advantage of public and private data sources to support military operations.This survey explores the integration and application of data-centric technologies,such as data analytics,data science,and machine learning,to optimize decision-making workflows within military contexts supporting the deployment of military assets and resources.To address the information gap,this article presents a literature review,specifically a survey.Our survey examines the use of the mentioned technologies to process and analyze information that contributes to the phases of situational awareness,and planning in military environments.We then introduce a taxonomy of the approaches associated with implementing these technologies in military scenarios.Furthermore,we discuss relevant factors for the seamless integration of data-centric technologies into military decision-making processes,and reveal the importance of specialized personnel,architectures,and cybersecurity issues in the task of developing prototypes and models.The findings of this paper aim to provide valuable insights for military institutions,offering a deeper understanding of the use of data-centric technologies as innovative practices to enhance the effectiveness of military decision-making.展开更多
To address the current problems of poor generality,low real-time,and imperfect information transmission of the battlefield target intelligence system,this paper studies the battlefield target intelligence system from ...To address the current problems of poor generality,low real-time,and imperfect information transmission of the battlefield target intelligence system,this paper studies the battlefield target intelligence system from the top-level perspective of multi-service joint warfare.First,an overall planning and analysis method of architecture modeling is proposed with the idea of a bionic analogy for battlefield target intelligence system architecture modeling,which reduces the difficulty of the planning and design process.The method introduces the Department of Defense architecture framework(DoDAF)modeling method,the multi-living agent(MLA)theory modeling method,and other combinations for planning and modeling.A set of rapid planning methods that can be applied to model the architecture of various types of complex systems is formed.Further,the liveness analysis of the battlefield target intelligence system is carried out,and the problems of the existing system are presented from several aspects.And the technical prediction of the development and construction is given,which provides directional ideas for the subsequent research and development of the battlefield target intelligence system.In the end,the proposed architecture model of the battlefield target intelligence system is simulated and verified by applying the colored Petri nets(CPN)simulation software.The analysis demonstrates the reasonable integrity of its logic.展开更多
Radio frequency identification (RFID) has prominent advantages compared with other autoidentification technologies. Combining RFID with network technology, physical object tracking and information sharing can possib...Radio frequency identification (RFID) has prominent advantages compared with other autoidentification technologies. Combining RFID with network technology, physical object tracking and information sharing can possibly be carried out in an innovative way. Regarding open-loop RFID applications, RFID public services infrastructure (PSI) is presented, PSI architecture is designed, and service modules are implemented, and a demonstrative application system, blood management and traceability system, is studied to verify PSI. Experimental results show the feasibility of the proposed architecture and the usability of PSI framework software.展开更多
The flexibility of traditional image processing system is limited because those system are designed for specific applications. In this paper, a new TMS320C64x-based multi-DSP parallel computing architecture is present...The flexibility of traditional image processing system is limited because those system are designed for specific applications. In this paper, a new TMS320C64x-based multi-DSP parallel computing architecture is presented. It has many promising characteristics such as powerful computing capability, broad I/O bandwidth, topology flexibility, and expansibility. The parallel system performance is evaluated by practical experiment.展开更多
In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork model...In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork modeling approach for the OAADS is put for- ward by extending granular computing. Based on that operational units and links are equal to different information granularities, the supernetwork framework of the OAADS is constructed as a “four- network within two-layer” structure by forming dynamic operating coalitions, and measuring indexes of the ripple-effect analysis for the OAADS are given combining with Laplace spectral radius. In this framework, via analyzing multidimensional attributes which inherit relations between operational units in different granular scales, an extended granular computing is put forward integrating with a topological structure. Then the operation process within the supernetwork framework, including transformation relations be- tween two layers in the vertical view and mapping relations among functional networks in the horizontal view, is studied in quantity. As the application case shows, comparing with previous modeling approaches, the supernetwork model can validate and analyze the operation mechanism in the air defense architecture, and the ripple-effect analysis can be used to confirm the key operational unit with micro and macro viewpoints.展开更多
