In order to rapidly and effectively meet the informative demand from commanding decision-making, it is important to build, maintain and mine the intelligence database. The type, structure and maintenance of military i...In order to rapidly and effectively meet the informative demand from commanding decision-making, it is important to build, maintain and mine the intelligence database. The type, structure and maintenance of military intelligence database are discussed. On this condition, a new data-mining arithmetic based on relation intelligence database is presented according to the preference information and the requirement of time limit given by the commander. Furthermore, a simple calculative example is presented to prove the arithmetic with better maneuverability. Lastly, the problem of how to process the intelligence data mined from the intelligence database is discussed.展开更多
To study simultaneous location of different kinds of facilities, a new model of flow interception problem with multi-type of flows is proposed, with the consideration of multi-purpose flows and the influence of facili...To study simultaneous location of different kinds of facilities, a new model of flow interception problem with multi-type of flows is proposed, with the consideration of multi-purpose flows and the influence of facilities on each other. To be more practical, the objective is to maximize the benefits from flow-by customers instead of maximizing flows in the past. Since this problem is NP-hard and there is no optimal solution for large network, greedy and improved greedy heuristic algorithms are proposed. A computational example is presented to show that the optimal location decisions are proved to be strongly dependent on the influence coefficients and average profits by one customer and different types of facilities are almost co-located. Finally the results of sensitivity analysis are reported.展开更多
In commanding decision-making, the commander usually needs to know a lot of situations(intelligence) on the adversary. Because of the military intelligence with opposability, it is inevitable that intelligence perso...In commanding decision-making, the commander usually needs to know a lot of situations(intelligence) on the adversary. Because of the military intelligence with opposability, it is inevitable that intelligence personnel take some deceptive information released by the rival as intelligence data in the process of intelligence gathering. Since the failure of intelligence is likely to lead to a serious aftereffect, the recognition of intelligence is a very important problem. An elementary research on recognizing military intelligence and puts forward a systematic processing method are made. First, the types and characteristics of military intelligence are briefly discussed, a research thought of recognizing military intelligence by means of recognizing military hypotheses are presented. Next, the reasoning mode and framework for recognizing military hypotheses are presented from the angle of psychology of intelligence analysis and non-monotonic reasoning. Then, a model for recognizing military hypothesis is built on the basis of fuzzy judgement information given by intelligence analysts. A calculative example shows that the model has the characteristics of simple calculation and good maneuverability. Last, the methods that selecting the most likely hypothesis from the survival hypotheses via final recognition are discussed.展开更多
The minimization problem of time delays in networked control system (NCS) is concered, which is a hot area of such research field. First, some analysis and comments on time-delayed NCS model listed in previous work ...The minimization problem of time delays in networked control system (NCS) is concered, which is a hot area of such research field. First, some analysis and comments on time-delayed NCS model listed in previous work are given. Then, time delay minimization problem based on average behavior of network queuing delay is presented. Under fixed routing scheme and certain optimization performance indexes, the delay minimization problem is translated into convex optimization problem. And the solution of the delay minimization problems is attained through optimized allocation of flow rates among network links.展开更多
Resource-constrained project scheduling problem(RCPSP) is an important problem in research on project management. But there has been little attention paid to the objective of minimizing activities' cost with the re...Resource-constrained project scheduling problem(RCPSP) is an important problem in research on project management. But there has been little attention paid to the objective of minimizing activities' cost with the resource constraints that is a critical sub-problem in partner selection of construction supply chain management because the capacities of the renewable resources supplied by the partners will effect on the project scheduling. Its mathematic model is presented firstly, and analysis on the characteristic of the problem shows that the objective function is non-regular and the problem is NP-complete following which the basic idea for solution is clarified. Based on a definition of preposing activity cost matrix, a heuristic algorithm is brought forward. Analyses on the complexity of the heuristics and the result of numerical studies show that the heuristic algorithm is feasible and relatively effective.展开更多
