𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Proceedings of 2022 10th China Conference on Command and Control (Lecture Notes in Electrical Engineering, 949)

✍ Scribed by Chinese Institute of Command and Control (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
944
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book includes original, peer-reviewed research papers from the 2022 10th China Conference on Command and Control (C2 2022), held in Beijing, China on July 7-9, 2022. The topics covered include but are not limited to: Theories, Modelling and Simulation, System Engineering Technology for Intelligent Command and Control, 5G and Intelligent Command, Control and Management Integration Technology, Joint Cooperative Command and Control Organization Management, Agility in the Network Age, Cyberspace Situational Awareness Technology, CPS Parallel Management and Control、Unmanned Systems, Intelligent Military Camp Technology, Architecture Design for Intelligent Air Traffic Control System, Human-Machine Interaction and Virtual Reality, Swarm Intelligence and Cooperative Control, Intelligent Gaming Theory and Technology.The papers showcased here share the latest findings on theories, algorithms and applications in command and control, making the book a valuable asset for researchers, engineers, and university students alike.

✦ Table of Contents


Contents
Research on Autonomous Fire Control Attack of UAV for Dynamic Kill Net
Abstract
1 Introduction
2 Development of UAV Fire Control Technology
3 Autonomous Fire Attack Planning Under Dynamic Killing Network
3.1 Design Idea
3.2 Assumption of Autonomous Attacking Multiple Ground Targets by Chance
3.3 Key Technical Points to be Solved
4 Summary
References
Adaptive Beamforming Method Based on Virtual Array
Abstract
1 Spatial Smoothing Technology
2 Algorithm Description
2.1 Covariance of Spatial Smoothing
2.2 Adaptive Beamforming
2.3 Beam Output Under Virtual Aperture
3 Simulation Analysis
3.1 Influence of Virtual Array on Algorithm Performance
3.2 Influence of Spatial Smoothing Technology on Algorithm Performance
4 Conclusion
References
Adaptive Unscented Kalman Filter Algorithm for Multi-domain Command and Control Information Transmission
Abstract
1 Introduction
2 Carrier Tracking Loop
3 Simplified AUKF Algorithm
3.1 Time Update
3.2 Measurement Update
4 Algorithm Simulation and Analysis
4.1 Tracking Accuracy When Noise Variance is Unknown
4.2 Influence of Phase Noise on Tracking Accuracy
4.3 Computational Complexity
5 Conclusions
References
UUV Fast Route Planning Algorithm Based on Improved Visual Graph Method
Abstract
1 Introduction
2 Modeling Method of Route Planning Environment
2.1 Grid Method
2.2 Polygonal Method
3 Improved Visual Graph Method
3.1 Basic Visual Graph Method
3.2 Improvement Strategy
4 Simulation Experiment
4.1 Simulation Experiment Scene
4.2 Simulation Experiment Results
5 Conclusions
References
Reliability Analysis and Link Selection for Situation Data Transmission in Hierarchical Joint All-Domain Operation and Command-and-Control
1 Introduction
2 System Model
2.1 Variable Definition
2.2 All-Domain Scenario Analysis
2.3 Hierarchical Structure Scenario Analysis
2.4 Reliability Decreasing Iteration Algorithm
3 Simulation Results
3.1 All-Domain Scenario
3.2 Hierarchical Structure Scenario
4 Conclusion
References
Electromagnetic Spectrum Data Compression Method for Dynamic Spectrum Access Strategy
1 Introduction
1.1 Related Works
1.2 Contributions
2 Distributed Electromagnetic Spectrum Database Based on Time Length
3 Simulation and Analysis
4 Conclusion
References
Review of the Main Force and the Research Status of Psychological Warfare in the United States
Abstract
1 Introduction
2 Main Force of US Psychological Warfare
2.1 Main Funding Agencies
2.2 Military Research Institutions
2.3 Related Colleges and Universities
2.4 Non-governmental Research Institutions
3 Main Hotspots of American Psychological Warfare Research
3.1 Cognitive Modeling Technology
3.2 Brain-Computer Interface Technology
3.3 Subliminal Information Technology
3.4 High-Energy Weapons Technology
3.5 Visual Reality Technology
3.6 Mental Health Intervention
4 Discussion
5 Conclusions
References
A Data-Segment Based Management Method for Unpredictable and Uncertain Multi-branch Data of War-Game
Abstract
1 Introduction
2 Current War-Game Data Management Methods
3 Checkpoint Mechanism of the Model
4 War-Game Data Management Based on Data Segment
4.1 Data Segment Number Acquisition and Data Segment Relationship Determination
4.2 Branch Tree Building Process
4.3 Extensions to Database Tables
4.4 Branch Data Release
5 Experiment
6 Conclusion
References
Semantic Web Services Architecture Design and Service Discovery Research
Abstract
1 Introduction
2 Semantic Web Services Architecture Design and Basic Definitions
