Intercepting high-maneuverability hypersonic targets in near-space environments poses significant challenges due to their extreme speeds and evasive capabilities.To address these challenges,this study presents an inte...Intercepting high-maneuverability hypersonic targets in near-space environments poses significant challenges due to their extreme speeds and evasive capabilities.To address these challenges,this study presents an integrated approach that combines a Three-Dimensional Finite-Time Optimal Cooperative Guidance Law(FTOC)with an Information Fusion Anti-saturation Predefined-time Observer(IFAPO).The proposed FTOC guidance law employs a nonlinear,non-quadratic finite-time optimal control strategy designed for rapid convergence within the limited timeframes of near-space interceptions,avoiding the need for remaining flight time estimation or linear decoupling inherent in traditional methods.To complement the guidance strategy,the IFAPO leverages multi-source information fusion theory and incorporates anti-saturation mechanisms to enhance target maneuver estimation.This method ensures accurate and real-time prediction of target acceleration while maintaining predefined convergence performance,even under complex interception conditions.By integrating the FTOC guidance law and IFAPO,the approach optimizes cooperative missile positioning,improves interception success rates,and minimizes fuel consumption,addressing practical constraints in military applications.Simulation results and comparative analyses confirm the effectiveness of the integrated approach,demonstrating its capability to achieve cooperative interception of highly maneuvering targets with enhanced efficiency and reduced economic costs,aligning with realistic combat scenarios.展开更多
High complexity and uncertainty of air combat pose significant challenges to target intention prediction.Current interpolation methods for data pre-processing and wrangling have limitations in capturing interrelations...High complexity and uncertainty of air combat pose significant challenges to target intention prediction.Current interpolation methods for data pre-processing and wrangling have limitations in capturing interrelationships among intricate variable patterns.Accordingly,this study proposes a Mogrifier gate recurrent unit-D(Mog-GRU-D)model to address the com-bat target intention prediction issue under the incomplete infor-mation condition.The proposed model directly processes miss-ing data while reducing the independence between inputs and output states.A total of 1200 samples from twelve continuous moments are captured through the combat simulation system,each of which consists of seven dimensional features.To bench-mark the experiment,a missing valued dataset has been gener-ated by randomly removing 20%of the original data.Extensive experiments demonstrate that the proposed model obtains the state-of-the-art performance with an accuracy of 73.25%when dealing with incomplete information.This study provides possi-ble interpretations for the principle of target interactive mecha-nism,highlighting the model’s effectiveness in potential air war-fare implementation.展开更多
In order to avoid the system performance deterioration caused by the wireless fading channel and imperfect channel estimation in cognitive radio networks, the spectrum sharing problem with the consideration of feedbac...In order to avoid the system performance deterioration caused by the wireless fading channel and imperfect channel estimation in cognitive radio networks, the spectrum sharing problem with the consideration of feedback control information from the primary user is analyzed. An improved spectrum sharing algorithm based on the combination of the feedback control information and the optimization algorithm is proposed. The relaxation method is used to achieve the approximate spectrum sharing model, and the spectrum sharing strategy that satisfies the individual outage probability constraints can be obtained iteratively with the observed outage probability. Simulation results show that the proposed spectrum sharing algorithm can achieve the spectrum sharing strategy that satisfies the outage probability constraints and reduce the average outage probability without causing maximum transmission rate reduction of the secondary user.展开更多
In most of the passive tracking systems, only the target kinematical information is used in the measurement-to-track association, which results in error tracking in a multitarget environment, where the targets are too...In most of the passive tracking systems, only the target kinematical information is used in the measurement-to-track association, which results in error tracking in a multitarget environment, where the targets are too close to each other. To enhance the tracking accuracy, the target signal classification information (TSCI) should be used to improve the data association. The TSCI is integrated in the data association process using the JPDA (joint probabilistic data association). The use of the TSCI in the data association can improve discrimination by yielding a purer track and preserving continuity. To verify the validity of the application of TSCI, two simulation experiments are done on an air target-tracing problem, that is, one using the TSCI and the other not using the TSCI. The final comparison shows that the use of the TSCI can effectively improve tracking accuracy.展开更多