The preparation process of electrically conductive filler for anisotropic conductive adhesive was performed and discussed.The spherical filler contains tri-layer structures: resin core,Ni-P intermediate coating layer,...The preparation process of electrically conductive filler for anisotropic conductive adhesive was performed and discussed.The spherical filler contains tri-layer structures: resin core,Ni-P intermediate coating layer,Au outer coating layer.The 4 μm resin spherical cores were synthesized by monodispersion polymerization method.Then they were contributed to electrical conductivity by electrolessly plating Ni-P layer and gold layer.These particles have good corrosion resistance,high stability,and enough mechanical strength.When mixed with thermosetting epoxy resin to produce anisotropic conductive adhesive(ACA),it can realize a good conductive bonding between bumps on dies and pads on substrates.This environmentally friendly conductive material offers numerous advantages over conventional solder technology and is an ideal substitute for the lead-contained solder in electronics packaging.展开更多
With the fast growth of Chinese economic, more and more capital will be invested in environmental projects. How to select the environmental investment projects (alternatives) for obtaining the best environmental qua...With the fast growth of Chinese economic, more and more capital will be invested in environmental projects. How to select the environmental investment projects (alternatives) for obtaining the best environmental quality and economic benefits is an important problem for the decision makers. The purpose of this paper is to develop a decision-making model to rank a finite number of alternatives with several and sometimes conflicting criteria. A model for ranking the projects of municipal sewage treatment plants is proposed by using exports' information and the data of the real projects. And, the ranking result is given based on the PROMETHEE method. Furthermore, by means of the concept of the weight stability intervals (WSI), the sensitivity of the ranking results to the size of criteria values and the change of weights value of criteria are discussed. The result shows that some criteria, such as “proportion of benefit to project cost”, will influence the ranking result of alternatives very strong while others not. The influence are not only from the value of criterion but also from the changing the weight of criterion. So, some criteria such as “proportion of benefit to project cost” are key critera for ranking the projects. Decision makers must be cautious to them.展开更多
Abundant test data are required in assessment of weapon performance. When weapon test data are insufficient, Bayesian analyses in small sample circumstance should be considered and the test data should be provided by ...Abundant test data are required in assessment of weapon performance. When weapon test data are insufficient, Bayesian analyses in small sample circumstance should be considered and the test data should be provided by simulations. The several Bayesian approaches are discussed and some limitations are founded. An improvement is put forward after limitations of Bayesian approaches available are analyzed and the improved approach is applied to assessment of some new weapon performance.展开更多
Based on the strategy of information feedback from followers to the leader, flocking control of a group of agents with a leader is studied. The leader tracks a pre-defined trajectory and at the same time the leader us...Based on the strategy of information feedback from followers to the leader, flocking control of a group of agents with a leader is studied. The leader tracks a pre-defined trajectory and at the same time the leader uses the feedback information from followers to the leader to modify its motion. The advantage of this control scheme is that it reduces the tracking errors and improves the robustness of the team cohesion to followers' faults. The results of simulation are provided to illustrate that information feedback can improve the performance of the system.展开更多
A kind of networked control system is studied; the networked control system with noise disturbance is modeled based on information scheduling and control co-design. Augmented state matrix analysis method is introduced...A kind of networked control system is studied; the networked control system with noise disturbance is modeled based on information scheduling and control co-design. Augmented state matrix analysis method is introduced, and robust fault-tolerant control problem of networked control systems with noise disturbance under actuator failures is studied. The parametric expression of the controller under actuator failures is given. Furthermore, the result is analyzed by simulation tests, which not only satisfies the networked control systems stability, but also decreases the data information number in network channel and makes full use of the network resources.展开更多
