Time filter

Source Type

Zhang J.,Academy of National Defense Information | Bai R.,Hebei Normal University
Lecture Notes in Electrical Engineering | Year: 2013

An improved FMCW (frequency modulation continuous wave) radar system is introduced. The system includes perfect binary sequences pairs theory, the method using auto-correlation functions to determine IF (intermediate- frequency) signal, and measure distance and velocity, enable itself get constant development with theoretical progress. The new system only changing program of emission signal can be realized by DSP, which can reduce the fake alert notably so as to be applied more widely. © 2013 Springer-Verlag.

Yong L.,Academy of National Defense Information
Proceedings of 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2015 | Year: 2015

Take into account the damage probability of all nodes and links, arithmetic of network connectivity between two nodes basing on damage probability is advanced. The arithmetic can be applied to estimation on network connectivity when major damage occurs in communication network establishment. A method to search routes between two nodes through removing the inner nodes in associated matrix is presented, concept of disconnected malfunction groups between nodes is brought forward, the arithmetic of searching them is analysed, and the calculation formula of network connectivity between two nodes basing on damage probability of all nodes and links is educed. In the end, an instance of this arithmetic is presented. © 2015 IEEE.

Peng Y.J.,Academy of National Defense Information | Peng Y.,Transportation Institute | Liu C.F.,Academy of National Defense Information
Advanced Materials Research | Year: 2014

With the development of database technology as well as the widespread application of Database management system, our capabilities of both generating and collecting data have been increasing rapidly. In addition, popular use of the World Wide Web as a global information system has flooded us with a tremendous amount of data and information. This explosive growth in stored or transient data has generated an urgent need for new techniques and automated tools that can intelligently assist us in transforming the vast amounts of data into useful information and knowledge. The Data Mining technology brought forward. Data mining, also popularly referred to knowledge discovery from data (KDD), is the automated or convenient extraction of patterns representing knowledge implicitly stored or captured in large databases, data warehouses, the Web, other massive information repositories, or data streams. Data mining is a multidisciplinary field, drawing work from areas including database technology, machine learning, statistics, pattern recognition, information retrieval, neural networks, knowledge-based systems, artificial intelligence, high-performance computing, and data visualization. Database and Information Technology in the Decision Tree of is very important for the military. The Data Mining had been applied and studied in these years, and it has been applied in many domains successfully, such as business, finance and medical treatment. However, little is applied in communication construction scheme. © (2014) Trans Tech Publications, Switzerland.

Xie W.-C.,Academy of National Defense Information | Yu X.-H.,China Aerospace Science and Technology Corporation | Zhu P.-F.,Academy of National Defense Information
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics | Year: 2014

To tackle difficulties of C4ISR architecture verification caused by the low efficiency and reusability in the executable model's construction, and to realize the automatic transformation of the executable model by implementing data-centric architecture methodology, a method for the construction of the executable model based on model transformation is proposed. According to the international defense enterprise architecture specification (IDEAS), the operational architecture meta-model is constructed. Mapping relations from architecture meta-model data elements to the core modeling concepts of object Petri-net (OPN) language are studied, and the transformation rules from meta-model data to OPN semantic representation under several work-flow patterns are also presented. To verify the feasibility of this method, a case of air defense C4ISR architecture is given.

Peng S.Q.,Academy of National Defense Information | Tian Z.Y.,Academy of National Defense Information
Applied Mechanics and Materials | Year: 2014

In order to detect Internet Explorer browser vulnerabilities, the miner distributed with test method based on the DOM tree are designed and implemented, it also implemented dynamic selection of the test case execution, experiment results found 50 IE vulnerabilities. © (2014) Trans Tech Publications, Switzerland.

Discover hidden collaborations