2.1 Semantic Web Services Architecture Design
2.2 Basic Ontology Definition
3 Service Discovery Mechanism Study Based on SHON-WSA
3.1 Service Discovery Working Principle
3.2 Web Services Functional Matching Algorithm Study Based on OWL-S Description
4 Case Analysis and Query Efficiency Analysis
4.1 Case Analysis
4.2 Query Efficiency Analysis
5 Conclusion
References
Construction Method of Air Combat Agent Based on Reinforcement Learning
1 Introduction
2 The Modeling of Air Combat Problems
2.1 The Assumption of Air Combat Game Scenario
2.2 Dynamics and Kinematics Models of Fighter
2.3 Models of Radar and Threat Warning System (TWS)
2.4 Model of Missile
2.5 Expert System
3 Air Combat Agent Design Based on Deep Reinforcement Learning
3.1 Soft Actor-Critic (SAC) Reinforcement Learning Algorithm
3.2 State Space and Action Space
3.3 Design of Reward Function for Curriculum Learning
4 Experiment and Results
5 Conclusion
References
Construction Method of Resilience Killing Chain Based on Two-Layer Optimization Model
Abstract
1 Problem Description
2 Resilience Killing Chain Construction Model
2.1 Model of Operational Network
2.2 Resilience Killing Chain Optimization Model
2.3 The Evaluation Index
3 Algorithm Design
4 Simulation Analysis
4.1 Data Description
4.2 Killing Chain Impact Analysis
5 Conclusion
References
Hyperspectral Anomaly Detection Using Tensor Low-Rank Representation
1 Introduction
2 Proposed Model
3 Experimental Results and Analysis
4 Conclusion
References
Visible and Infrared Image Fusion by Invertible Neural Network
1 Introduction
2 Proposed Method
2.1 Feature Extraction
2.2 Fusion Strategy
2.3 Image Reconstruction
2.4 Loss Function
3 Experiments
3.1 Dataset and Settings
3.2 Ablation Study
3.3 Evaluation on Fusion Images
4 Conclusion
References
Image Tampering Localization Based on Two-Stream Weighted Fusion Features
Abstract
1 Introduction
2 Related Work
3 Proposed Method
3.1 Network Structure
3.2 RGB Visual Branch
3.3 ELA Feature Supervision Branch
3.4 DCT Perception Branch
4 Experiment
4.1 Training Strategy
4.2 Experimental Results
5 Conclusion
References
Sparse Marine Wireless Communication Based on the Evaporation Duct Over the South China Sea
Abstract
1 Introduction
2 Statistics of the Evaporation Duct
2.1 Data Source
2.2 Methodology
2.3 EDH Distribution
3 Analysis of Communication Effects
3.1 Temporal Analyzation
3.2 Regional Analyzation
4 Conclusion
References
Protecting Multi-Domain Command and Control Information System Network Traffic with Segment Routing
1 Introduction
2 System Model and Problem Formulation
3 Algorithm Design
3.1 SAR with Completed Network Information
3.2 SAR with Partial Network Information
3.3 Time Complexity Analysis
4 Experimental Results
4.1 The Comparison of Success Rate
4.2 The Cost of Paths
4.3 Time Consumption of Algorithms
5 Conclusion
References
General Process Mechanism Model of Multi-domain and Multi-scale Command and Control Activities
Abstract
1 Introduction
2 Scale Correlation of C2 Activities
3 Process Model of Macroscopic Scale C2 Activity
3.1 Closed-Loop Process of C2 Activities of Macro System of Systems
3.2 Cross-Scale Interaction of Macro System of Systems
3.3 Cross-Domain Coordination of Macro System of Systems
3.4 Dynamic Evolution of the C2 Process of Macro System of Systems
4 Mechanism of the C2 Process of Macro-combat System of Systems
5 Conclusion and Discussion
References
Research of Command and Guidance Technology Based on Integrated Joint Operation
Abstract
1 Introduction
2 New Operational Concepts and Operational Styles
2.1 Naval Integrated Fire Control-Air Defense (NIFC-CA)
2.2 Distributed Battle Management (DBM)
2.3 Advanced Battle Management System (ABMS)
3 Command and Guidance Basic Agreement
4 Traditional Command and Guidance Technology
5 Future Command and Guidance Technology Development
5.1 The Operation Process of Command and Guidance Based on Command and Fire Integration
5.2 Carrier Attack Guidance
5.3 Command and Guidance Based on Integration of Command and Fire
6 Development Suggestions
References
Blockchain-Based Intelligent Data Link Information Architecture Design for Unmanned Cluster
Abstract
1 Introduction
1.1 Definitions
1.2 Research Background
2 Modeling
2.1 Applicability Analysis
2.2 Research Significance
2.3 Architecture Models
2.4 Key Technologies
3 Testing System Demonstration and Performance Testing
3.1 Simulation Framework
3.2 Track Correlation
4 Conclusion
Acknowledgment
References
A Joint Detection and Recognition Algorithm of Non-cooperative Communication Signal Based on Improved YOLOv3
Abstract
1 Introduction
2 Signal Model
3 Generation of Time-Frequency Diagram
4 Signal Detection and Recognition Based on Deep Learning
4.1 Principle of YOLOv3 Algorithm
4.2 Improved Space Pyramid Pooling SPP Module
4.3 Improved Loss Function
4.4 Improvement of Anchor Box Clustering Algorithm
5 Performance Evaluation