The novel information criterion (NIC) algorithm can find the principal subspace quickly, but it is not an actual principal component analysis (PCA) algorithm and hence it cannot find the orthonormal eigen-space wh...The novel information criterion (NIC) algorithm can find the principal subspace quickly, but it is not an actual principal component analysis (PCA) algorithm and hence it cannot find the orthonormal eigen-space which corresponds to the principal component of input vector. This defect limits its application in practice. By weighting the neural network's output of NIC, a modified novel information criterion (MNIC) algorithm is presented. MNIC extractes the principal components and corresponding eigenvectors in a parallel online learning program, and overcomes the NIC's defect. It is proved to have a single global optimum and nonquadratic convergence rate, which is superior to the conventional PCA online algorithms such as Oja and LMSER. The relationship among Oja, LMSER and MNIC is exhibited. Simulations show that MNIC could converge to the optimum fast. The validity of MNIC is proved.展开更多
The cooperative mechanism is one main issue in the decentralized supply chain system, especially in an asymmetric information structure. We analyze the non-cooperative game behavior of a 2-echelon distribution supply ...The cooperative mechanism is one main issue in the decentralized supply chain system, especially in an asymmetric information structure. We analyze the non-cooperative game behavior of a 2-echelon distribution supply chain, compare the results with the system optimal solution, and give the supplier dominated cooperative mechanisms. We also analyze the validity of our contract under the asymmetric retailers' holding cost information and give some useful conclusions.展开更多
运用文献计量分析法和内容分析法对2007-2011年间刊载于Government Information Quarterly的学术论文和社论进行统计分析。对文章的年载分布、著者及单位、被引频次及国家地区作了文献计量分析;并对文章内容进行分析,总结出Government I...运用文献计量分析法和内容分析法对2007-2011年间刊载于Government Information Quarterly的学术论文和社论进行统计分析。对文章的年载分布、著者及单位、被引频次及国家地区作了文献计量分析;并对文章内容进行分析,总结出Government Information Quarterly的研究方向和主题主要包括以下五个方面:电子政务基础理论研究,电子政务的实践应用,政府信息管理,电子政务的技术基础,电子政务的发展过程和前景。展开更多
The effect of the information delay, which was caused by thc naturc of the distance sensors and wireless communication systems, on the string stability of platoon of automated vehicles was studied. The longitudinal ve...The effect of the information delay, which was caused by thc naturc of the distance sensors and wireless communication systems, on the string stability of platoon of automated vehicles was studied. The longitudinal vehicle dynamics model was built by taking the information delay into consideration, and three typical information frameworks, i.e., leader-predecessor framework (LPF), multiple-predecessors framework (MPF) and predecessor-successor framework (PSF), were defined and their related spacing error dynamics models in frequency domain were proposed. The string stability of platoon of automated vehicles was analyzed for the LPF, MPF and PSF, respectively. Meanwhile, the related sufficient string stable conditions were also obtained. The results demonstrate that the string stability can be guaranteed tbr the LPF and PSF with considering the information delay, but the ranges of the control gains of the control laws are smaller than those without considering the information delay. For the MPF, the "weak" string stability, which can be guaranteed without considering the information delay, cannot be obtained with considering the information delay. The comparative simulations further demonstrate that the LPF shows better string stability, but the PSF shows better string scalable performance.展开更多
To aim at the multimode character of the data from the airplane detecting system, the paper combines Dempster- Shafer evidence theory and subjective Bayesian algorithm and makes to propose a mixed structure multimode ...To aim at the multimode character of the data from the airplane detecting system, the paper combines Dempster- Shafer evidence theory and subjective Bayesian algorithm and makes to propose a mixed structure multimode data fusion algorithm. The algorithm adopts a prorated algorithm relate to the incertitude evaluation to convert the probability evaluation into the precognition probability in an identity frame, and ensures the adaptability of different data from different source to the mixed system. To guarantee real time fusion, a combination of time domain fusion and space domain fusion is established, this not only assure the fusion of data chain in different time of the same sensor, but also the data fusion from different sensors distributed in different platforms and the data fusion among different modes. The feasibility and practicability are approved through computer simulation.展开更多
