Time filter

Source Type

Li X.,Beijing Institute of Technology | Xu H.,Wuxi Institute of Technology | Lu H.,Nanjing Army Command College
Proceeding - 6th International Conference on Networked Computing and Advanced Information Management, NCM 2010 | Year: 2010

In order to enhance the resources limited wireless sensor network the volume of throughout and the transmission reliability, the paper introduce the multicast routing network code technology to the unicast routing wireless sensor network. In this foundation, the time delay and the energy expenses which will bring to the stochastic linear network code makes the improvement through the node cooperation. The simulation result indicated that, compares with the opportunity route data transmission method, the cooperation network code strategy full use space and time reusability, reduced the data transmission time delay, enhanced the wireless sensor network volume of throughout.


Wang F.,Nanjing Army Command College | Chen L.,PLA Automobile Management Institute
Proceedings of the 2nd International Conference on Intelligent Control and Information Processing, ICICIP 2011 | Year: 2011

Maneuver is one of CGF action. For making CGF successfully maneuver in complex battlefield environment, firstly, the model of battlefield environment was established in the way of the rasterization. Second, the CGF model was established according to the maneuver description, and various CGF' behaviors including planning, movement, dodge, pursuit, escape, target track and so on, were considered as keys to be studied on this base. Third, in order to do with the route planning for CGF maneuver in the battlefield, the fitness function of genetic algorithm was improved. Forth, according to the course of the maneuver, the algorithm process of CGF maneuver planning was designed and explained. On these bases, the way of CGF maneuver planning was verified through an simulation experiment of maneuver based on a scenario. Finally, the research perspective of CGF maneuver planning was directed. © 2011 IEEE.


Zhang G.,NanJing Army Command College | Li C.,NanJing Army Command College
Advances in Intelligent and Soft Computing | Year: 2011

According to the idea of Kauffman's NK model, and considering the meaning of the measurement of complexity that a system possessing, a method of how to measure the complexity of a system was built. Here, a system was divided to three parts: itself, input and output. Each part had its elements, and among all the elements of the three parts there are relations, so the matrixes can be built based on the relations, therefore, with the idea of NK model, the complexity can be calculated through the matrixes. © 2011 Springer-Verlag Berlin Heidelberg.


Zhang G.,NanJing Army Command College | Shen S.,NanJing Army Command College
ICCASM 2010 - 2010 International Conference on Computer Application and System Modeling, Proceedings | Year: 2010

Based on the complex networks theory and military theory, we analyzed the static and dynamic relations of the command entities and combat entities, and reached the forming mechanism of combat system networks; then we researched the common structure of network of combat system, which consist of reconnaissance forces, command department, attack forces and target connected together by reconnaissance network, command and control network and engagement network; we also discussed the methods of measurement of networked effects. Finally we validated the truth that the networked effects of information age combat systems are bigger than that of traditional combat systems, and gave the analysis of the causes from the structure of network of combat systems with adjacency matrix methods. © 2010 IEEE.


Bai C.-S.,NanJing Army Command College | Zhu J.,NanJing Army Command College
ICCASM 2010 - 2010 International Conference on Computer Application and System Modeling, Proceedings | Year: 2010

As one of the critical technologies of radio frequency identification system, anti-collision technology decides the speed and accuracy of reading tags. Based on analysis of the old binary search algorithm, this paper provides a new binary search algorithm with improved performance. By applying this algorithm, the reader returns to the collision point of the previous record after successfully choosing the proper tag every time, and sends the corresponding sequence number to choose the next tag, thus avoiding the process of sending the maximum sequence number to make selection among the remaining tags. As a result, the times of query needed to make selection could be reduced, and the transmmision and identification efficiency of the system improved. © 2010 IEEE.


Li X.,Nanjing Artillery Academy | Zhan H.,Nanjing Artillery Academy | You K.,Nanjing Artillery Academy | Cheng Y.,Nanjing Army Command College
Proceedings - 2011 International Conference of Information Technology, Computer Engineering and Management Sciences, ICM 2011 | Year: 2011

In order to construct optimal fire assignment mechanism and improve artillery combat ability, artillery fire striking system formation and its fire assignment target model are established and analyzed, using genetic algorithm (GA) to study fire optimal assignment, dynamical arrangement and combination of various cannon, rocket launcher, anti-tank missile and ground to ground campaigmn tactics missile units. By fire assignment GA analysis and a combat test simulation, artillery fire application mode is more accurate and reliable, and its whoe operational efficiency are improved greatly. This research can provide good decision-making for constructing network-centric warfare joint fire striking system design. © 2011 IEEE.


Du Z.,Nanjing Army Command College | Chen C.,National University of Defense Technology | Kong D.,National University of Defense Technology
Military Operations Research | Year: 2014

The development of a course of action (COA) is a key step in military planning. Literature on COA development only presents unilateral actions of friendly forces. Considering the antagonism of war, we propose models that contain actions of both the friendly force and the enemy based on multistage games. The influence net is used to analyze the uncertain relationships between actions and battlefield situations. Models of multistage games with complete and incomplete information are set up separately to handle different conditions. Numerical examples illustrate the models and solutions, which show that the developed COA is suitable for antagonistic situations.


Huang J.-M.,Nanjing Army Command College | Gao D.-P.,Nanjing Army Command College
Xitong Fangzhen Xuebao / Journal of System Simulation | Year: 2012

Battle is taking on typical complicated and nonlinear characteristics with the more and more profound application of information technology in military field. The System Dynamics model of the battle in information age based on OODA loop was brought out according to the theory and method of System Dynamics and the process of the battle was simulated. The model reflects better the nature of battle in information age. Result of the simulation will provide the commander with the quantitative theoretical support and policy orientation needed to organize, command and win the war in information condition.


Ouyang Z.,National University of Defense Technology | Gao Y.,National University of Defense Technology | Zhao Z.,Army Unit 61886 | Wang T.,Nanjing Army Command College
Proceedings - 2011 8th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2011 | Year: 2011

Data streams mining has become a novel research topic of growing interest in knowledge discovery. Because of the high speed and huge size of data set in data streams, the traditional classification technologies are no longer applicable. In recent years a great deal of research has been done on this problem, most intends to efficiently solve the data streams mining problem with concept drift. This paper presents the state-of-the-art in this field with growing vitality and introduces the methods for detecting concept drift in data stream, then gives a critical summary of existing approaches to the problem, including Stagger, FLORA, MetaL(B), MetaL(IB), CD3, CD4, CD5, OLIN, CVFDT and different ensemble classifiers. At last, this paper explores the challenges and future work in this field. © 2011 IEEE.


Zheng S.-M.,PLA University of Science and Technology | Zheng S.-M.,Nanjing Army Command College | Miao Z.,PLA University of Science and Technology | Song Z.-L.,PLA University of Science and Technology | Gao Z.-N.,Nanjing Army Command College
Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition) | Year: 2012

The data in Internet has a large scale and dynamic peculiarity and the discovered knowledge or rules are likely to be imprecise or incomplete generally. Fuzzy theory and information entropy were introduced into the clustering analysis to overcome the difficulties and achieve the best results of clustering by looking for Fuzzy similarity upper approximation. The process of embedding the Fuzzy approximation algorithm into the WEKA platform in which the classes and visualization functions of open source WEKA was fully utilized. The Fuzzy approximation algorithms extended the clustering algorithm in WEKA. The experiment proves that it has a higher accuracy and convergence for the large-scale data sets that are anomalous and noise.

Loading Nanjing Army Command College collaborators
Loading Nanjing Army Command College collaborators