Considering the stochastic delay problems existing in networked control systems, a new control mode is proposed for networked control systems whose delay is longer than a sampling period. Under the control mode, the m...Considering the stochastic delay problems existing in networked control systems, a new control mode is proposed for networked control systems whose delay is longer than a sampling period. Under the control mode, the mathematical model of such a system is established. A stochastic stabilization condition for the system is given. The maximum delay can be derived from the stabilization condition.展开更多
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. H...Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost.展开更多
A direction-of-arrival (DOA) estimation algorithm based on direct data domain (D3) approach is presented. This method can accuracy estimate DOA using one snapshot modified data, called the temporal and spatial two...A direction-of-arrival (DOA) estimation algorithm based on direct data domain (D3) approach is presented. This method can accuracy estimate DOA using one snapshot modified data, called the temporal and spatial two-dimensional vector reconstruction (TSR) method. The key idea is to apply the D3 approach which can extract the signal of given frequency but null out other frequency signals in temporal domain. Then the spatial vector reconstruction processing is used to estimate the angle of the spatial coherent signal source based on extract signal data. Compared with the common temporal and spatial processing approach, the TSR method has a lower computational load, higher real-time performance, robustness and angular accuracy of DOA. The proposed algorithm can be directly applied to the phased array radar of coherent pulses. Simulation results demonstrate the performance of the proposed technique.展开更多
Currently, the article analyzes the CAN bus's rule of priority's arbitration bit by bit without destroy. It elicits the conclusion that if static priority based on the affirmatory system model is used, the lower pri...Currently, the article analyzes the CAN bus's rule of priority's arbitration bit by bit without destroy. It elicits the conclusion that if static priority based on the affirmatory system model is used, the lower priority's messages will be delayed considerably more, even some data will be lost when the bus's bandwidth is widely used. The scheduling cannot be modified neither during the system when static priority is used. The dynamic priority promoting method and the math model of SQSA and SQMA are presented; it analyzes the model's rate of taking in and sending out in large quantities, the largest delay, the problems and solutions when using SQMA. In the end, it is confirmed that the method of improving dynamic priority has good performances on the network rate of taking in and sending out in large quantities, the average delay, and the rate of network usage by emulational experiments.展开更多
In the conceptual design stage of complex products, CBR(Case-Based Reasoning) tool is useful to offer a feasible set of schemes. Then the most adaptive scheme can be generated through a procedure of comparison and e...In the conceptual design stage of complex products, CBR(Case-Based Reasoning) tool is useful to offer a feasible set of schemes. Then the most adaptive scheme can be generated through a procedure of comparison and evaluation. The procedure is essentially a multiple criteria decision-making problem. The traditional multiple criteria programming is not flexible enough in executing the system evaluation algorithm due to both the limited experimental data and the lack of human experiences. To make the CBR tool to be more efficient, a new method for the best choice among the feasible schemes based on the Fuzzy AHP using Fuzzy numbers (FFAHP) is proposed. Since the final results become a problem of ranking the mean of fuzzy numbers by the optimism of decision-maker using the FFAHP, its execution is much more intuitive and effective than with the traditional method.展开更多
Considering the instability of data transferred existing in high speed network, a new method is proposed for improving the stability using control theory. Under this method, the mathematical model of such a network is...Considering the instability of data transferred existing in high speed network, a new method is proposed for improving the stability using control theory. Under this method, the mathematical model of such a network is established. Stability condition is derived from the mathematical model. Several simulation experiments are performed. The results show that the method can increase the stability of data transferred in terms of the congestion window, queue size, and sending rate of the source.展开更多