Optimization of architecture design has recently drawn research interest. System deployment optimization (SDO) refers to the process of optimizing systems that are being deployed to activi- ties. This paper first fo...Optimization of architecture design has recently drawn research interest. System deployment optimization (SDO) refers to the process of optimizing systems that are being deployed to activi- ties. This paper first formulates a mathematical model to theorize and operationalize the SDO problem and then identifies optimal so- lutions to solve the SDO problem. In the solutions, the success rate of the combat task is maximized, whereas the execution time of the task and the cost of changes in the system structure are mini- mized. The presented optimized algorithm generates an optimal solution without the need to check the entire search space. A novel method is finally proposed based on the combination of heuristic method and genetic algorithm (HGA), as well as the combination of heuristic method and particle swarm optimization (HPSO). Experi- ment results show that the HPSO method generates solutions faster than particle swarm optimization (PSO) and genetic algo- rithm (GA) in terms of execution time and performs more efficiently than the heuristic method in terms of determining the best solution.展开更多
How to recognize targets with similar appearances from remote sensing images(RSIs) effectively and efficiently has become a big challenge. Recently, convolutional neural network(CNN) is preferred in the target classif...How to recognize targets with similar appearances from remote sensing images(RSIs) effectively and efficiently has become a big challenge. Recently, convolutional neural network(CNN) is preferred in the target classification due to the powerful feature representation ability and better performance. However,the training and testing of CNN mainly rely on single machine.Single machine has its natural limitation and bottleneck in processing RSIs due to limited hardware resources and huge time consuming. Besides, overfitting is a challenge for the CNN model due to the unbalance between RSIs data and the model structure.When a model is complex or the training data is relatively small,overfitting occurs and leads to a poor predictive performance. To address these problems, a distributed CNN architecture for RSIs target classification is proposed, which dramatically increases the training speed of CNN and system scalability. It improves the storage ability and processing efficiency of RSIs. Furthermore,Bayesian regularization approach is utilized in order to initialize the weights of the CNN extractor, which increases the robustness and flexibility of the CNN model. It helps prevent the overfitting and avoid the local optima caused by limited RSI training images or the inappropriate CNN structure. In addition, considering the efficiency of the Na¨?ve Bayes classifier, a distributed Na¨?ve Bayes classifier is designed to reduce the training cost. Compared with other algorithms, the proposed system and method perform the best and increase the recognition accuracy. The results show that the distributed system framework and the proposed algorithms are suitable for RSIs target classification tasks.展开更多
This paper summarized the classification of colorful tree species and the application principles on landscape architecture and briefly introduced the present application situation of colorful tree species in China. It...This paper summarized the classification of colorful tree species and the application principles on landscape architecture and briefly introduced the present application situation of colorful tree species in China. It also raised suggestions related to the introduction and application of the colorful tree species.展开更多
The hydrodynamic conditions present in a river delta's formation are a highly important factor in the variation between its sedimentary regulation and characteristics. In the case of the lacustrine basin river-dom...The hydrodynamic conditions present in a river delta's formation are a highly important factor in the variation between its sedimentary regulation and characteristics. In the case of the lacustrine basin river-dominated delta, water level fluctuations and fluviation, are both important controlling factors of the sedimentary characteristics and reservoir architecture. To discuss the effects of water level fluctuation on sediment characteristics and reservoir architecture of this delta, the Fangniugou section in the east of the Songliao Basin was selected for study. Based on an outcrop investigation of the lacustrine basin river-dominated delta, combining with an analysis of the major and trace chemical elements in the sediments to determine the relative water depth, through architecture bounding surfaces and lithofacies division, sedimentary microfacies recognition and architectural element research, this work illustrated the effects of water level fluctuation on the reservoir architecture and established sedimentary models for the lacustrine basin river-dominated delta under various water