Entity

Time filter

Source Type

Zhengzhou, China

Jin C.,Air Defence Forces Academy | Pang Z.,Air Defence Forces Academy | Wang X.,Unit 73151 of PLA | Luo Z.,Air Defence Forces Academy | Yin Q.,Air Defence Forces Academy
Lecture Notes in Electrical Engineering | Year: 2015

Peer assessment software is useful as part of mutual assessment in military training to enhance the overall training level. We conducted experiments to obtain a scoring algorithm and the relevant weight on which the software should be developed to score each trainee. The basic algorithm and software procedure contribute to the final scoring of each trainee. By employing a large amount of experimental data, the algorithm and software may provide an accurate method for peer assessment in military training. © Springer-Verlag Berlin Heidelberg 2015.


Liu H.,Air Defence Forces Academy | Gu H.,Air Defence Forces Academy | Hu H.,Air Defence Forces Academy | Yin Q.,Air Defence Forces Academy
Lecture Notes in Electrical Engineering | Year: 2015

A simulation method that uses discrete event simulation for availability evaluation of antiaircraft gun weapon systems is presented based on the distribution characteristic of the RMS time of antiaircraft gun weapon systems. The simulation method can overcome the disadvantages of the analytic method, and can evaluate the availability of complex weapon systems, while RMS time follows any distribution. In the example, the availability of the antiaircraft gun weapon system is evaluated based on the simulation method presented in this paper. The example illuminated that the method is effective for availability evaluation of antiaircraft gun weapon systems. © Springer-Verlag Berlin Heidelberg 2015.


Pang Z.,Air Defence Forces Academy | Li H.,Air Defence Forces Academy | Yu L.,Chinese Naval Aeronautical Engineering Academy | He H.,Air Defence Forces Academy | Li M.,Air Defence Forces Academy
Lecture Notes in Electrical Engineering | Year: 2015

This paper aims to study the principles of man–machine interface design which are expected to give significant theoretical guidance on humanized man– machine interface of the military hardware. It is an important constituent of the military hardware design and an essential aspect for improvement of service life of the military hardware. It adopts man–machine–environment system engineering theory and practical experience in combination of definition, classification and composition of man–machine interface to make this research a creative approach by integration of theory and practice. In accordance with the general requirements of humanized design, the man–machine interface design should follow man-oriented principle, safety principle, high effectiveness principle, economic efficiency principle, comfortableness principle and unity principle. Thus, the concrete design principles proposed in this paper are of great significance to 'two adaptation approaches' and the whole service life of the military hardware, and further promote the development of the military hardware. © Springer-Verlag Berlin Heidelberg 2015.


Li H.,Air Defence Forces Academy | Lu H.,Air Defence Forces Academy | Kang M.,Air Defence Forces Academy | Luo J.,Air Defence Forces Academy
Lecture Notes in Electrical Engineering | Year: 2015

Modern air raid operations are featured by large scale, high intensity and diversified aircraft platforms with complex jammers of strong jamming capability, various jamming methods and broad jamming frequency spectrum. It is actually fairly difficult to make judgment on the threat of air raid targets, as there are many factors that need to be taken into account. This paper analyzes the main factors that may affect the jamming threat of air raid targets, and sets up the analytical model of jamming threat of air raid target by joining altogether nine factors of platform and radar in accordance with multi-attribute decision theory. The model is then applied in the calculation of three jammers and the result agrees fundamentally with the actual situation, therefore providing an effective approach to the jamming threat judgment for land-based air defense operations. © Springer-Verlag Berlin Heidelberg 2015.


Qian Y.-K.,PLA University of Science and Technology | Qian Y.-K.,Air Defence Forces Academy | Chen M.,PLA University of Science and Technology | Ye L.-X.,Air Defence Forces Academy | And 3 more authors.
Ruan Jian Xue Bao/Journal of Software | Year: 2012

Network anomaly detection is very important in order to guarantee the reliable operation of network. Existing methods only utilize temporal correlation or spatial correlation of network traffic individually. Aiming at this deficiency, this paper considers the spatio-temporal correlation of traffic matrix together and puts forward a network-wide anomaly detection method based on MSPCA. The method utilizes the multiscale modeling ability of wavelet transform and dimensionality reduction ability comprehensively to model normal network traffic, and then analyzes residual traffic using Shewart and EWMA control charts. In addition, the MSPCA anomaly detection method is extended to online MSPCA anomaly detection method through applying gliding window mechanism. Real Internet measurement data analyses and simulation experiment analyses show that the detection performance of MSPCA algorithm is superior to PCA algorithm and KLE algorithm proposed recently. Analyses also show that the detection performance of online MSPCA algorithm is close to MSPCA algorithm, and the single step execution time of online MSPCA algorithm is very short, which can fully meet the need of real-time detection. © 2012 ISCAS.

Discover hidden collaborations