To study the problems of multi-attribute decision making in which the attribute values are given in the form of linguistic fuzzy numbers and the information of attribute weights are incomplete, a new multi-attribute d...To study the problems of multi-attribute decision making in which the attribute values are given in the form of linguistic fuzzy numbers and the information of attribute weights are incomplete, a new multi-attribute decision making model is presented based on the optimal membership and the relative entropy. Firstly, the definitions of the optimal membership and the relative entropy are given. Secondly, for all alternatives, a set of preference weight vectors are obtained by solving a set of linear programming models whose goals axe all to maximize the optimal membership. Thirdly, a relative entropy model is established to aggregate the preference weight vectors, thus an optimal weight vector is determined. Based on this optimal weight vector, the algorithm of deviation degree minimization is proposed to rank all the alternatives. Finally, a decision making example is given to demonstrate the feasibility and rationality of this new model.展开更多
Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to dem...Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to demonstrate the feasibility of producing a tool that can provide a performance evaluation of various eonstellation access techniques and routing policies. The architecture and design of the simulation system are explored. The algorithm of data routing and instrument scheduling in this project is described. Besides these, the key methodologies of simulating the inter-satellite link features in the data transmissions are also discussed. The performance of both instrument scheduling algorithm and routing schemes is evaluated and analyzed through extensive simulations under a typical scenario.展开更多
There has been an increasing interest in integrating decision support systems (DSS) and expert systems (ES) to provide decision makers a more accessible, productive and domain-independent information and computing env...There has been an increasing interest in integrating decision support systems (DSS) and expert systems (ES) to provide decision makers a more accessible, productive and domain-independent information and computing environment. This paper is aimed at designing a multiple expert systems integrated decision support system (MESIDSS) to enhance decision makers' ability in more complex cases. The basic framework, management system of multiple ESs, and functions of MESIDSS are presented. The applications of MESIDSS in large-scale decision making processes are discussed from the following aspects of problem decomposing, dynamic combination of multiple ESs, link of multiple bases and decision coordinating. Finally, a summary and some ideas for the future are presented.展开更多
A new faster block-matching algorithm (BMA) by using both search candidate and pixd sulzsamplings is proposed. Firstly a pixd-subsampling approach used in adjustable partial distortion search (APDS) is adjusted to...A new faster block-matching algorithm (BMA) by using both search candidate and pixd sulzsamplings is proposed. Firstly a pixd-subsampling approach used in adjustable partial distortion search (APDS) is adjusted to visit about half points of all search candidates by subsampling them, using a spiral-scanning path with one skip. Two sdected candidates that have minimal and second minimal block distortion measures are obtained. Then a fine-tune step is taken around them to find the best one. Some analyses are given to approve the rationality of the approach of this paper. Experimental results show that, as compared to APDS, the proposed algorithm can enhance the block-matching speed by about 30% while maintaining its MSE performance very close to that of it. And it performs much better than many other BMAs such as TSS, NTSS, UCDBS and NPDS.展开更多
文摘In order to rapidly and effectively meet the informative demand from commanding decision-making, it is important to build, maintain and mine the intelligence database. The type, structure and maintenance of military intelligence database are discussed. On this condition, a new data-mining arithmetic based on relation intelligence database is presented according to the preference information and the requirement of time limit given by the commander. Furthermore, a simple calculative example is presented to prove the arithmetic with better maneuverability. Lastly, the problem of how to process the intelligence data mined from the intelligence database is discussed.
基金supported by the National Natural Science Foundation of China(7060101170871044)Trans-Century Traning Program Foundation for the Talents by the State Education Commission(NECT-06-0653).
文摘To study simultaneous location of different kinds of facilities, a new model of flow interception problem with multi-type of flows is proposed, with the consideration of multi-purpose flows and the influence of facilities on each other. To be more practical, the objective is to maximize the benefits from flow-by customers instead of maximizing flows in the past. Since this problem is NP-hard and there is no optimal solution for large network, greedy and improved greedy heuristic algorithms are proposed. A computational example is presented to show that the optimal location decisions are proved to be strongly dependent on the influence coefficients and average profits by one customer and different types of facilities are almost co-located. Finally the results of sensitivity analysis are reported.