level conditions. The results show that there are 8 lithofacies in the Fangniugou section. The fan delta front, which is the main object of this study, develops four sedimentary microfacies that include the underwater distributary channel, river mouth bar, sheet sand and interdistributary bay. The effects of water level fluctuation on different orders geographic architecture elements are respectively reflected in the vertical combination of the composite sand bodies, the plane combination of the single sand bodies, the particle size changes in the vertical of hyperplasia in the single sand body, the coset and lamina. In the case of the sand body development of the petroliferous basin, varying water level conditions and research locations resulted in significant variation in the distribution and combination of the sand bodies in the lacustrine basin.展开更多
To analyze the behavioral model of the command,control,communication,computer,intelligence,surveillance,reconnaissance(C4ISR)architecture,we propose an executable modeling and analyzing approach to it.First,the meta c...To analyze the behavioral model of the command,control,communication,computer,intelligence,surveillance,reconnaissance(C4ISR)architecture,we propose an executable modeling and analyzing approach to it.First,the meta concept model of the C4ISR architecture is introduced.According to the meta concept model,we construct the executable meta models of the C4ISR architecture by extending the meta models of fUML.Then,we define the concrete syntax and executable activity algebra(EAA)semantics for executable models.The semantics functions are introduced to translating the syntax description of executable models into the item of EAA.To support the execution of models,we propose the executable rules which are the structural operational semantics of EAA.Finally,an area air defense of the C4ISR system is used to illustrate the feasibility of the approach.展开更多
To improve the agility, dynamics, composability, reusability, and development efficiency restricted by monolithic federation object model (FOM), a modular FOM is proposed by high level architecture (HLA) evolved p...To improve the agility, dynamics, composability, reusability, and development efficiency restricted by monolithic federation object model (FOM), a modular FOM is proposed by high level architecture (HLA) evolved product development group. This paper reviews the state-of-the-art of HLA evolved modular FOM. In particular, related concepts, the overall impact on HLA standards, extension principles, and merging processes are discussed. Also permitted and restricted combinations, and merging rules are provided, and the influence on HLA interface specification is given. The comparison between modular FOM and base object model (BOM) is performed to illustrate the importance of their combination. The applications of modular FOM are summarized. Finally, the significance to facilitate compoable simulation both in academia and practice is presented and future directions are pointed out.展开更多
System of systems architecture(SoSA) has received increasing emphasis by scholars since Zachman ignited its flame in 1987. Given its complexity and abstractness, it is critical to validate and evaluate SoSA to ensur...System of systems architecture(SoSA) has received increasing emphasis by scholars since Zachman ignited its flame in 1987. Given its complexity and abstractness, it is critical to validate and evaluate SoSA to ensure requirements have been met.Multiple qualities are discussed in the literature of SoSA evaluation, while research on functionality is scarce. In order to assess SoSA functionality, an extended influence diagram(EID) is developed in this paper. Meanwhile, a simulation method is proposed to elicit the conditional probabilities in EID through designing and executing SoSA. An illustrative anti-missile architecture case is introduced for EID development, architecture design, and simulation.展开更多
In this paper,we consider a multi-UAV surveillance scenario where a team of unmanned aerial vehicles(UAVs)synchronously covers an area for monitoring the ground conditions.In this scenario,we adopt the leader-follower...In this paper,we consider a multi-UAV surveillance scenario where a team of unmanned aerial vehicles(UAVs)synchronously covers an area for monitoring the ground conditions.In this scenario,we adopt the leader-follower control mode and propose a modified Lyapunov guidance vector field(LGVF)approach for improving the precision of surveillance trajectory tracking.Then,in order to adopt to poor communication conditions,we propose a prediction-based synchronization method for keeping the formation consistently.Moreover,in order to adapt the multi-UAV system to dynamic and uncertain environment,this paper proposes a hierarchical dynamic task scheduling architecture.In this architecture,we firstly classify all the algorithms that perform tasks according to their functions,and then modularize the algorithms based on plugin technology.Afterwards,integrating the behavior model and plugin technique,this paper designs a three-layer control flow,which can efficiently achieve dynamic task scheduling.In order to verify the effectiveness of our architecture,we consider a multi-UAV traffic monitoring scenario and design several cases to demonstrate the online adjustment from three levels,respectively.展开更多
