Academy of National Defense Information

Wuhan, China

Academy of National Defense Information

Wuhan, China
Time filter
Source Type

Lu Y.,Academy of National Defense Information | Cai F.,Academy of National Defense Information | Zhou M.,Academy of National Defense Information
Xitong Fangzhen Xuebao / Journal of System Simulation | Year: 2017

For the actual need of the communication networks modeling in combat command simulation, a modeling method of background traffic was proposed which was oriented towards counter-command simulation training under the guidance of basic idea of index modeling. The background traffic model was designed and the simulation verification was carried on. The results indicate that such method is able to generate background traffic rapidly and efficiently, meeting the requirement of simulation training. © 2017, The Editorial Board of Journal of System Simulation. All right reserved.

Zhu X.-T.,Academy of National Defense Information | Zhu X.-T.,Chongqing Communication College | Liu Y.-L.,Shenyang Institute of Engineering | Li T.-Z.,Chongqing Communication College
Tien Tzu Hsueh Pao/Acta Electronica Sinica | Year: 2017

This paper presents a cyclostationary difference-based anti-jamming method by blindly extracting direct sequence spread spectrum signal. Aiming at approximate independence among source signals, an anti-jamming model based on blind source separation is established for direct sequence spread spectrum communication. And then, by using typical extreme points of cyclic autocorrelation function, a characteristic parameter called second-order cyclic difference degree is defined based on cyclostationary difference to distinguish between direct sequence spread spectrum signal and jamming. Finally pattern recognition is used to extract expected signal and suppress jamming by comparing the values of characteristic parameter, so as to achieve the purpose of anti-jamming. Simulation results show that, when the NSNR (Normalized Signal to Noise Ratio) is 9 dB and the SJR (Signal to Jamming Ratio) is -40 dB, the direct de-spreading/demodulation signal achieves the bit error rate (BER) of nearly IE-0.3, while the proposed algorithm achieves the bit error rate of as low as IE-3, which can extract the direct spread signal from the strong jamming effectively. © 2017, Chinese Institute of Electronics. All right reserved.

Zhu X.,Academy of National Defense Information | Liu Y.,Shenyang Institute of Engineering
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS | Year: 2017

A blind source separation-based anti-jamming method for frequency hopping (FH) communication is proposed in this paper by space pre-whitening. Aiming at short-Time stationarity of the FH signal and non-vanishing time correlation of the colored noise, the impact of colored noise is weaken through space pre-whitening by using joint difference correlation matrix established in the selected characteristic window. Then, in order to achieve the purpose of anti-jamming, the communication signal and the jamming are separated by joint approximate diagonalization of time-delayed autocorrelation matrix set obtained in a series of characteristic windows. Simulation results show that the new algorithm has better separation effect and lower bit error rate (BER) than the JADE or fast ICA algorithm under the condition of low normalized signal to noise ratio (NSNR). © 2016 IEEE.

Chen G.,Academy of National Defense Information | Yang F.Y.,Beijing University of Posts and Telecommunications
Advanced Materials Research | Year: 2014

The general design of virtual maintenance platform based on 3D simulation is given to solve the difficulty of maintenance training for large equipment. Firstly, primary functions of platform are defined by comparing common platform with application system. Secondly, component structure and interaction structure of platform are designed based on common thinking of subsystem-serverice. Finally, technology systems of platform including common simulation framework and training basing on 3D simulation are also presented to realize simulation software. It will provide beneficial reference for maintenance training simulation of other similar large weapon equipment. © (2014) Trans Tech Publications, Switzerland.

Peng S.Q.,Academy of National Defense Information | Tian Z.Y.,Academy of National Defense Information
Applied Mechanics and Materials | Year: 2014

In order to detect Internet Explorer browser vulnerabilities, the miner distributed with test method based on the DOM tree are designed and implemented, it also implemented dynamic selection of the test case execution, experiment results found 50 IE vulnerabilities. © (2014) Trans Tech Publications, Switzerland.