5.1 Experimental Environment
5.2 Data Generation
5.3 Evaluation Indicators
5.4 Results
6 Conclusion
Acknowledgments
References
Research on Architecture of System-of-Systems Evolution Method Based on Bi-level Multi-objective Programming Model
Abstract
1 Statement of Problem
2 Architecture Evolution Process
3 SoS - Systems Bi-level Multi-objective Programming Model
3.1 Model Assumptions
3.2 SOS-Level Multi-objective Function
3.3 SOS-Level Constraints
3.4 System-Level Objective Function
3.5 System-Level Constraints
3.6 Comprehensive Model
4 Cases of Evolution of Public Health and Epidemic Prevention SoS Architecture
4.1 PHEP SoS Architecture Evolution Process
4.2 PHEP SoS-Systems Bi-level Multi-objective Programming Model
4.3 Model Solution and Results
5 Conclusion
References
Incremental Learning Recognition Method for Radar Emitter Based on Minimum Sample Distance
Abstract
1 Radar Emitter Identification Algorithm Based on Deep Learning
1.1 Contrast Predictive Coding
1.2 Residual Neural Network
1.3 Identification Algorithm Flow
2 Incremental Learning Based on Minimum Sample Distance
2.1 Minimum Sample Distance Classifier
2.2 Construction of New Data Sets
3 Experiments
3.1 Parameter Settings
3.2 Analysis of Experimental Results
4 Conclusion
References
Effectiveness Evaluation of Intelligent Operational Command Based on OODA Loop
Abstract
1 OODA Loop and Intelligent Operational Command
1.1 OODA Loop
1.2 OODA Loop in the Era of Intelligent Warfare
2 System Dynamic Effectiveness Evaluation Model of Intelligent Operational Command Based on OODA Loop
2.1 The Causal Loop Diagram
2.2 The Level and Rate Diagram
2.3 System Equations
3 Simulation and Analysis
3.1 Initial Parameter Setting and Simulation
3.2 Simulation and Analysis of OODA Loop Delay
3.3 Simulation and Analysis of Intelligence Degree of OODA Loop Delay
4 Conclusion
References
Research on the Filtering and Tracking Techniques for LSS-Target
Abstract
1 Introduction
2 {\usertwo \alpha \beta } Filter and Track Management
2.1 {\usertwo \alpha \beta } Filter
2.2 Data Association and Track Management
3 New Data Association Method
3.1 Performance of {\usertwo \alpha \beta } Filter and Traditional Data Association Method
3.2 Association Gate Centered in the Previous Position
3.3 The Usage of One Auxiliary Association Gate
4 Field Tests
4.1 Tracking Performance of Auxiliary Gate Only
4.2 Negative Effect of Auxiliary Gate
4.3 Performance of the Combination of the Main Gate and the Auxiliary Gate
5 Conclusions
References
Signal Processing Design for Continuous Wave Radar Based on Jetson TX2
Abstract
1 Introduction
2 Radar System Design
2.1 Brief Introduction of Jetson TX2
2.2 Signal Processor and Radar Design
3 Signal Processing
3.1 Processing Flow Design
3.2 FFT
3.3 CFAR and Target Detecting
4 Parallel Acceleration Technology
4.1 Coordination of GPU and CPU
4.2 Increasing the Workload of GPU
5 Field Test
6 Conclusions
References
Learning to Adapt for Agile Organisations
1 Introduction
2 Dynamical Task Environment
3 Learn and Adapt
4 Calculations and Experiments
4.1 The Configurations of Network
4.2 The Robustness of Organisation
5 Conclusions
References
Multi-station Passive Pure Direction Finding Cross Localization Method Based on Tikhonov Regularization
Abstract
1 Introduction
2 Direction Finding Cross Location Model
3 Positioning Accuracy Analysis
4 Observability Analysis of Target Location Parameter Estimation
5 Tikhonov Regularization Estimation Method
6 Simulation Verification
7 Summary
References
C2 Twin Network and Full Lifecycle Management for Intelligent Warfare
Abstract
1 Introduction
2 DT in Military Fields
3 Models for C2DTN
3.1 Battle Preparation Model
3.2 Battle Plan Model
3.3 Execution and Control Model
4 Full Lifecycle Management for C2DTN
5 Conclusion
References
A Cybersecurity Protection Framework of the Endpoint System in C4ISR
Abstract
1 Introduction
2 Related Work
3 Cybersecurity Protection Framework for Endpoint Systems in C4ISR
3.1 Network Data Transmission Protection of Endpoint System
3.2 Software and Hardware Security Protection of Endpoint System
3.3 Dedicated Active and Passive Safety Protection
4 Simulation and Results Analysis
4.1 Network Data Transmission Simulation
4.2 Software Protection and Active-Passive Safety Protection Simulation
5 Conclusion
References
Research on Key Technologies of Conceptual Design and Verification of Electronic Countermeasure Based on Combat Simulation
Abstract
1 Research Flow of Methods of Electronic Countermeasures Based on Combat Simulation Experiment
1.1 Proposal of Methods of Electronic Countermeasures
1.2 Design of Scenarios for Experiments of Electronic Countermeasures
1.3 Experiment Preparation for the Research of Methods of Electronic Countermeasures
1.4 Scheme Design of Experiments of Electronic Countermeasures
1.5 Implementation of Experiments of Combat Method Research