In this paper,a novel method of ultra-lightweight convolution neural network(CNN)design based on neural architecture search(NAS)and knowledge distillation(KD)is proposed.It can realize the automatic construction of th...In this paper,a novel method of ultra-lightweight convolution neural network(CNN)design based on neural architecture search(NAS)and knowledge distillation(KD)is proposed.It can realize the automatic construction of the space target inverse synthetic aperture radar(ISAR)image recognition model with ultra-lightweight and high accuracy.This method introduces the NAS method into the radar image recognition for the first time,which solves the time-consuming and labor-consuming problems in the artificial design of the space target ISAR image automatic recognition model(STIIARM).On this basis,the NAS model’s knowledge is transferred to the student model with lower computational complexity by the flow of the solution procedure(FSP)distillation method.Thus,the decline of recognition accuracy caused by the direct compression of model structural parameters can be effectively avoided,and the ultralightweight STIIARM can be obtained.In the method,the Inverted Linear Bottleneck(ILB)and Inverted Residual Block(IRB)are firstly taken as each block’s basic structure in CNN.And the expansion ratio,output filter size,number of IRBs,and convolution kernel size are set as the search parameters to construct a hierarchical decomposition search space.Then,the recognition accuracy and computational complexity are taken as the objective function and constraint conditions,respectively,and the global optimization model of the CNN architecture search is established.Next,the simulated annealing(SA)algorithm is used as the search strategy to search out the lightweight and high accuracy STIIARM directly.After that,based on the three principles of similar block structure,the same corresponding channel number,and the minimum computational complexity,the more lightweight student model is designed,and the FSP matrix pairing between the NAS model and student model is completed.Finally,by minimizing the loss between the FSP matrix pairs of the NAS model and student model,the student model’s weight adjustment is completed.Thus the ultra-lightweight and high accuracy STIIARM is obtained.The proposed method’s effectiveness is verified by the simulation experiments on the ISAR image dataset of five types of space targets.展开更多
文摘With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 presents a new business model of“Internet of everything,intelligent leading,data driving,shared services,cross-border integration,and universal innovation”.The network boundaries are becoming increasingly blurred,NCMS is facing security risks such as equipment unauthorized use,account theft,static and extensive access control policies,unauthorized access,supply chain attacks,sensitive data leaks,and industrial control vulnerability attacks.Traditional security architectures mainly use information security technology,which cannot meet the active security protection requirements of NCMS.In order to solve the above problems,this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS.It adopts the zero trust concept and effectively integrates multiple security capabilities such as network,equipment,cloud computing environment,application,identity,and data.It adopts a new access control mode of“continuous verification+dynamic authorization”,classified access control mechanisms such as attribute-based access control,rolebased access control,policy-based access control,and a new data security protection system based on blockchain,achieving“trustworthy subject identity,controllable access behavior,and effective protection of subject and object resources”.This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises,and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations.
文摘In a time characterized by the availability of vast amounts of data,the effective utilization of information is critical for timely decision-making in military operations.However,processing large amounts of data requires computational resources and time.Therefore,decision makers have used data-centric technologies to take advantage of public and private data sources to support military operations.This survey explores the integration and application of data-centric technologies,such as data analytics,data science,and machine learning,to optimize decision-making workflows within military contexts supporting the deployment of military assets and resources.To address the information gap,this article presents a literature review,specifically a survey.Our survey examines the use of the mentioned technologies to process and analyze information that contributes to the phases of situational awareness,and planning in military environments.We then introduce a taxonomy of the approaches associated with implementing these technologies in military scenarios.Furthermore,we discuss relevant factors for the seamless integration of data-centric technologies into military decision-making processes,and reveal the importance of specialized personnel,architectures,and cybersecurity issues in the task of developing prototypes and models.The findings of this paper aim to provide valuable insights for military institutions,offering a deeper understanding of the use of data-centric technologies as innovative practices to enhance the effectiveness of military decision-making.