文摘In commanding decision-making, the commander usually needs to know a lot of situations(intelligence) on the adversary. Because of the military intelligence with opposability, it is inevitable that intelligence personnel take some deceptive information released by the rival as intelligence data in the process of intelligence gathering. Since the failure of intelligence is likely to lead to a serious aftereffect, the recognition of intelligence is a very important problem. An elementary research on recognizing military intelligence and puts forward a systematic processing method are made. First, the types and characteristics of military intelligence are briefly discussed, a research thought of recognizing military intelligence by means of recognizing military hypotheses are presented. Next, the reasoning mode and framework for recognizing military hypotheses are presented from the angle of psychology of intelligence analysis and non-monotonic reasoning. Then, a model for recognizing military hypothesis is built on the basis of fuzzy judgement information given by intelligence analysts. A calculative example shows that the model has the characteristics of simple calculation and good maneuverability. Last, the methods that selecting the most likely hypothesis from the survival hypotheses via final recognition are discussed.
基金This project was supported by the National Natural Science Foundation of China (60274014) Specialized Research Fund forthe Doctoral Programof Higher Education (20020487006) China Education Ministry’s Key Laboratory Foundation for Intelli-gent Manufacture Technology (I mstsu-2002 -03) .
文摘The minimization problem of time delays in networked control system (NCS) is concered, which is a hot area of such research field. First, some analysis and comments on time-delayed NCS model listed in previous work are given. Then, time delay minimization problem based on average behavior of network queuing delay is presented. Under fixed routing scheme and certain optimization performance indexes, the delay minimization problem is translated into convex optimization problem. And the solution of the delay minimization problems is attained through optimized allocation of flow rates among network links.
文摘Resource-constrained project scheduling problem(RCPSP) is an important problem in research on project management. But there has been little attention paid to the objective of minimizing activities' cost with the resource constraints that is a critical sub-problem in partner selection of construction supply chain management because the capacities of the renewable resources supplied by the partners will effect on the project scheduling. Its mathematic model is presented firstly, and analysis on the characteristic of the problem shows that the objective function is non-regular and the problem is NP-complete following which the basic idea for solution is clarified. Based on a definition of preposing activity cost matrix, a heuristic algorithm is brought forward. Analyses on the complexity of the heuristics and the result of numerical studies show that the heuristic algorithm is feasible and relatively effective.
基金The National Natural Science Foundation of China(No.10474024)NSFC-RGC Joint Research Scheme(No.60318002)+1 种基金Youth Chenguang Project of Science and Technology of Wuhan City of China(No.20065004116-10)StateKey Lab.of Advanced Technology for Materials Synthesis and Processing(Wuhan University of Technology,No.WUT2004 M08)
文摘The preparation process of electrically conductive filler for anisotropic conductive adhesive was performed and discussed.The spherical filler contains tri-layer structures: resin core,Ni-P intermediate coating layer,Au outer coating layer.The 4 μm resin spherical cores were synthesized by monodispersion polymerization method.Then they were contributed to electrical conductivity by electrolessly plating Ni-P layer and gold layer.These particles have good corrosion resistance,high stability,and enough mechanical strength.When mixed with thermosetting epoxy resin to produce anisotropic conductive adhesive(ACA),it can realize a good conductive bonding between bumps on dies and pads on substrates.This environmentally friendly conductive material offers numerous advantages over conventional solder technology and is an ideal substitute for the lead-contained solder in electronics packaging.
基金Shanghai Leading Academic Discipline Project (T0502)Shanghai Municipal Educational Commission Project (05EZ32).
文摘With the fast growth of Chinese economic, more and more capital will be invested in environmental projects. How to select the environmental investment projects (alternatives) for obtaining the best environmental quality and economic benefits is an important problem for the decision makers. The purpose of this paper is to develop a decision-making model to rank a finite number of alternatives with several and sometimes conflicting criteria. A model for ranking the projects of municipal sewage treatment plants is proposed by using exports' information and the data of the real projects. And, the ranking result is given based on the PROMETHEE method. Furthermore, by means of the concept of the weight stability intervals (WSI), the sensitivity of the ranking results to the size of criteria values and the change of weights value of criteria are discussed. The result shows that some criteria, such as “proportion of benefit to project cost”, will influence the ranking result of alternatives very strong while others not. The influence are not only from the value of criterion but also from the changing the weight of criterion. So, some criteria such as “proportion of benefit to project cost” are key critera for ranking the projects. Decision makers must be cautious to them.