1.6 Evaluation of Experiments of Combat Method Research
2 Combat Simulation Experiment System of Electronic Countermeasures
3 Application of Method Research of Electronic Countermeasure
3.1 Proposal of Combat Methods
3.2 Design of Scenarios
3.3 Design of Combat Experiment
3.4 Experiment Performed
3.5 Analysis of Results
4 Conclusion
References
Application Prospects of Artificial Intelligence Technology in Joint All-Domain Command and Control
Abstract
1 Introduction
2 Joint All-Domain Command and Control
3 Artificial Intelligence Technologies
4 Application Prospects of Artificial Intelligence Technology in Joint All-Domain Command and Control
4.1 Application Prospect of Perceptual AI Technologies in JADC2
4.2 Application Prospects of Cognitive AI Technologies in JADC2
5 Case Study
6 Conclusion
References
Track Prediction Based on Spatio-Temporal Attention
Abstract
1 Introduction
2 Problem Definition
3 Method
3.1 Spatial Self-attention Sub-module
3.2 Temporal Self-attention Sub-module
3.3 Spatio-Temporal Attention Feature Fusion
3.4 Stacked Temporal Convolutional Network Module
4 Performance Evaluation
4.1 Dataset and Settings
4.2 Experimental Results
5 Conclusion
Acknowledgments
References
Dependability Argument Metamodeling of Networked Software
Abstract
1 Introduction
2 Overview of Safety Case
3 Software Dependability Argument Metamodel
3.1 Architecture of the Metamodel
3.2 Relationship Between the Metaclasses
3.3 General Rules of Argumentation Structure Modeling Language Based on OCL
4 Modeling Environment of Argumentation Structure
4.1 Design of Domain Model
4.2 Design of Tooling Definition Model
4.3 Implementation of GSNModeler
5 Case Study
5.1 Development Process of Argument Instance
5.2 Results Analysis of the Argument Instance
6 Conclusions
References
A Simulation Algorithm for Multi-path Link of Digital Modulated Signals
Abstract
1 Introduction
2 Multi-path Signal Calculation Method
3 Multi-path Simulation Algorithm of Digital Modulation Signal
4 Algorithm Simulation Results and Analysis
5 Conclusions
References
ADA: An Acronym-Based Data Augmentation Method for Low-Resource Text Classification
Abstract
1 Introduction
2 Related Work
2.1 Text Classification
2.2 Data Augmentation
3 Approach and Experiment
3.1 Approach
3.2 Experiment
4 Results
4.1 Related Parameter Analysis
4.2 Overview of Comparative Experiment
4.3 Sentence Vector Correlation Comparison
5 Conclusion
References
Grenade Detection in Complex Environment Based on YOLOv5
Abstract
1 Basic Network Structure of YOLOv5
1.1 Input
1.2 Feature Processing Side
1.3 Output
2 Experiment Data Set and Parameter Settings
3 Experimental Results and Analysis
3.1 Lab Environment
3.2 Model Evaluation Metrics
3.3 Summary of Experimental Results
3.4 Result Analysis
4 Concluding Remarks
References
Military Network Traffic Anomaly Detection Based on Discriminative Angular Feature
1 Introduction
2 Related Work
3 Military Network Traffic Anomaly Detection Model
3.1 Preprocessing Module
3.2 Feature Extractor Module
3.3 Classifier Module
4 Evaluation
4.1 Dataset for Evaluation
4.2 Evaluation Metrics
4.3 Implement Details
4.4 Environment Analysis
5 Conclusions
References
Dynamic Routing for Military Network Based on Semi-Markov Prediction and Q-Learning
1 Introduction
2 System Model
2.1 Scene Model
2.2 Semi-Markov Prediction Model
2.3 Dynamic Resource Table
3 Prediction-Based Q-Learning Routing Algorithm
3.1 Q-Learning Strategy
3.2 SMPQ-DRA Routing Algorithm
4 Simulation
4.1 Simulation Environment Settings
4.2 Analysis of Simulation Results
5 Conclusion
References
The Fourth-Generation System Theory: Holo-System Theoryβ€”Holo-System Ontology, Epistemology and Methodology
Abstract
1 Introduction
2 Historical Review
3 The Overall Thought
4 Holo-System Ontology
4.1 Things
4.2 Being
4.3 Holo-Understanding and Holo-Characteristics
4.4 Holo-System and Its Properties, Relationships and Representation
5 Holo-System Epistemology
5.1 Overview
5.2 Holo-Understanding Paradigm of SoS
5.3 Holo-Understanding Paradigm of System Property
5.4 Holo-Understanding Paradigm of System Relationship
5.5 Holo-Understanding Paradigm of System Model
5.6 Holo-Understanding Paradigm of Systems Engineering
5.7 Holo-Understanding Paradigm of System Revolving
6 Holo-System Methodology
6.1 Holo-System Architecture Framework
6.2 Holo-System Query Language
7 Conclusion
7.1 Forming the Characteristics of the Fourth-Generation System Theory
7.2 Provide a New Paradigm for Understanding and Transforming the World
7.3 Promote the System Theory Turn of Philosophy
References
Analysis of Cross-Domain Combat Capability Based on Kill Chain
Abstract
1 Introduction
2 Kill Chain and Network
2.1 The Operational Relationship Network
2.2 Kill Chain
2.3 Kill Chain Generation Method
3 Analytical Methods
3.1 Analysis of Combat Network Performance
