Entity

Time filter

Source Type


Wu Y.,Chinese Peoples Liberation Army | Jia J.,Academy of Military Science | Wang H.,Chinese Peoples Liberation Army
Proceedings - 2014 IEEE Workshop on Electronics, Computer and Applications, IWECA 2014 | Year: 2014

To meet the requirements of OSGi distributed processing capabilities from enterprise computing, this paper proposes a convenient way which adds distributed computing capability to OSGi framework and supports interoperation between OSGi and legacy CORBA applications. This is achieved by using CORBA dynamic technology which implements the remote service invocation capability and CORBA naming service which supports remote service discovery capability. In the end, this paper proves the distributed processing capabilities by testing our implementation in a simple scenario with a legacy CORBA application. © 2014 IEEE. Source


Zi-Guang C.,Academy of Military Science | Li-Ping J.,Wuhan Naval University of Engineering | Jian-Chong Z.,Wuhan Naval University of Engineering | Shao-Wu G.,Air force Radar Academy
Lecture Notes in Electrical Engineering | Year: 2012

A serial of new issues need to be tackled before Ad Hoc network is used in military. There are many challenges: the lack of simulation platform of military Ad Hoc network, the difficulty of concept demonstration on maneuver combat, the hardness of quantitative analysis, etc. So, simulation system on maneuver combat is designed; frame and structure of the system are given. Many new issues on maneuver combat are researched: responsibility area programming, maneuver area programming, maneuver route programming, combat capability assessment, etc. This simulation system has a good application foreground. It can raise the cooperation capability of many single weapons. It can strengthen the capability of associated systems. © 2012 Springer-Verlag GmbH. Source


Fu Y.,Beijing University of Posts and Telecommunications | Yu Y.,Beijing University of Posts and Telecommunications | Song M.,Beijing University of Posts and Telecommunications | Zhan X.,Academy of Military Science
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2014

Weighted sequential pattern mining algorithms discover weighted sequences with considering the different significance of each item in a sequence database. But current algorithms have not considered the importance of the itemset-intervals information between the two items in a same itemset. Hence, although a large number of sequences had been discovered, most of them are not useful for analysis. In this study, we propose a new algorithm, called ItemSet-interval Weighted Sequences (ISiWS), to solve the problem about efficient discovering useful sequences. In ISiWS, a matrix structure, called Transaction Bit Matrix (TBM), represents a sequence. ISiWS first uses TBMs to represent the sequences in a sequence database. Then, it utilizes projected technology to discover weighted sequences, and an approximate sequence match algorithm is applied to calculate support of sequences based on their itemset-intervals. Experiments show that ISiWS produces a significantly less number of weighted sequences than those of WSpan. © 2014 Springer International Publishing. Source


Zhong Y.,Tsinghua University | Hao J.,Academy of Military Science | Dai Y.,Tsinghua University
Qinghua Daxue Xuebao/Journal of Tsinghua University | Year: 2012

This paper describes a Hash-chain based anonymous incentive protocol to stimulate forwarding cooperation between nodes in position-based routing for mobile ad-hoc networks (MANET). The protocol uses a Hash-chain based micro-payment mechanism with location-aided routing for MANET to stimulate the real-time forwarding cooperation and to improve the routing performance of the privacy protection routing in untrusted MANET scenarios. Security analyses indicate that this protocol can defend against impersonation attacks and relay attacks in position-based routing while providing privacy to the forwarders. Efficiency analyses show that it stimulates anonymous selfish forwarders in real time. Source


Zhong Y.,Tsinghua University | Hao J.,Academy of Military Science
Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition) | Year: 2014

An estimation method was proposed for the information support efficiency of the network attacks in order to estimate the support efficiency of the network attacks to the information operations. Based on the concept of system entropy, firstly a method was proposed to calculate the weights of the indexes based on the Analytic Hierarchy Process, then a calculation method of the difference of integration system entropy under the network attacks was given and a simulation experiment presented to evaluate the support efficiency of route attacks to a military wireless sensor network. The method can synthetically measure the influence of the network attacks to the information systems, and is a valuable method to estimate the influence of the network attacks to the information operations. Source

Discover hidden collaborations