Peng Y.J.,Academy of National Defense Information | Peng Y.,Transportation Institute | Liu C.F.,Academy of National Defense Information
Advanced Materials Research | Year: 2014

With the development of database technology as well as the widespread application of Database management system, our capabilities of both generating and collecting data have been increasing rapidly. In addition, popular use of the World Wide Web as a global information system has flooded us with a tremendous amount of data and information. This explosive growth in stored or transient data has generated an urgent need for new techniques and automated tools that can intelligently assist us in transforming the vast amounts of data into useful information and knowledge. The Data Mining technology brought forward. Data mining, also popularly referred to knowledge discovery from data (KDD), is the automated or convenient extraction of patterns representing knowledge implicitly stored or captured in large databases, data warehouses, the Web, other massive information repositories, or data streams. Data mining is a multidisciplinary field, drawing work from areas including database technology, machine learning, statistics, pattern recognition, information retrieval, neural networks, knowledge-based systems, artificial intelligence, high-performance computing, and data visualization. Database and Information Technology in the Decision Tree of is very important for the military. The Data Mining had been applied and studied in these years, and it has been applied in many domains successfully, such as business, finance and medical treatment. However, little is applied in communication construction scheme. © (2014) Trans Tech Publications, Switzerland.

Shen J.-J.,Academy of National Defense Information | Xu Y.-Q.,Academy of National Defense Information
Applied Mechanics and Materials | Year: 2014

Simulative training should include network simulation in information age, and network simulation needs to meet the real-time requirements. For the real-time implementation of Tactical Internet (TI) simulation, the paper proposed a "water-wave type" topology updating method for simulation, which solved the real-time problem of tactical radio network topology updating simulation. Secondly, the paper proposed a data packet transmission method based on characteristic information, which solved the large data problem of TI simulation, and then the real-time of simulation was improved. Finally, the paper proposed a transmission success-rate calculating method based on prediction, which solved the real-time simulation problem of transmission. The practical application proved that the paper’s methods had good effect. © (2014) Trans Tech Publications, Switzerland.

Zhang J.,Academy of National Defense Information | Bai R.,Hebei Normal University
Lecture Notes in Electrical Engineering | Year: 2013

An improved FMCW (frequency modulation continuous wave) radar system is introduced. The system includes perfect binary sequences pairs theory, the method using auto-correlation functions to determine IF (intermediate- frequency) signal, and measure distance and velocity, enable itself get constant development with theoretical progress. The new system only changing program of emission signal can be realized by DSP, which can reduce the fake alert notably so as to be applied more widely. © 2013 Springer-Verlag.

Peng Y.J.,Academy of National Defense Information | Zhu P.F.,Academy of National Defense Information
Applied Mechanics and Materials | Year: 2014

Based on the designing of information and communication networking training needs analysis simulation system, this paper studies some key technology about needs analysis simulation system’s and some practical problems during designing, combining with the primary work done by self. At first, based on the summary of the basic concepts of information and communication networking training needs analysis simulation system and domestic and overseas development status, needs analysis simulation system and its modeling, the technique of simulation is studied, and the basic concept and model frame of needs analysis simulation system’s are summarized. In succession, the primary project of simulation training system is demonstrated and designed, including analyzing the requirement of the system function, putting forward the principle of system design, confirming the framework of hardware and software and the configuration of computer, as well as doing some top design on the software system of simulation training such as module partition and function describing. © (2014) Trans Tech Publications, Switzerland.

Yong L.,Academy of National Defense Information
Proceedings of 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2015 | Year: 2015

Take into account the damage probability of all nodes and links, arithmetic of network connectivity between two nodes basing on damage probability is advanced. The arithmetic can be applied to estimation on network connectivity when major damage occurs in communication network establishment. A method to search routes between two nodes through removing the inner nodes in associated matrix is presented, concept of disconnected malfunction groups between nodes is brought forward, the arithmetic of searching them is analysed, and the calculation formula of network connectivity between two nodes basing on damage probability of all nodes and links is educed. In the end, an instance of this arithmetic is presented. © 2015 IEEE.

Loading Academy of National Defense Information collaborators
Loading Academy of National Defense Information collaborators