3.2 Comparative Analysis of Performance in Various Domains
4 Case Analysis
4.1 Link Analysis
4.2 Efficiency Analysis
4.3 Domain Analysis
5 Conclusion
References
Route Planning Based on Grid-Point Optimization Lazy Theat Algorithm
Abstract
1 Introduction
2 Task Environment Modeling
3 Grid-Point Lazy Theta
Route Planning Algorithm
3.1 Grid-Point Scene
3.2 Theta
3.3 Grid-Point Optimization Lazy Theta

4 Route Planning Modeling
4.1 Flight Constraint Model
4.2 Route Cost Function
5 Simulation Results and Analysis
5.1 Static Threat Scenarios
5.2 Algorithm Comparative Analysis
6 Conclusion
References
Research on Resource Representation Method of Command and Control System Supporting Software Definition
Abstract
1 Introduction
2 Principle and Process
3 Resource Classification
4 Model Elements Analysis
5 Β Reference Model Construction
5.1 Observer(O) Resource Model
5.2 Processer(P) Resource Model
5.3 Decision Maker(D) Resource Model
5.4 Actor(a)Resource Model
5.5 Communication(C) Resource Model
5.6 Interaction and Adaptation(I) Resource Model
5.7 Running(R) Resource Model
6 Instantiation Modeling
6.1 Typical Scene
6.2 Resource Combination Relationship Design
6.3 Resource Instantiation Model Construction
7 Conclusion
References
Node Assignment-Based Routing for Low-Earth Orbit Satellite Navigation Augmentation Networks
1 Introduction
2 Related Work
3 System Model and Problem Statement
3.1 System Model
3.2 Problem Formulation
4 Node Assignment-Based Routing
4.1 Routing Framework
4.2 Node Assignment
4.3 Topology Control
5 Performance Evaluations
5.1 System Setting
5.2 Results and Analysis
6 Conclusions
References
Resilience Analysis of Military System of Systems Based on Granular Computing
1 Introduction
2 Information Granules and Granular Time Series
2.1 From Data to Information Granules
2.2 Granular Time Series
3 Information Granule-Based Military System of Systems Resilience Analysis Method
3.1 The Construction of Resilience Granular Time Series Involving Information Interaction Capability of a Military SoS
3.2 The Resilience Analysis and Interpretation Based on Granular Time Series
4 Experimental Studies
4.1 Preprocess
4.2 Experiment Results
5 Conclusions
References
Named Entity Recognition with CRF Based on ALBERT: A Natural Language Processing Model
Abstract
1 Introduction
2 Related Works
3 The Proposed Scheme
3.1 Overview
3.2 CRF-Albert Classification
3.3 Evaluation indicators
4 Experimental Results
4.1 Experimental Environment and Parameter Settings
4.2 Performance Evaluation
5 Summary
References
Real-Time Vehicle Detection Method Based on Aerial Image in Complex Background
Abstract
1 Introduction
2 Methodology
2.1 Feature Fusion Based on Context Information
2.2 Multi-scale Region Proposal Matching Method Based on Location Clustering
2.3 Lightweight Backbone
3 Experimental Results
3.1 Loss Function
3.2 Hardware Platform and Training Parameters
3.3 Results
4 Conclusions
References
An Intelligent Scheduling Method for Multi-domain Cooperative Operation Based on Deep Reinforcement Learning
Abstract
1 Introduction
2 Problem Description and Background
2.1 MCOS Problem Description
2.2 Markov Decision Processes
2.3 Deep Reinforcement Learning
3 Multi-domain Cooperative Operation Scheduling Environment
3.1 State Representation
3.2 Action Space
3.3 Reward Function
4 Action Selection Method
4.1 No-Op Action
4.2 Priority Constraint
5 Experiments
5.1 Multi-domain Cooperative Operation Scenario
5.2 Simulation Example
6 Conclusions and Future Work
Acknowledgments
References
A Covert Communication Method Based on Signal Mimicry Image Generation Technology
Abstract
1 Introduction
2 Signal Mimicry Image Generation Technology
2.1 Signal Extraction and Characterization
2.2 Signal Mimicry Mapping
2.3 Image Equivalent Pixel Processing
3 Information Hiding Technology Based on DCT Watermark
3.1 Algorithm Principle
3.2 Embedding Algorithm Steps
4 Conclusions
References
Multi-formation Tracking Control for Second-order Nonlinear Multi-UAV System via Impulsive Algorithm
1 Introduction
2 Preliminaries and Problem Statement
2.1 Algebraic Graph Theory
2.2 Problem Statement
2.3 Some Lemmas
3 Main Results
3.1 Multi-formation Tracking Control with Fixed Topology
3.2 Multi-formation Tracking Control with Switching Topology
4 Numerical Simulation
5 Conclusions
References
Improved QMIXs for Multi-entity Asynchronous Cooperative Learning in Tactical Wargame
1 Introduction
2 Related Work
2.1 Tactical Wargame
2.2 Dec-POMDPs
2.3 MARL
3 Proposed Improved Approach
3.1 MACDF
3.2 QMIX-W
3.3 QMIX-N
4 Experiments
4.1 Scenarios and Metrics
4.2 Experimental Setup
4.3 Results and Analysis
5 Conclusion
References
Design and Test Verification of Integrated Navigation System Based on SINS/DVL for Underwater Search and Rescue Robot
Abstract
1 Introduction
2 System Composition
2.1 Overall Design
2.2 SINS/DVL Combination Principle