Due to the complex features of rock mass blastability assessment systems, an evaluation model of rock mass blastability was established on the basis of the unascertained measurement (UM) theory and the actual charac...Due to the complex features of rock mass blastability assessment systems, an evaluation model of rock mass blastability was established on the basis of the unascertained measurement (UM) theory and the actual characteristics of the project. Considering a comprehensive range of intact rock properties and discontinuous structures of rock mass, twelve main factors influencing the evaluation blastability of rock mass were taken into account in the UM model, and the blastability evaluation index system of rock mass was constructed. The unascertained evaluation indices corresponding to the selected factors for the actual situation were solved both qualitatively and quantitatively. Then, the UM function of each evaluation index was obtained based on the initial data for the analysis of the blastability of six rock mass at a highway improvement cutting site in North Wales. The index weights of the factors were calculated by entropy theory, and credible degree identification (CDI) criteria were established according to the UM theory. The results of rock mass blastability evaluation were obtained by the CDI criteria. The results show that the UM model assessment results agree well with the actual records, and are consistent with those of the fuzzy sets evaluation method. Meanwhile, the unascertained superiority degree of rock mass blastability of samples S1-$6 which can be calculated by scoring criteria are 3.428 5, 3.453 3, 4.058 7, 3.675 9, 3.516 7 and 3.289 7, respectively. Furthermore, the proposed method can take into account large amount of uncertain information in blastability evaluation, which can provide an effective, credible and feasible way for estimating the blastability of rock mass. Engineering practices show that it can complete the blastability assessment systematically and scientifically without any assumption by the proposed model, which can be applied to practical engineering.展开更多
This paper presents a method for detecting the small infrared target under complex background. An algorithm, named local mutation weighted information entropy (LMWIE), is proposed to suppress background. Then, the g...This paper presents a method for detecting the small infrared target under complex background. An algorithm, named local mutation weighted information entropy (LMWIE), is proposed to suppress background. Then, the grey value of targets is enhanced by calculating the local energy. Image segmentation based on the adaptive threshold is used to solve the problems that the grey value of noise is enhanced with the grey value improvement of targets. Experimental results show that compared with the adaptive Butterworth high-pass filter method, the proposed algorithm is more effective and faster for the infrared small target detection.展开更多
Data processing of small samples is an important and valuable research problem in the electronic equipment test. Because it is difficult and complex to determine the probability distribution of small samples, it is di...Data processing of small samples is an important and valuable research problem in the electronic equipment test. Because it is difficult and complex to determine the probability distribution of small samples, it is difficult to use the traditional probability theory to process the samples and assess the degree of uncertainty. Using the grey relational theory and the norm theory, the grey distance information approach, which is based on the grey distance information quantity of a sample and the average grey distance information quantity of the samples, is proposed in this article. The definitions of the grey distance information quantity of a sample and the average grey distance information quantity of the samples, with their characteristics and algorithms, are introduced. The correlative problems, including the algorithm of estimated value, the standard deviation, and the acceptance and rejection criteria of the samples and estimated results, are also proposed. Moreover, the information whitening ratio is introduced to select the weight algorithm and to compare the different samples. Several examples are given to demonstrate the application of the proposed approach. The examples show that the proposed approach, which has no demand for the probability distribution of small samples, is feasible and effective.展开更多
Radar radio frequency (RF) stealth is very important in electronic war (EW), and waveform design and selection. Existing evaluation rules of radar RF stealth include too many parameters of radar and interceptors, ...Radar radio frequency (RF) stealth is very important in electronic war (EW), and waveform design and selection. Existing evaluation rules of radar RF stealth include too many parameters of radar and interceptors, such as Schleher interception factor, which makes it difficult to evaluate radar RF stealth technologies if interceptor parameters are unknown. In communication, security capacity has been presented to describe the possible ability to communicate in complete security. Since the essential of the secu- rity capacity is to have the interceptor get none valued information from the emitter, this paper is proposed to study security infor- mation factors taking advantage of mutual information to evaluate radar RF stealth under some conditions. Through analyzing mutual information obtained by the radar and the interceptor, this paper defines the security information factor with and without cooperative jamming. Furthermore, this paper deduces the ratio of the match filter to the match incoherent filter and discuss mutual information received by the interceptor. Numerical simulations illustrate radar RF stealth effects based on the security information factor concept under different conditions.展开更多
基金supported by the National Natural Science Foundation of China(Grant No.61773142).
