Academy of National Defense Information

Wuhan, China

Academy of National Defense Information

Wuhan, China

Time filter

Source Type

Chen G.,Academy of National Defense Information | Yang F.Y.,Beijing University of Posts and Telecommunications
Advanced Materials Research | Year: 2014

The general design of virtual maintenance platform based on 3D simulation is given to solve the difficulty of maintenance training for large equipment. Firstly, primary functions of platform are defined by comparing common platform with application system. Secondly, component structure and interaction structure of platform are designed based on common thinking of subsystem-serverice. Finally, technology systems of platform including common simulation framework and training basing on 3D simulation are also presented to realize simulation software. It will provide beneficial reference for maintenance training simulation of other similar large weapon equipment. © (2014) Trans Tech Publications, Switzerland.


Peng S.Q.,Academy of National Defense Information | Tian Z.Y.,Academy of National Defense Information
Applied Mechanics and Materials | Year: 2014

In order to detect Internet Explorer browser vulnerabilities, the miner distributed with test method based on the DOM tree are designed and implemented, it also implemented dynamic selection of the test case execution, experiment results found 50 IE vulnerabilities. © (2014) Trans Tech Publications, Switzerland.


Peng Y.J.,Academy of National Defense Information | Peng Y.,Transportation Institute | Liu C.F.,Academy of National Defense Information
Advanced Materials Research | Year: 2014

With the development of database technology as well as the widespread application of Database management system, our capabilities of both generating and collecting data have been increasing rapidly. In addition, popular use of the World Wide Web as a global information system has flooded us with a tremendous amount of data and information. This explosive growth in stored or transient data has generated an urgent need for new techniques and automated tools that can intelligently assist us in transforming the vast amounts of data into useful information and knowledge. The Data Mining technology brought forward. Data mining, also popularly referred to knowledge discovery from data (KDD), is the automated or convenient extraction of patterns representing knowledge implicitly stored or captured in large databases, data warehouses, the Web, other massive information repositories, or data streams. Data mining is a multidisciplinary field, drawing work from areas including database technology, machine learning, statistics, pattern recognition, information retrieval, neural networks, knowledge-based systems, artificial intelligence, high-performance computing, and data visualization. Database and Information Technology in the Decision Tree of is very important for the military. The Data Mining had been applied and studied in these years, and it has been applied in many domains successfully, such as business, finance and medical treatment. However, little is applied in communication construction scheme. © (2014) Trans Tech Publications, Switzerland.


Shen J.-J.,Academy of National Defense Information | Xu Y.-Q.,Academy of National Defense Information
Applied Mechanics and Materials | Year: 2014

Simulative training should include network simulation in information age, and network simulation needs to meet the real-time requirements. For the real-time implementation of Tactical Internet (TI) simulation, the paper proposed a "water-wave type" topology updating method for simulation, which solved the real-time problem of tactical radio network topology updating simulation. Secondly, the paper proposed a data packet transmission method based on characteristic information, which solved the large data problem of TI simulation, and then the real-time of simulation was improved. Finally, the paper proposed a transmission success-rate calculating method based on prediction, which solved the real-time simulation problem of transmission. The practical application proved that the paper’s methods had good effect. © (2014) Trans Tech Publications, Switzerland.


Zhang J.,Academy of National Defense Information | Bai R.,Hebei Normal University
Lecture Notes in Electrical Engineering | Year: 2013

An improved FMCW (frequency modulation continuous wave) radar system is introduced. The system includes perfect binary sequences pairs theory, the method using auto-correlation functions to determine IF (intermediate- frequency) signal, and measure distance and velocity, enable itself get constant development with theoretical progress. The new system only changing program of emission signal can be realized by DSP, which can reduce the fake alert notably so as to be applied more widely. © 2013 Springer-Verlag.


Peng Y.J.,Academy of National Defense Information | Zhu P.F.,Academy of National Defense Information
Applied Mechanics and Materials | Year: 2014

Based on the designing of information and communication networking training needs analysis simulation system, this paper studies some key technology about needs analysis simulation system’s and some practical problems during designing, combining with the primary work done by self. At first, based on the summary of the basic concepts of information and communication networking training needs analysis simulation system and domestic and overseas development status, needs analysis simulation system and its modeling, the technique of simulation is studied, and the basic concept and model frame of needs analysis simulation system’s are summarized. In succession, the primary project of simulation training system is demonstrated and designed, including analyzing the requirement of the system function, putting forward the principle of system design, confirming the framework of hardware and software and the configuration of computer, as well as doing some top design on the software system of simulation training such as module partition and function describing. © (2014) Trans Tech Publications, Switzerland.


Chen Z.Y.,Academy of National Defense Information | Zou Z.L.,Academy of National Defense Information | Peng Y.J.,Academy of National Defense Information
Advanced Materials Research | Year: 2014

In order to research on applied technology in assessing the application effectiveness of command information system (CIS) based on digital command of CIS, the article sticks tightly the army operations during wartime, setting up the index system of the effectiveness assessment. The paper putts forward the whole assessment index architecture. By computing index gray white clustering coefficient and weight vector and setting up multilayers gray clustering effectiveness valuation mode, the thesis uses the judgment matrix of effectiveness valuation, assessing the effectiveness of the application of CIS under the based on digital command mode and based on audio command mode. Based on the valuation conclusion, the article explains these important factors to the system effectiveness and provides a research basis for making some scientific improvement measures. © (2014) Trans Tech Publications, Switzerland.


Chen G.,Academy of National Defense Information | Cai J.P.,Academy of National Defense Information | Yang J.,Academy of National Defense Information
Advanced Materials Research | Year: 2014

Network security situation awareness is an effective way to analysis security situation of complex network.The concept and model of network security situational awareness was introduced.A new model of network security situation awareness was proposed. Considering the characteristics of multi-source information in network security research, a security situation awareness algorithm based on information fusion was adopted. This algorithm advanced modified D-S evidence theory, gets the values of security situation awareness of network by data source level fusion, host-level fusion and system-level fusion. The results can reflect the general security state of network. © (2014) Trans Tech Publications, Switzerland.


Yong L.,Academy of National Defense Information
Proceedings of 2015 IEEE Advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2015 | Year: 2015

Take into account the damage probability of all nodes and links, arithmetic of network connectivity between two nodes basing on damage probability is advanced. The arithmetic can be applied to estimation on network connectivity when major damage occurs in communication network establishment. A method to search routes between two nodes through removing the inner nodes in associated matrix is presented, concept of disconnected malfunction groups between nodes is brought forward, the arithmetic of searching them is analysed, and the calculation formula of network connectivity between two nodes basing on damage probability of all nodes and links is educed. In the end, an instance of this arithmetic is presented. © 2015 IEEE.


Shen J.J.,Academy of National Defense Information | Chen G.,Academy of National Defense Information | Cai J.P.,Academy of National Defense Information
Applied Mechanics and Materials | Year: 2014

Basing on reliability requirement of command business composite services in joint command information system, a redundancy based reliability evaluation model and computing method was put forward learning from thought of software fault-tolerant. Taking reliability as the primary consideration, the process of command business composite services was limited to finite recursive nested of the most commonly used structures including sequence flow, branch flow, parallel and cyclic flow in the reliability evaluation model. According to this model, the computation method was given and its flow diagram was designed. It will provide beneficial reference for measuring and improving reliability of command business service in other similar command information systems. © (2014) Trans Tech Publications, Switzerland.

Loading Academy of National Defense Information collaborators
Loading Academy of National Defense Information collaborators