基金supported by the National Natural Science Foundation of China(41927801).
文摘To address the current problems of poor generality,low real-time,and imperfect information transmission of the battlefield target intelligence system,this paper studies the battlefield target intelligence system from the top-level perspective of multi-service joint warfare.First,an overall planning and analysis method of architecture modeling is proposed with the idea of a bionic analogy for battlefield target intelligence system architecture modeling,which reduces the difficulty of the planning and design process.The method introduces the Department of Defense architecture framework(DoDAF)modeling method,the multi-living agent(MLA)theory modeling method,and other combinations for planning and modeling.A set of rapid planning methods that can be applied to model the architecture of various types of complex systems is formed.Further,the liveness analysis of the battlefield target intelligence system is carried out,and the problems of the existing system are presented from several aspects.And the technical prediction of the development and construction is given,which provides directional ideas for the subsequent research and development of the battlefield target intelligence system.In the end,the proposed architecture model of the battlefield target intelligence system is simulated and verified by applying the colored Petri nets(CPN)simulation software.The analysis demonstrates the reasonable integrity of its logic.
基金supported by the National High Technology Research and Development Program of China(863 Program)(2006AA4A119).
文摘Radio frequency identification (RFID) has prominent advantages compared with other autoidentification technologies. Combining RFID with network technology, physical object tracking and information sharing can possibly be carried out in an innovative way. Regarding open-loop RFID applications, RFID public services infrastructure (PSI) is presented, PSI architecture is designed, and service modules are implemented, and a demonstrative application system, blood management and traceability system, is studied to verify PSI. Experimental results show the feasibility of the proposed architecture and the usability of PSI framework software.
基金This project was supported by the National Natural Science Foundation of China (60135020).
文摘The flexibility of traditional image processing system is limited because those system are designed for specific applications. In this paper, a new TMS320C64x-based multi-DSP parallel computing architecture is presented. It has many promising characteristics such as powerful computing capability, broad I/O bandwidth, topology flexibility, and expansibility. The parallel system performance is evaluated by practical experiment.
基金supported by the National Natural Science Foundation of China(61272011)
文摘In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork modeling approach for the OAADS is put for- ward by extending granular computing. Based on that operational units and links are equal to different information granularities, the supernetwork framework of the OAADS is constructed as a “four- network within two-layer” structure by forming dynamic operating coalitions, and measuring indexes of the ripple-effect analysis for the OAADS are given combining with Laplace spectral radius. In this framework, via analyzing multidimensional attributes which inherit relations between operational units in different granular scales, an extended granular computing is put forward integrating with a topological structure. Then the operation process within the supernetwork framework, including transformation relations be- tween two layers in the vertical view and mapping relations among functional networks in the horizontal view, is studied in quantity. As the application case shows, comparing with previous modeling approaches, the supernetwork model can validate and analyze the operation mechanism in the air defense architecture, and the ripple-effect analysis can be used to confirm the key operational unit with micro and macro viewpoints.
基金supported by the National Natural Science Foundation of China(71171197)the National Basic Research Program of China(973 Program)(613154)
文摘Optimization of architecture design has recently drawn research interest. System deployment optimization (SDO) refers to the process of optimizing systems that are being deployed to activi- ties. This paper first formulates a mathematical model to theorize and operationalize the SDO problem and then identifies optimal so- lutions to solve the SDO problem. In the solutions, the success rate of the combat task is maximized, whereas the execution time of the task and the cost of changes in the system structure are mini- mized. The presented optimized algorithm generates an optimal solution without the need to check the entire search space. A novel method is finally proposed based on the combination of heuristic method and genetic algorithm (HGA), as well as the combination of heuristic method and particle swarm optimization (HPSO). Experi- ment results show that the HPSO method generates solutions faster than particle swarm optimization (PSO) and genetic algo- rithm (GA) in terms of execution time and performs more efficiently than the heuristic method in terms of determining the best solution.