文摘Intercepting high-maneuverability hypersonic targets in near-space environments poses significant challenges due to their extreme speeds and evasive capabilities.To address these challenges,this study presents an integrated approach that combines a Three-Dimensional Finite-Time Optimal Cooperative Guidance Law(FTOC)with an Information Fusion Anti-saturation Predefined-time Observer(IFAPO).The proposed FTOC guidance law employs a nonlinear,non-quadratic finite-time optimal control strategy designed for rapid convergence within the limited timeframes of near-space interceptions,avoiding the need for remaining flight time estimation or linear decoupling inherent in traditional methods.To complement the guidance strategy,the IFAPO leverages multi-source information fusion theory and incorporates anti-saturation mechanisms to enhance target maneuver estimation.This method ensures accurate and real-time prediction of target acceleration while maintaining predefined convergence performance,even under complex interception conditions.By integrating the FTOC guidance law and IFAPO,the approach optimizes cooperative missile positioning,improves interception success rates,and minimizes fuel consumption,addressing practical constraints in military applications.Simulation results and comparative analyses confirm the effectiveness of the integrated approach,demonstrating its capability to achieve cooperative interception of highly maneuvering targets with enhanced efficiency and reduced economic costs,aligning with realistic combat scenarios.
基金supported by the Aeronautical Science Foundation of China(2020Z023053002).
文摘High complexity and uncertainty of air combat pose significant challenges to target intention prediction.Current interpolation methods for data pre-processing and wrangling have limitations in capturing interrelationships among intricate variable patterns.Accordingly,this study proposes a Mogrifier gate recurrent unit-D(Mog-GRU-D)model to address the com-bat target intention prediction issue under the incomplete infor-mation condition.The proposed model directly processes miss-ing data while reducing the independence between inputs and output states.A total of 1200 samples from twelve continuous moments are captured through the combat simulation system,each of which consists of seven dimensional features.To bench-mark the experiment,a missing valued dataset has been gener-ated by randomly removing 20%of the original data.Extensive experiments demonstrate that the proposed model obtains the state-of-the-art performance with an accuracy of 73.25%when dealing with incomplete information.This study provides possi-ble interpretations for the principle of target interactive mecha-nism,highlighting the model’s effectiveness in potential air war-fare implementation.
基金supported by the National Natural Science Foundation of China (61073183)the Natural Science Foundation for the Youth of Heilongjiang Province (QC2012C070)
文摘In order to avoid the system performance deterioration caused by the wireless fading channel and imperfect channel estimation in cognitive radio networks, the spectrum sharing problem with the consideration of feedback control information from the primary user is analyzed. An improved spectrum sharing algorithm based on the combination of the feedback control information and the optimization algorithm is proposed. The relaxation method is used to achieve the approximate spectrum sharing model, and the spectrum sharing strategy that satisfies the individual outage probability constraints can be obtained iteratively with the observed outage probability. Simulation results show that the proposed spectrum sharing algorithm can achieve the spectrum sharing strategy that satisfies the outage probability constraints and reduce the average outage probability without causing maximum transmission rate reduction of the secondary user.
基金the Youth Science and Technology Foundection of University of Electronic Science andTechnology of China (JX0622).