文摘Abundant test data are required in assessment of weapon performance. When weapon test data are insufficient, Bayesian analyses in small sample circumstance should be considered and the test data should be provided by simulations. The several Bayesian approaches are discussed and some limitations are founded. An improvement is put forward after limitations of Bayesian approaches available are analyzed and the improved approach is applied to assessment of some new weapon performance.
基金supported by the National Natural Science Foundation of China(60574088).
文摘Based on the strategy of information feedback from followers to the leader, flocking control of a group of agents with a leader is studied. The leader tracks a pre-defined trajectory and at the same time the leader uses the feedback information from followers to the leader to modify its motion. The advantage of this control scheme is that it reduces the tracking errors and improves the robustness of the team cohesion to followers' faults. The results of simulation are provided to illustrate that information feedback can improve the performance of the system.
基金Hohai University Startup Outlay for Doctor Scientific Research (2084/40601136)
文摘A kind of networked control system is studied; the networked control system with noise disturbance is modeled based on information scheduling and control co-design. Augmented state matrix analysis method is introduced, and robust fault-tolerant control problem of networked control systems with noise disturbance under actuator failures is studied. The parametric expression of the controller under actuator failures is given. Furthermore, the result is analyzed by simulation tests, which not only satisfies the networked control systems stability, but also decreases the data information number in network channel and makes full use of the network resources.
基金This project was supported by the National Natural Science Foundation of China (60274014, 60574088).
文摘Considering the stochastic delay problems existing in networked control systems, a new control mode is proposed for networked control systems whose delay is longer than a sampling period. Under the control mode, the mathematical model of such a system is established. A stochastic stabilization condition for the system is given. The maximum delay can be derived from the stabilization condition.
基金the "863" High Technology Research and Development Program of China (2006AA01Z226)the Scientific Research Foundation of Huazhong University of Science and Technology (2006Z011B)the Program for New Century Excellent Talents in University (NCET-07-0328).
文摘Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost.
文摘A direction-of-arrival (DOA) estimation algorithm based on direct data domain (D3) approach is presented. This method can accuracy estimate DOA using one snapshot modified data, called the temporal and spatial two-dimensional vector reconstruction (TSR) method. The key idea is to apply the D3 approach which can extract the signal of given frequency but null out other frequency signals in temporal domain. Then the spatial vector reconstruction processing is used to estimate the angle of the spatial coherent signal source based on extract signal data. Compared with the common temporal and spatial processing approach, the TSR method has a lower computational load, higher real-time performance, robustness and angular accuracy of DOA. The proposed algorithm can be directly applied to the phased array radar of coherent pulses. Simulation results demonstrate the performance of the proposed technique.
基金supported by the National Natural Science Foundation of China (50421703)the National Key Laboratory of Electrical Engineering of Naval Engineering University
文摘Currently, the article analyzes the CAN bus's rule of priority's arbitration bit by bit without destroy. It elicits the conclusion that if static priority based on the affirmatory system model is used, the lower priority's messages will be delayed considerably more, even some data will be lost when the bus's bandwidth is widely used. The scheduling cannot be modified neither during the system when static priority is used. The dynamic priority promoting method and the math model of SQSA and SQMA are presented; it analyzes the model's rate of taking in and sending out in large quantities, the largest delay, the problems and solutions when using SQMA. In the end, it is confirmed that the method of improving dynamic priority has good performances on the network rate of taking in and sending out in large quantities, the average delay, and the rate of network usage by emulational experiments.
基金This project was partly supported bythe Key Programof the National Natural Science Foundation of China (79990580) .