3 Integrated Navigation System Design
3.1 Configuration Design
3.2 Analysis of Mechanical Properties
3.3 Thermal Design and Thermal Analysis
4 Federal Filtering Algorithm
5 Test and Verification of the System Prototype
5.1 Complete Machine Temperature Cycle Test
5.2 Random Vibration Test of the Whole Machine
6 Conclusion
References
Multi-agent Task Assignment Based on the Situation Field and Game Theory
1 Introduction
2 Multi-agent Task Assignment Methods
2.1 Problem Modeling
2.2 Simplification and Dimensionality Reduction
2.3 Optimal Solution
3 Simulation and Experiment
3.1 Numerical Simulation
3.2 Experimental Validation
4 Conclusion
References
Environment Invariant Feature Extraction Algorithm Based on Radio Frequency I/Q Data Distribution
1 Introduction
1.1 Related Works
1.2 Contributions
2 RF Fingerprint Extraction Process
3 RF Fingerprint Features Based on I/Q Distribution
4 Experiment and Analysis
5 Conclusion
References
Research on Data Flow and Collaboration Method for Tactical Edge Network
Abstract
1 Introduction
2 Tactical Edge Network Research
3 Research on Data Circulation and Collaborative Methods
3.1 U.S. Army Data Management Strategy
3.2 U.S. Army Tactical Cloud
4 Key Technology
4.1 Tactical Edge Data Center Deployment
4.2 A Subsection Sample
4.3 Intelligent Data Management Technology
5 Conclusion
Acknowledgements
References
A Rapid One-Stage End to End Hyperspectral Target Detection Model
1 Introduction
2 Normal Risk Estimation Strategy
3 A Rapid One-stage End to End HTD Model
3.1 Non-negative Risk Estimator for One-Stage HTD Framework
3.2 Patch-Free HTD Network
4 Experiments
4.1 Hyperspectral Dataset Description and Experiment Settings
4.2 Evaluation Metrics
4.3 Detection Performance of Several Methods
5 Conclusion
References
Research on Radar Anti-jamming Performance Evaluation System in Complex Electromagnetic Environment
Abstract
1 Introduction
2 Analysis of Complex Electromagnetic Environments
3 Interference Immunity Assessment of Radar Equipment
4 Interference Immunity Assessment of Radar Data Chains
5 Evaluation Indicators
6 Conclusion
References
A Granule-Based Time Series Forecasting (TSF) Model for Underwater Combat with Missing Data
1 Introduction
2 Background
2.1 A Description for the Simulation Case
2.2 Time Series Forecasting Model
3 Time Series Forecasting with Missing Values
3.1 Representation of Time Series Data
3.2 The Missing Value Granular with Adaptive Sliding Window
3.3 Variable Loss Based Time Series Prediction
4 Experiment
4.1 Data Set Description
4.2 Granulation for Missing Values on Input Data
4.3 Prediction Result on Granular Input
5 Conclusion
References
Semantic Generation in Vision Data Link
Abstract
1 Introduction
2 Semantic Knowledge Base in Data Link (DL)
3 Semantics of Vision Data Link (VDL)
4 Vision Semantic Generation
4.1 Structured Scene Cognition
4.2 Scene Semantic Segmentation
4.3 Target Relation Mining
4.4 Multivariate Perception Information Fusion
5 Experiment of Vision-Lamp Semantic Generation
5.1 Designing of Vision-Lamp Interactive Experiment
5.2 Interpretation of Light Intensity Sequence
6 Conclusion
References
Covert Downlink mmWave Communication for Massive MIMO LEO Satellite
1 Introduction
2 Covert Downlink LEO Communication over the Massive MIMO Channel
2.1 System Model Descriptions
2.2 Covert Transmission Scheme for LEO Satellite
3 Main Results
3.1 Covert Metric
3.2 Covert Transmission Rate
4 Simulation Results and Discussions
5 Conclusion
References
Evaluation Method of Multi-domain System Information Sharing Capability
Abstract
1 Introduction
2 System Information Quality
3 Multi-domain Command System Information Sharing Status Assessment Model
3.1 Data Exchange Model
3.2 Inter-domain Information Sharing Capability Assessment
3.3 Intra-domain Information Sharing Capability Assessment
4 Case Study
4.1 Model Building
4.2 Model Evaluation
5 Discussion
6 Conclusion
References
COI Oriented Evaluation Method of Multi-domain Operation Demand Satisfaction of Equipment System of Systems
Abstract
1 Introduction
2 Operational Task Modeling
3 Measurement Metrics Framework
4 Measurement Metrics System of Systems
4.1 Basic Measurement
4.2 Derived Measurement
5 Operational Demand Satisfaction Evaluation Steps
6 Application Case
6.1 Statistical Calculation of Measurement Indexes
6.2 Evaluation Analysis
6.3 Operational Requirements Satisfaction Assessment
7 Conclusion
References
Trajectory Control of Multirotor Unmanned Aerial Vehicles via GPS Spoofing
1 Introduction
2 Theoretical Analysis
2.1 GPS Spoofing Process
2.2 Discussion of Post-capture Control
3 Models of MUAVs and Spoofer
3.1 Model of MUAVs
3.2 Model of Spoofer
4 Simulation
4.1 MUAV and Spoofer Implementation
4.2 Results of Simulation
5 Discussion and Conclusion
References
New Interpretation of Battlefield Situation Awareness in the Era of Artificial Intelligence
