Air Force Command College

Beijing, China

Air Force Command College

Beijing, China
Time filter
Source Type

Ying Y.,Dalian University of Technology | Tian D.,Dalian University of Technology | Wu L.,Air Force Command College
2016 2nd IEEE International Conference on Computer and Communications, ICCC 2016 - Proceedings | Year: 2017

Mobile learning is another new learning model after digital learning. It is a new hotspot in the field of educational technology, but also a driver of developing modern distance education. Providing new possibilities for the teaching by applying mobile technology has become a research hotspot in the field of education technology. This article mainly introduced the connotation of mobile learning, analyzed the research status and development trend of mobile learning, and proposed the theoretical significance of mobile learning research on modern distance education. © 2016 IEEE.

Wang H.-Y.,Beihang University | Wu W.-Q.,Beihang University | Xue X.-F.,Air Force Command College | Zhao Y.-W.,Beihang University
Guangxue Jingmi Gongcheng/Optics and Precision Engineering | Year: 2012

To improve the precision, update rate and the anti-noise ability of star sensors, this study was focused on the extraction of star images. Firstly, the criterion to confirm whether a pixel attributes to the same star coverage with the local maximum pixel was established according to the gray distributing features of star images. Then, several kinds of methods for image extraction were introduced, such as the block division of imaging array, and the prediction of background noise. Finally, by regarding the peak value pixel as the origin of the circular region growing, the local region growing criterion was set up successfully based on the gray distributing features of star images. The simulation conducted in the case of no noises shows that all of the simulated star images in the reference star map can be extracted successfully, and the sub-pixel location accuracy is 0.028 2 pixel by using centroid method. Moreover, under upmost adverse condition with a Gaussian noise mean value of 20 and standard variance as high as 2.5, the success extraction rate can still reach 86.11% with a decreased centroiding accuracy of 0.219 6 pixel. The test about a faint star image in a star map with poor uniformity and a low SNR of 4.9 dB also proves the excellent detection ability of the proposed method, and it shows advantages of good real-time property and high correct extracting rate for star images.

Weng X.,PLA Air Force Aviation University | Yan X.,PLA Air Force Aviation University | Liu W.,General logistics of Xian Air Force Flight Institute | Liang L.,PLA Air Force Aviation University | Li X.,Air Force Command College
Advanced Materials Research | Year: 2013

In order to study the influence of interface bond condition between new and old cement concrete pavement on overlay performance, the three-dimensional finite element model of the airport double-layer pavement was established. The pavement overlay's load stress and deflection were analyzed, the coupling coefficient between new and old cement concrete pavement was calculated based on the bottom of overlay deflection basin shape factor. The results show that the coupling coefficient reflects the degrees of interface bond condition well. Poor interface bond condition increases the overlay's load stress and deflection. The points that more closely distance from the wheels load center, the bigger the pavement overlay's load stress and deflection is. Therefore, more attention should be paid to the interface bond condition during the airport pavement overlay's designs and constructions. © (2013) Trans Tech Publications, Switzerland.

Hua Y.-G.,Air Force Command College | Sun J.-B.,Air Force Command College | Xu H.-J.,PLA Air Force Aviation University
Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice | Year: 2010

The emphasis is describing C4ISR system how to affect damage progress. Using a kind of effect-gene modeling approach, a C4ISR system vector space model was put forward. It is composed of three vectors: system performance, personnel behavior and man-machine communion. The quantitative guideline of communication support ability was obtained with fuzzy synthetic evaluation. By analyzing two cases, the validity and feasibility of model were validated. Work outcome can be used on combat effectiveness evaluation as effect-gene.

Ren J.-L.,PLA Air Force Aviation University | Xing Q.-H.,PLA Air Force Aviation University | Li L.-Y.,PLA Air Force Aviation University | Jia Z.,Air Force Command College
Tien Tzu Hsueh Pao/Acta Electronica Sinica | Year: 2015

This paper introduced a distributed computing method to study the scheduling problem in multi-sensor systems. According to the features of these sensors which were usually deployed at different locations, it redesigned C2 (Command and Control) module and sensor module, and discussed information interaction procedure between two modules. Then it established a sensor-target detection match degree computing model which involved task decomposition and minimal scheduling period methods. A self-adaptive probability particle swarm optimization (SAPPSO) algorithm for scheduling program was given. In SAPPSO, particle fitness value was based on different probabilities, which reflected the thinking of particle during iteration process. Experimental results showed that SAPPSO algorithm converged quickly, especially in the previous iteration period, which enabled SAPPSO to fulfill the requirements of real-time and high efficiency for scheduling. ©, 2015, Chinese Institute of Electronics. All right reserved.