文摘In the conceptual design stage of complex products, CBR(Case-Based Reasoning) tool is useful to offer a feasible set of schemes. Then the most adaptive scheme can be generated through a procedure of comparison and evaluation. The procedure is essentially a multiple criteria decision-making problem. The traditional multiple criteria programming is not flexible enough in executing the system evaluation algorithm due to both the limited experimental data and the lack of human experiences. To make the CBR tool to be more efficient, a new method for the best choice among the feasible schemes based on the Fuzzy AHP using Fuzzy numbers (FFAHP) is proposed. Since the final results become a problem of ranking the mean of fuzzy numbers by the optimism of decision-maker using the FFAHP, its execution is much more intuitive and effective than with the traditional method.
基金the National Natural Science Foundation of China (50579022 50539140).
文摘Considering the instability of data transferred existing in high speed network, a new method is proposed for improving the stability using control theory. Under this method, the mathematical model of such a network is established. Stability condition is derived from the mathematical model. Several simulation experiments are performed. The results show that the method can increase the stability of data transferred in terms of the congestion window, queue size, and sending rate of the source.
基金supported by the National Natural Science Foundation of China(70771041)Chinese Astronautics SupportTechnology Foundation and the Excellent Youth Project of Hubei Provincial Department of Education(Q20082705)
文摘To study the problems of multi-attribute decision making in which the attribute values are given in the form of linguistic fuzzy numbers and the information of attribute weights are incomplete, a new multi-attribute decision making model is presented based on the optimal membership and the relative entropy. Firstly, the definitions of the optimal membership and the relative entropy are given. Secondly, for all alternatives, a set of preference weight vectors are obtained by solving a set of linear programming models whose goals axe all to maximize the optimal membership. Thirdly, a relative entropy model is established to aggregate the preference weight vectors, thus an optimal weight vector is determined. Based on this optimal weight vector, the algorithm of deviation degree minimization is proposed to rank all the alternatives. Finally, a decision making example is given to demonstrate the feasibility and rationality of this new model.
基金This project was supported by the National "863" High-Tech Research and Development Program of China(2002AA7170)
文摘Ongoing research is described that is focused upon modelling the space base information network and simulating its behaviours: simulation of spaced based communications and networking project. Its objective is to demonstrate the feasibility of producing a tool that can provide a performance evaluation of various eonstellation access techniques and routing policies. The architecture and design of the simulation system are explored. The algorithm of data routing and instrument scheduling in this project is described. Besides these, the key methodologies of simulating the inter-satellite link features in the data transmissions are also discussed. The performance of both instrument scheduling algorithm and routing schemes is evaluated and analyzed through extensive simulations under a typical scenario.
文摘There has been an increasing interest in integrating decision support systems (DSS) and expert systems (ES) to provide decision makers a more accessible, productive and domain-independent information and computing environment. This paper is aimed at designing a multiple expert systems integrated decision support system (MESIDSS) to enhance decision makers' ability in more complex cases. The basic framework, management system of multiple ESs, and functions of MESIDSS are presented. The applications of MESIDSS in large-scale decision making processes are discussed from the following aspects of problem decomposing, dynamic combination of multiple ESs, link of multiple bases and decision coordinating. Finally, a summary and some ideas for the future are presented.
基金This project was supported by the National Natural Science Foundation of China (60272099) .
文摘A new faster block-matching algorithm (BMA) by using both search candidate and pixd sulzsamplings is proposed. Firstly a pixd-subsampling approach used in adjustable partial distortion search (APDS) is adjusted to visit about half points of all search candidates by subsampling them, using a spiral-scanning path with one skip. Two sdected candidates that have minimal and second minimal block distortion measures are obtained. Then a fine-tune step is taken around them to find the best one. Some analyses are given to approve the rationality of the approach of this paper. Experimental results show that, as compared to APDS, the proposed algorithm can enhance the block-matching speed by about 30% while maintaining its MSE performance very close to that of it. And it performs much better than many other BMAs such as TSS, NTSS, UCDBS and NPDS.