Abstract
1 Introduction
2 What is Battlefield Situation Awareness?
2.1 Situation Awareness from the Perspective of Chinese Military Theory
2.2 Situation Awareness from the Perspective of Commander’s Mental Process
3 New Interpretation of Situation Awareness in Artificial Intelligence Era
3.1 The Cognitive Domain is the Key Domain for Future Warfare
3.2 Cognitive Dominance is the Fundamental Advantage of Future Warfare
3.3 Artificial Intelligence Technologies Promote Intelligent Battlefield Situation Awareness
4 Application Mode of Situation Awareness System in the Era of Artificial Intelligence
5 Conclusion
References
Research on the Method of ARUAV Task Assignment Based on the Improved PSO Algorithm
Abstract
1 Introduction
2 Design Idea of the Improved PSO Algorithm
2.1 Particle Coding
2.2 Initial Particle Swarm
2.3 Fitness Function
3 Update of Particles
4 Taboo Search of Particles
5 Process of the Algorithm
6 Simulation
6.1 Example 1. Small-Scale ARUAV Coordinated Task Assignment
6.2 Example 2: Large-Scale ARUAV Coordinated Task Assignment
7 Conclusion
References
Flexible and Evolvable Integrated Electronic Information Twin System Architecture Design Method
Abstract
1 Introduction
2 Intelligent Analysis of Combat Mission Requirements Based on Knowledge Graph
2.1 Construction of Operational Meta-task Graph
2.2 Intelligent Analysis of Combat Mission Requirements
3 Generation of Genesis Integrated Electronic Information System Architecture Based on Graph Generation Model
3.1 Semantic Queries for Learning Objectives
3.2 Element Sequence Graph Generation Methods
4 Preferred Architecture for Integrated Electronic Information Systems Based on AI Reinforcement Learning
4.1 Basic Elements
4.2 Network Composition
5 Conclusion
References
Risk Assessment of the Impact of Toxic Gas on the Moving Humans: A Multi-agent Based Simulation Approach
Abstract
1 Introduction
2 Methods
2.1 The Overall Framework
2.2 Toxic Gas Modeling
2.3 Human Behavior Modeling
2.4 Risk Assessment Method
3 Case Study
3.1 The Scenario
3.2 Simulation and Result
4 Discussion and Conclusion
References
A Trunk-Link Deployment Methodology for Heterogeneous Multi-UAV
Abstract
1 Introduction
2 Related Work
3 System Model
4 Multi-UAV Deployment Algorithms
4.1 Trunk-Link Algorithm
4.2 Heterogeneous Multi-UAV Deployment Algorithm
5 Simulation Results
6 Conclusion
References
IGCE: A Compositional Energy Concept Based Deep Image Generation Neural Network
Abstract
1 Introduction
2 Compositional Energy Based Image Generation Network
2.1 Problem Definition
2.2 Network Architecture of IGCE
2.3 Energy Generation Loss
3 Experiments
3.1 Evaluation Metrics
3.2 Experimental Results and Analysis
3.3 Future Work
4 Conclusions
References
A Data Driven Algorithm for Compensating the Errors of Strain Gauges in Decision Support of Ship Hull Structures
Abstract
1 Introduction
2 Mechanism of Fiber Bragg Grating Strain Gauges
3 The Principle of BP Neural Network
4 The Algorithm for Compensating the Fiber Bragg Grating Strain Gauges and the Application on a Ship
4.1 The Algorithm for Compensating the Fiber Bragg Grating Strain Gauges
4.2 The Application of the Algorithm to Navigation Decision Support
5 Conclusion
Acknowledgement
References
A Review of Research on Intelligent Command and Control Network Traffic Theory
Abstract
1 Introduction
2 Theory of Intelligent Command and Control of Network Traffic
3 Analysis of Network Traffic Characteristics
3.1 Short-Range Dependence Model
3.2 Long-Range Dependence Model
4 Research on Network Traffic Performance Boundary
4.1 Analysis of Network Traffic Aggregation
4.2 Analysis of Network Performance
5 The Law of Change in Network Traffic
5.1 Linear Prediction Method
5.2 Nonlinear Prediction Method
6 Conclusion
Acknowledgments
References
Command and Control Network Fault Detection Based on XGBoost-RF Algorithm
Abstract
1 Introduction
2 Network Fault Detection Model Based on XGB-RF Algorithm
2.1 Network Fault Feature Selection Based on XGBoost
2.2 Network Fault Detection Based on Optimized Random Forest
3 Analysis of Results
3.1 Feature Selection
3.2 Fault Detection
4 Conclusion
Acknowledgments
References
A Traffic Prediction Method for Tactical Communication Intelligent Network Based on Cross-Domain Synergy
Abstract
1 Introduction
2 Current Situation Analysis of Traffic Prediction
3 Traffic Prediction Method Design
3.1 Prediction Model Design
3.2 Prediction Process Implementation
4 Traffic Prediction Effect Verification
4.1 Tactical Communication Network Topology Construction
4.2 Cross-Domain Synergy Traffic Aggregation Modeling
4.3 Prediction Effect and Analysis
5 Conclusion
Acknowledgment
References
Dual Acceleration Driven Gray Wolf Optimization Network Coverage Algorithm
Abstract
1 Introduction
2 Related Work
2.1 Static Method
2.2 Dynamic Method
3 DA-GWO Model
3.1 Model Definition
3.2 DA-GWO Algorithm
4 Experimental Analysis
4.1 Baseline
4.2 Experimental Environment