基金supported by the National Natural Science Foundation of China(U1435220)
文摘How to recognize targets with similar appearances from remote sensing images(RSIs) effectively and efficiently has become a big challenge. Recently, convolutional neural network(CNN) is preferred in the target classification due to the powerful feature representation ability and better performance. However,the training and testing of CNN mainly rely on single machine.Single machine has its natural limitation and bottleneck in processing RSIs due to limited hardware resources and huge time consuming. Besides, overfitting is a challenge for the CNN model due to the unbalance between RSIs data and the model structure.When a model is complex or the training data is relatively small,overfitting occurs and leads to a poor predictive performance. To address these problems, a distributed CNN architecture for RSIs target classification is proposed, which dramatically increases the training speed of CNN and system scalability. It improves the storage ability and processing efficiency of RSIs. Furthermore,Bayesian regularization approach is utilized in order to initialize the weights of the CNN extractor, which increases the robustness and flexibility of the CNN model. It helps prevent the overfitting and avoid the local optima caused by limited RSI training images or the inappropriate CNN structure. In addition, considering the efficiency of the Na¨?ve Bayes classifier, a distributed Na¨?ve Bayes classifier is designed to reduce the training cost. Compared with other algorithms, the proposed system and method perform the best and increase the recognition accuracy. The results show that the distributed system framework and the proposed algorithms are suitable for RSIs target classification tasks.
文摘This paper summarized the classification of colorful tree species and the application principles on landscape architecture and briefly introduced the present application situation of colorful tree species in China. It also raised suggestions related to the introduction and application of the colorful tree species.
基金Project(2011ZX05009-002)supported by the National Key Oil&Gas Project,ChinaProject(15CX06010A)supported by the Fundamental Research Funds for the Central Universities,China
文摘The hydrodynamic conditions present in a river delta's formation are a highly important factor in the variation between its sedimentary regulation and characteristics. In the case of the lacustrine basin river-dominated delta, water level fluctuations and fluviation, are both important controlling factors of the sedimentary characteristics and reservoir architecture. To discuss the effects of water level fluctuation on sediment characteristics and reservoir architecture of this delta, the Fangniugou section in the east of the Songliao Basin was selected for study. Based on an outcrop investigation of the lacustrine basin river-dominated delta, combining with an analysis of the major and trace chemical elements in the sediments to determine the relative water depth, through architecture bounding surfaces and lithofacies division, sedimentary microfacies recognition and architectural element research, this work illustrated the effects of water level fluctuation on the reservoir architecture and established sedimentary models for the lacustrine basin river-dominated delta under various water level conditions. The results show that there are 8 lithofacies in the Fangniugou section. The fan delta front, which is the main object of this study, develops four sedimentary microfacies that include the underwater distributary channel, river mouth bar, sheet sand and interdistributary bay. The effects of water level fluctuation on different orders geographic architecture elements are respectively reflected in the vertical combination of the composite sand bodies, the plane combination of the single sand bodies, the particle size changes in the vertical of hyperplasia in the single sand body, the coset and lamina. In the case of the sand body development of the petroliferous basin, varying water level conditions and research locations resulted in significant variation in the distribution and combination of the sand bodies in the lacustrine basin.
文摘To analyze the behavioral model of the command,control,communication,computer,intelligence,surveillance,reconnaissance(C4ISR)architecture,we propose an executable modeling and analyzing approach to it.First,the meta concept model of the C4ISR architecture is introduced.According to the meta concept model,we construct the executable meta models of the C4ISR architecture by extending the meta models of fUML.Then,we define the concrete syntax and executable activity algebra(EAA)semantics for executable models.The semantics functions are introduced to translating the syntax description of executable models into the item of EAA.To support the execution of models,we propose the executable rules which are the structural operational semantics of EAA.Finally,an area air defense of the C4ISR system is used to illustrate the feasibility of the approach.
基金supported by the National Natural Science Foundation of China(6067406960574056).
