PLA Academy of National Defense Information

Wuhan, China

PLA Academy of National Defense Information

Wuhan, China
SEARCH FILTERS
Time filter
Source Type

Wang M.L.,PLA Academy of National Defense Information
Advanced Materials Research | Year: 2013

This paper describes the basic ideas of several commonly used intelligent optimization algorithms, summarizes their essential features, classifies them, and points out the improvement directions. © (2013) Trans Tech Publications, Switzerland.


Li W.X.,PLA Academy of National Defense Information
Lecture Notes in Electrical Engineering | Year: 2014

Owning to the lack of overall security strategy, the current solutions to network security cannot be analyzed and studied to construct network security system from the perspectives of system and control, and there is a shortage of controllability, objectivity, and stability in the network. In this paper, component-based distributed network security control system architecture has been proposed and established by employing the principles and methods of the network cybernetics. It cannot only improve the security control efficiency and decrease the control complexity, but also strengthen the flexibility and reliability of the security control. © Springer-Verlag Berlin Heidelberg 2014.


Wang X.L.,PLA Academy of National Defense Information
Applied Mechanics and Materials | Year: 2013

The ordinary cloud system is confronted with various threats in trust and security perspective, which have influenced the extensive use of cloud system. Aiming at the defects in the trusted secure design of the ordinary cloud system frame, a trusted secure cloud system has been designed. © (2013) Trans Tech Publications, Switzerland.


Chen G.,PLA academy of national defense information
Advanced Materials Research | Year: 2013

Aiming at the difficulty of large weapon equipment operation training simulation, GL Studio software tool was adopted based on VR technology. A hierarchy structure was put forward to simulate all kinds of integrating equipment system, single equipment and operation unit. Key technologies including Model database structure optimization, LOD, operation unit motion simulation based on DOF and screen show simulation based on switch are also put forward in detail. Finally, a simulation example of VR based large weapon equipment operation simulation training system was presented to prove its feasibility. © (2013) Trans Tech Publications, Switzerland.


Wang M.L.,PLA Academy of National Defense Information
Applied Mechanics and Materials | Year: 2013

Ant colony algorithm is a kind of intelligent algorithm imitating the group behavior of ants. The positive feedback mechanism is not only its advantage which makes the ant colony algorithm quickly converge to optimal solutions of a problem, but also its defect which makes it easy to fall into the local optimal solutions. ACS and MMAS are the two typically improved ant algorithms by introducing the pseudo random probability selection rule and maximum-minimum pheromone restriction rule to accelerate the converging speed of this algorithm and avoid falling into local optimal solutions. At present, there is no algorithm put forward to improve the algorithm using the effect of the heuristic information. This paper presents an improved ant colony algorithm based on the heuristic information of direction, and provides a new idea for the study on the improved ant colony algorithm. © (2013) Trans Tech Publications, Switzerland.


Wang X.-L.,PLA Academy of National Defense Information
Proceedings - 2013 International Conference on Computational and Information Sciences, ICCIS 2013 | Year: 2013

Aiming at the deficiencies in the traditional electronic signature system and biological information characteristics randomizing signature system, we propose an electronic signature system with credible fusion verification, which was equipped with not only the function of identifying the traditional electronic signature, but also the function of concealing the biological information characteristics. It also obtained the authentication of pattern recognition technology with consistency in definitional domain and range. It was a system that can be applied in the challenge and response to the 'zero knowledge'. © 2013 IEEE.


Shen J.-J.,PLA Academy of National Defense Information | Yang C.-L.,Hubei University | Xu Y.-Q.,PLA Academy of National Defense Information
Advanced Materials Research | Year: 2014

The traditional Tactical Internet (TI) simulative training didn't consider the terrain environment and maneuver simulation, so its fidelity was low. The paper aimed to resolve it. Firstly, the paper gave the modeling process of TI terrain environment, and put forward the corresponding ways to some parts of the modeling process. Secondly, the paper gave the optimization steps of TI terrain model, it improved the simulation running efficiency; and then the paper utilized the large area database management technique to solve dynamic loading and rendering problem of large terrain model. Lastly, the paper gave the maneuver simulation way to the communication vehicles of TI, it solved the problems of maneuver collision and precise maneuvering along the road. The paper presented the realization results in each part, and it proved the effectiveness of the given ways. © (2014) Trans Tech Publications, Switzerland.


Li Z.,PLA Academy of National Defense Information
Advanced Materials Research | Year: 2013

This paper first briefly introduces the basic overview of the broadband access and the classification. Second this paper focuses on broadband access network technology application of optical fiber, finally puts forward the development of the optical fiber broadband access network might cover APON, BPON and EPON phase, from broadband pointto-point Ethernet fibre optic system and GEPON start and even finally GPON phase transition to the initial assumption. © (2013) Trans Tech Publications, Switzerland.


Li Z.,PLA Academy of National Defense Information
Advanced Materials Research | Year: 2013

A bistable model is established including the effect of spontaneous emission in a vertical cavity semiconductor optical amplifier(VCSOA). The sensitivities to the amplified spontaneous emission(ASE) of the bistable characteristics in a VCSOA and a traditional edge emitting SOA are compared by numerical analysis. The control of the bistable characteristics and the degeneration of the bistability hysteresis are also analyzed by utilizing the modified model. © (2013) Trans Tech Publications, Switzerland.


Shen J.J.,PLA Academy of National Defense Information
Applied Mechanics and Materials | Year: 2013

The military operations in information age emerged new characteristics, and the traditional simulative training ways couldn't meet the requirements of information age anymore, so the new simulative training ways need to be researched. Therefore, the paper proposed a "three fields" view of operation simulative training suitable for information age at first, which established the research framework for now and future. Secondly, the paper designed the simulative training system, including the HLA-based architecture and running mode, it resolved the implement issue of system. Thirdly, the paper proposed the "network-in-the-loop" idea, and resolved the network simulating by OPNET EMA technique. Network simulating is the critical part for information field simulating. Lastly, with IP filter hook technique and etc, the paper proposed a new C2 training way based on "object-in-the-loop", the new way overcame the shortages in traditional C2 training ways effectively. The paper's work has been applied successfully in the "Tactical Internet simulative training system". © (2013) Trans Tech Publications, Switzerland.

Loading PLA Academy of National Defense Information collaborators
Loading PLA Academy of National Defense Information collaborators