文摘In most of the passive tracking systems, only the target kinematical information is used in the measurement-to-track association, which results in error tracking in a multitarget environment, where the targets are too close to each other. To enhance the tracking accuracy, the target signal classification information (TSCI) should be used to improve the data association. The TSCI is integrated in the data association process using the JPDA (joint probabilistic data association). The use of the TSCI in the data association can improve discrimination by yielding a purer track and preserving continuity. To verify the validity of the application of TSCI, two simulation experiments are done on an air target-tracing problem, that is, one using the TSCI and the other not using the TSCI. The final comparison shows that the use of the TSCI can effectively improve tracking accuracy.
文摘The novel information criterion (NIC) algorithm can find the principal subspace quickly, but it is not an actual principal component analysis (PCA) algorithm and hence it cannot find the orthonormal eigen-space which corresponds to the principal component of input vector. This defect limits its application in practice. By weighting the neural network's output of NIC, a modified novel information criterion (MNIC) algorithm is presented. MNIC extractes the principal components and corresponding eigenvectors in a parallel online learning program, and overcomes the NIC's defect. It is proved to have a single global optimum and nonquadratic convergence rate, which is superior to the conventional PCA online algorithms such as Oja and LMSER. The relationship among Oja, LMSER and MNIC is exhibited. Simulations show that MNIC could converge to the optimum fast. The validity of MNIC is proved.
基金This project was supported by the National Science Foundation of China(7017015)The Teaching and Research Award Fund for Outstanding Young Teachers in Higher Education Institutions of MOEThe Excellent Young Teachers Fund of MOE and the Project of Suppor
文摘The cooperative mechanism is one main issue in the decentralized supply chain system, especially in an asymmetric information structure. We analyze the non-cooperative game behavior of a 2-echelon distribution supply chain, compare the results with the system optimal solution, and give the supplier dominated cooperative mechanisms. We also analyze the validity of our contract under the asymmetric retailers' holding cost information and give some useful conclusions.
文摘运用文献计量分析法和内容分析法对2007-2011年间刊载于Government Information Quarterly的学术论文和社论进行统计分析。对文章的年载分布、著者及单位、被引频次及国家地区作了文献计量分析;并对文章内容进行分析,总结出Government Information Quarterly的研究方向和主题主要包括以下五个方面:电子政务基础理论研究,电子政务的实践应用,政府信息管理,电子政务的技术基础,电子政务的发展过程和前景。
基金Project(20070006011) supported by the Doctoral Foundation of Ministry of Education of China
文摘The effect of the information delay, which was caused by thc naturc of the distance sensors and wireless communication systems, on the string stability of platoon of automated vehicles was studied. The longitudinal vehicle dynamics model was built by taking the information delay into consideration, and three typical information frameworks, i.e., leader-predecessor framework (LPF), multiple-predecessors framework (MPF) and predecessor-successor framework (PSF), were defined and their related spacing error dynamics models in frequency domain were proposed. The string stability of platoon of automated vehicles was analyzed for the LPF, MPF and PSF, respectively. Meanwhile, the related sufficient string stable conditions were also obtained. The results demonstrate that the string stability can be guaranteed tbr the LPF and PSF with considering the information delay, but the ranges of the control gains of the control laws are smaller than those without considering the information delay. For the MPF, the "weak" string stability, which can be guaranteed without considering the information delay, cannot be obtained with considering the information delay. The comparative simulations further demonstrate that the LPF shows better string stability, but the PSF shows better string scalable performance.
文摘To aim at the multimode character of the data from the airplane detecting system, the paper combines Dempster- Shafer evidence theory and subjective Bayesian algorithm and makes to propose a mixed structure multimode data fusion algorithm. The algorithm adopts a prorated algorithm relate to the incertitude evaluation to convert the probability evaluation into the precognition probability in an identity frame, and ensures the adaptability of different data from different source to the mixed system. To guarantee real time fusion, a combination of time domain fusion and space domain fusion is established, this not only assure the fusion of data chain in different time of the same sensor, but also the data fusion from different sensors distributed in different platforms and the data fusion among different modes. The feasibility and practicability are approved through computer simulation.