文摘To improve the agility, dynamics, composability, reusability, and development efficiency restricted by monolithic federation object model (FOM), a modular FOM is proposed by high level architecture (HLA) evolved product development group. This paper reviews the state-of-the-art of HLA evolved modular FOM. In particular, related concepts, the overall impact on HLA standards, extension principles, and merging processes are discussed. Also permitted and restricted combinations, and merging rules are provided, and the influence on HLA interface specification is given. The comparison between modular FOM and base object model (BOM) is performed to illustrate the importance of their combination. The applications of modular FOM are summarized. Finally, the significance to facilitate compoable simulation both in academia and practice is presented and future directions are pointed out.
基金supported by the National Natural Science Foundation of China(71571189)
文摘System of systems architecture(SoSA) has received increasing emphasis by scholars since Zachman ignited its flame in 1987. Given its complexity and abstractness, it is critical to validate and evaluate SoSA to ensure requirements have been met.Multiple qualities are discussed in the literature of SoSA evaluation, while research on functionality is scarce. In order to assess SoSA functionality, an extended influence diagram(EID) is developed in this paper. Meanwhile, a simulation method is proposed to elicit the conditional probabilities in EID through designing and executing SoSA. An illustrative anti-missile architecture case is introduced for EID development, architecture design, and simulation.
基金Project(2017YFB1301104)supported by the National Key Research and Development Program of ChinaProjects(61906212,61802426)supported by the National Natural Science Foundation of China。
文摘In this paper,we consider a multi-UAV surveillance scenario where a team of unmanned aerial vehicles(UAVs)synchronously covers an area for monitoring the ground conditions.In this scenario,we adopt the leader-follower control mode and propose a modified Lyapunov guidance vector field(LGVF)approach for improving the precision of surveillance trajectory tracking.Then,in order to adopt to poor communication conditions,we propose a prediction-based synchronization method for keeping the formation consistently.Moreover,in order to adapt the multi-UAV system to dynamic and uncertain environment,this paper proposes a hierarchical dynamic task scheduling architecture.In this architecture,we firstly classify all the algorithms that perform tasks according to their functions,and then modularize the algorithms based on plugin technology.Afterwards,integrating the behavior model and plugin technique,this paper designs a three-layer control flow,which can efficiently achieve dynamic task scheduling.In order to verify the effectiveness of our architecture,we consider a multi-UAV traffic monitoring scenario and design several cases to demonstrate the online adjustment from three levels,respectively.
文摘In this paper,a novel method of ultra-lightweight convolution neural network(CNN)design based on neural architecture search(NAS)and knowledge distillation(KD)is proposed.It can realize the automatic construction of the space target inverse synthetic aperture radar(ISAR)image recognition model with ultra-lightweight and high accuracy.This method introduces the NAS method into the radar image recognition for the first time,which solves the time-consuming and labor-consuming problems in the artificial design of the space target ISAR image automatic recognition model(STIIARM).On this basis,the NAS model’s knowledge is transferred to the student model with lower computational complexity by the flow of the solution procedure(FSP)distillation method.Thus,the decline of recognition accuracy caused by the direct compression of model structural parameters can be effectively avoided,and the ultralightweight STIIARM can be obtained.In the method,the Inverted Linear Bottleneck(ILB)and Inverted Residual Block(IRB)are firstly taken as each block’s basic structure in CNN.And the expansion ratio,output filter size,number of IRBs,and convolution kernel size are set as the search parameters to construct a hierarchical decomposition search space.Then,the recognition accuracy and computational complexity are taken as the objective function and constraint conditions,respectively,and the global optimization model of the CNN architecture search is established.Next,the simulated annealing(SA)algorithm is used as the search strategy to search out the lightweight and high accuracy STIIARM directly.After that,based on the three principles of similar block structure,the same corresponding channel number,and the minimum computational complexity,the more lightweight student model is designed,and the FSP matrix pairing between the NAS model and student model is completed.Finally,by minimizing the loss between the FSP matrix pairs of the NAS model and student model,the student model’s weight adjustment is completed.Thus the ultra-lightweight and high accuracy STIIARM is obtained.The proposed method’s effectiveness is verified by the simulation experiments on the ISAR image dataset of five types of space targets.