Liu Q.-Z.,Air Force Command College
Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice | Year: 2011

On the basis of the traditional AHP/ANP, a new decision making approach - MC-ANP (analytic Network Process based on finite state homogeneous Markov chain) - was proposed. In this approach we have used a direct graph to define the criteria and the dominance relations among them, have quantified the relations of dominations through comparison of criteria, and have described criteria dominance relations using the matrix of state transition of the Markov chain. This approach has focused on the synthesis of the dominance relations, has provided two synthetic models (among which the multiply model can be used to solve rank reverse problem thoroughly), and has pointed out the confusion existed in the traditional ANP using Cesaro mean limit. In the MC-ANP, the decision problems are classified in two categories: i) ranking the alternatives, the process of the solution is to find the specific left eigenvectors of eigenvalue 1 of matrix of state transition probability of the Markov chain; ii) ranking the criteria (no alternative), the solution is the right eigenvector of eigenvalue 1 of matrix of state transition probability of the Markov chain.

Jia J.,Institute of Military Operations Research and Analysis | Zhan X.-S.,Institute of Military Operations Research and Analysis | Cheng W.-J.,Air Force Command College
Xitong Fangzhen Xuebao / Journal of System Simulation | Year: 2012

The system framework of cyberwar's synthetical ability was built by three subability, such as reconnaissance, attack and defence. Through analyzing this system, the key index of evaluating the subability and the gray association analysis model of cyberwar's synthetical ability were taken out. At last, three objects's cyberwar's synthetical ability was analyzed and evaluated through the model. © copyright.

Cheng W.,Air Force Command College | Zhan X.,Academy of Military Science | Zhang S.,Air Force Command College
Proceedings - 2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2011 | Year: 2011

Security has become the key issue in the development of large-scale information system. Piling security products and security technologies simply rather than functional integration and making full use of these products and technologies will cause resource wasting, and not meet the needs for flexible and diverse security requirements. This paper proposes a security architecture design based on SOA. Firstly, security devices and technologies are decomposed into basic security components which form the basic security service layer. Secondly, various extended security components that make up the extended security service layer are realized based on functional combination and process control. Then security services are provided through these two levels for upper security applications. At last, this paper gives the core architecture design of the security service core for dealing with the scalability bottlenecks in distributed system. The design solves effectively the security of large-scale information system. © 2011 IEEE.

Dong F.-Y.,PLA Air Force Aviation University | Lei H.-M.,PLA Air Force Aviation University | Li J.,PLA Air Force Aviation University | Shao L.,PLA Air Force Aviation University | Chen Z.-X.,Air Force Command College
Yuhang Xuebao/Journal of Astronautics | Year: 2012

Considering the weak robustness of dynamic inversion control, an incremental dynamic inversion control law for missiles with tracking differentiator is designed. Firstly, the over-load control model of the missile is established, which can be divided into the fast loop and the slow loop. Then through the feedback of state rate, the incremental dynamic inversion control law is proposed for each loop, and its robustness is analyzed. During the design process, the fast tracking differentiator is introduced to solve the immeasurability problem of state rate. Simulation result shows that the proposed control law has excellent robustness.

Wang Y.,Air Force Command College | Sun J.-B.,Air Force Command College | Xiao M.-Q.,PLA Air Force Aviation University | Luo J.-X.,PLA Air Force Aviation University
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics | Year: 2016

Dynamic weapon-target assignment (WTA) problem is one of the critical problem when processing the battlefield command control and decision. The WTA algorithm makes the decision at the gap of two attack periods, which needs to be calculated efficiently.When using the battlefield assistant system to make WTA decision, it is a reasonable concept to utilize the machine learning method, make new decision from the known decision to avoid the need of searching new target assignment all over again. By using this concept, an interval type-2 fuzzy K-nearest neighbors(IT2FKNN) classifier usage on the WTA problem is proposed, by using the result from branch and bound to train the model, a parrallel IT2FKNN classifier is built to infer the assignment result. The proposed method is tested to be able to make a quick decision on the WTA problem. © 2016, Editorial Office of Systems Engineering and Electronics. All right reserved.

Loading Air Force Command College collaborators
Loading Air Force Command College collaborators