Time filter

Source Type

Wang F.,Nanjing Army Command College | Chen L.,PLA Automobile Management Institute
Proceedings of the 2nd International Conference on Intelligent Control and Information Processing, ICICIP 2011 | Year: 2011

Maneuver is one of CGF action. For making CGF successfully maneuver in complex battlefield environment, firstly, the model of battlefield environment was established in the way of the rasterization. Second, the CGF model was established according to the maneuver description, and various CGF' behaviors including planning, movement, dodge, pursuit, escape, target track and so on, were considered as keys to be studied on this base. Third, in order to do with the route planning for CGF maneuver in the battlefield, the fitness function of genetic algorithm was improved. Forth, according to the course of the maneuver, the algorithm process of CGF maneuver planning was designed and explained. On these bases, the way of CGF maneuver planning was verified through an simulation experiment of maneuver based on a scenario. Finally, the research perspective of CGF maneuver planning was directed. © 2011 IEEE.

Li X.,Beijing Institute of Technology | Xu H.,Wuxi Institute of Technology | Lu H.,Nanjing Army Command College
Proceeding - 6th International Conference on Networked Computing and Advanced Information Management, NCM 2010 | Year: 2010

In order to enhance the resources limited wireless sensor network the volume of throughout and the transmission reliability, the paper introduce the multicast routing network code technology to the unicast routing wireless sensor network. In this foundation, the time delay and the energy expenses which will bring to the stochastic linear network code makes the improvement through the node cooperation. The simulation result indicated that, compares with the opportunity route data transmission method, the cooperation network code strategy full use space and time reusability, reduced the data transmission time delay, enhanced the wireless sensor network volume of throughout.

Du Z.,Nanjing Army Command College | Chen C.,National University of Defense Technology | Kong D.,National University of Defense Technology
Military Operations Research | Year: 2014

The development of a course of action (COA) is a key step in military planning. Literature on COA development only presents unilateral actions of friendly forces. Considering the antagonism of war, we propose models that contain actions of both the friendly force and the enemy based on multistage games. The influence net is used to analyze the uncertain relationships between actions and battlefield situations. Models of multistage games with complete and incomplete information are set up separately to handle different conditions. Numerical examples illustrate the models and solutions, which show that the developed COA is suitable for antagonistic situations.

Ouyang Z.,National University of Defense Technology | Gao Y.,National University of Defense Technology | Zhao Z.,Army Unit 61886 | Wang T.,Nanjing Army Command College
Proceedings - 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011 | Year: 2011

Data streams mining has become a novel research topic of growing interest in knowledge discovery. Because of the high speed and huge size of data set in data streams, the traditional classification technologies are no longer applicable. In recent years a great deal of research has been done on this problem, most intends to efficiently solve the data streams mining problem with concept drift. This paper presents the state-of-the-art in this field with growing vitality and introduces the methods for detecting concept drift in data stream, then gives a critical summary of existing approaches to the problem, including Stagger, FLORA, MetaL(B), MetaL(IB), CD3, CD4, CD5, OLIN, CVFDT and different ensemble classifiers. At last, this paper explores the challenges and future work in this field. © 2011 IEEE.

Duan C.-Y.,National University of Defense Technology | Zhang W.-M.,National University of Defense Technology | Ye J.-L.,Nanjing Army Command College | Yu B.,National University of Defense Technology
Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics | Year: 2010

Mapping from operational domain to technology domain is full of difficulties, but it is also the emphasis of developing requirements of an equipment system. Therefore, an approach to matching capabilities towards tasks, which is the key to the mapping, is put forward. The structure of the measures of requirements of an equipment system is studied. Requirements are expressed as task needs, capability needs and capability gap. Capability needs and task needs are related with system function and operational activity. Accordingly the process is divided into four phases to get them. Included are operational task analysis, function and activity analysis, operational capability analysis and capability gap analysis. In order to help communicate requirements clearly, the necessary models in every phase are provided. Finally, an example about an air interdiction operation is presented for specifying the relations among the phases and the objects of every phase. The example shows that the approach is feasible, effective and promising.

Discover hidden collaborations