基金Project(50934006) supported by the National Natural Science Foundation of ChinaProject(2010CB732004) supported by the National Basic Research Program of China+1 种基金Project(2009ssxt230) supported by the Central South University Innovation Fund,ChinaProject(CX2011B119) supported by the Graduated Students’Research and Innovation Fund of Hunan Province,China
文摘Due to the complex features of rock mass blastability assessment systems, an evaluation model of rock mass blastability was established on the basis of the unascertained measurement (UM) theory and the actual characteristics of the project. Considering a comprehensive range of intact rock properties and discontinuous structures of rock mass, twelve main factors influencing the evaluation blastability of rock mass were taken into account in the UM model, and the blastability evaluation index system of rock mass was constructed. The unascertained evaluation indices corresponding to the selected factors for the actual situation were solved both qualitatively and quantitatively. Then, the UM function of each evaluation index was obtained based on the initial data for the analysis of the blastability of six rock mass at a highway improvement cutting site in North Wales. The index weights of the factors were calculated by entropy theory, and credible degree identification (CDI) criteria were established according to the UM theory. The results of rock mass blastability evaluation were obtained by the CDI criteria. The results show that the UM model assessment results agree well with the actual records, and are consistent with those of the fuzzy sets evaluation method. Meanwhile, the unascertained superiority degree of rock mass blastability of samples S1-$6 which can be calculated by scoring criteria are 3.428 5, 3.453 3, 4.058 7, 3.675 9, 3.516 7 and 3.289 7, respectively. Furthermore, the proposed method can take into account large amount of uncertain information in blastability evaluation, which can provide an effective, credible and feasible way for estimating the blastability of rock mass. Engineering practices show that it can complete the blastability assessment systematically and scientifically without any assumption by the proposed model, which can be applied to practical engineering.
基金supported by the National Natural Science Foundation of China (61171194)
文摘This paper presents a method for detecting the small infrared target under complex background. An algorithm, named local mutation weighted information entropy (LMWIE), is proposed to suppress background. Then, the grey value of targets is enhanced by calculating the local energy. Image segmentation based on the adaptive threshold is used to solve the problems that the grey value of noise is enhanced with the grey value improvement of targets. Experimental results show that compared with the adaptive Butterworth high-pass filter method, the proposed algorithm is more effective and faster for the infrared small target detection.
文摘Data processing of small samples is an important and valuable research problem in the electronic equipment test. Because it is difficult and complex to determine the probability distribution of small samples, it is difficult to use the traditional probability theory to process the samples and assess the degree of uncertainty. Using the grey relational theory and the norm theory, the grey distance information approach, which is based on the grey distance information quantity of a sample and the average grey distance information quantity of the samples, is proposed in this article. The definitions of the grey distance information quantity of a sample and the average grey distance information quantity of the samples, with their characteristics and algorithms, are introduced. The correlative problems, including the algorithm of estimated value, the standard deviation, and the acceptance and rejection criteria of the samples and estimated results, are also proposed. Moreover, the information whitening ratio is introduced to select the weight algorithm and to compare the different samples. Several examples are given to demonstrate the application of the proposed approach. The examples show that the proposed approach, which has no demand for the probability distribution of small samples, is feasible and effective.
基金supported by the National Natural Science Foundation of China(61371170)the Priority Academic Program Development of Jiangsu Higher Education Institutions
文摘Radar radio frequency (RF) stealth is very important in electronic war (EW), and waveform design and selection. Existing evaluation rules of radar RF stealth include too many parameters of radar and interceptors, such as Schleher interception factor, which makes it difficult to evaluate radar RF stealth technologies if interceptor parameters are unknown. In communication, security capacity has been presented to describe the possible ability to communicate in complete security. Since the essential of the secu- rity capacity is to have the interceptor get none valued information from the emitter, this paper is proposed to study security infor- mation factors taking advantage of mutual information to evaluate radar RF stealth under some conditions. Through analyzing mutual information obtained by the radar and the interceptor, this paper defines the security information factor with and without cooperative jamming. Furthermore, this paper deduces the ratio of the match filter to the match incoherent filter and discuss mutual information received by the interceptor. Numerical simulations illustrate radar RF stealth effects based on the security information factor concept under different conditions.