4.3 Simulation Experiment and Result Analysis
5 Epilogue
Acknowledgement
References
Target Grouping and Formation Recognition Based on Movement Trend Features
Abstract
1 Introduction
2 Target Grouping Model
3 The Proposed Method
4 Trajectory Segmentation
5 Target Grouping
6 Formation Recognition
6.1 Description Features
6.2 Estimation of Features
6.3 Estimation of Matching Degree
7 Experimental Results
8 Conclusions
References
Research on Knowledge Extraction of Maritime Operational Decision-Making Sentences
1 Introduction
2 Knowledge Extraction of Operational Decision Statements
2.1 Operation Decision Term Extraction
2.2 Operational Decision Synonym Recognition Technology
2.3 Syntax Analysis
2.4 Dependency Derivation
2.5 Concept and Relation Extraction
2.6 Extraction Result Optimization
3 Validation Instance
4 Summary
References
A Survey on Intelligent Writing Technology
Abstract
1 Strategic Needs and Trend Challenges
1.1 Strategic Needs
1.2 Trend Challenge
2 Related Research Progress
2.1 Automatic Question Answering
2.2 Automatic Text Generation
2.3 Multimedia Generation
3 Current Challenges
3.1 Information Security
3.2 Knowledge Dispersion
3.3 Generated Content Quality
3.4 Copyright Protection Mechanism
3.5 Knowledge Renewal
4 Conclusion
Acknowledgment
References
Coastline Classification and Extraction Based on Deep Learning
Abstract
1 Introduction
2 CNN-LSTM Network
3 Hierarchical Edge Detection Network
4 Experiment Analysis
4.1 Coastline Classification Experiment with CNN-LSTM Network
4.2 Coastline Extraction Experiment with HED Network
5 Conclusion
References
An Attention-Guided Visual Semantic Fusion Method for Remote Sensing Image Captioning
Abstract
1 Introduction
2 Related Work
2.1 Image Semantic Understanding
2.2 RSIC
3 Attention-Guided Visual Semantic Fusion Method for RSIC
3.1 Feature Extraction and Caption Generation
3.2 Attention-Guided Visual Semantic Fusion
4 Experiments
4.1 Experiments Settings
4.2 Evaluation Metrics
4.3 Experimental Results
5 Conclusion
References
Continual Learning for SAR Object Detection
Abstract
1 Introduction
2 Related Work
2.1 Continual Object Classification
2.2 Continual Object Detection
3 The Proposed Continual Detection Method
3.1 Problem Statement
3.2 Continual Object Detection Framework
3.3 Continual Object Detection Algorithm
4 Experiments
4.1 Datasets and Experiment Settings
4.2 Ablation Study
4.3 Comparison Experiments
5 Conclusions
Acknowledgement
References
A Dual Path Saliency Detection with MSER and Grayscale Scarcity
1 Introduction
2 Saliency Detection Algorithm
2.1 Terminal Guidance Scene Technical Requirements
2.2 BMS Saliency Detection
2.3 LC Saliency Detection
3 Follow-Up Works on Saliency Detection
3.1 Saliency Detection Based on Grayscale Stability
3.2 Saliency Detection Based on Grayscale Scarcity
3.3 Saliency Calculation Based upon MSER and Grayscale Scarcity
3.4 Comparison and Analysis on Saliency Detection Algorithm
4 Conclusion
References
An Enhanced RSNET for Cloud Detection in Optical Remote Sensing Images
1 Introduction
2 Method
3 Experiments
3.1 Experiments Performed on the SPARCS Dataset
3.2 Experiments Performed on the Biome Dataset
4 Conclusions
References
Exploring the Interactive Dynamic Influences Between Chinese and US’s Future Markets
Abstract
1 Introduction
2 Data
3 Method
3.1 Effective Transfer Entropy
3.2 Planar Maximally Filtered Graph
3.3 Louvain Method and Pearson Correlation Coefficient
4 Empirical Results
4.1 Influence Strength Between Different Parts of Futures
4.2 Continuous Influences Between Futures
5 Conclusion
Acknowledgement
References
Author Index


πŸ“œ SIMILAR VOLUMES


Proceedings of 2021 5th Chinese Conferen
✍ Zhang Ren (editor), Mengyi Wang (editor), Yongzhao Hua (editor) πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<span>This book includes original, peer-reviewed research papers from the 2021 5th Chinese Conference on Swarm Intelligence and Cooperative Control (CCSICC2021), held in Shenzhen, China on January 19-22, 2022. The topics covered include but are not limited to: reviews and discussions of swarm intell

Proceedings of the International Confere
✍ Sanjay Yadav (editor), Rahul Kumar (editor), Hidayat Zainuddin (editor), Lvxiang πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<p><span>This book includes the peer-reviewed proceedings of the 2nd International Conference on Information Control, Electrical Engineering, and Rail Transit (ICEERT 2022). This book provides the advanced research results of transportation and covers the main research fields of information control,

Proceedings of 10th International Confer
✍ Giuseppe Conte (editor), Olivier Sename (editor) πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<p><span>This volume consists of selected peer reviewed papers from the 10th International Conference on Mechatronics and Control Engineering (ICMCE 2021) discussing latest advances in mechanical engineering and dynamic analysis, sensor technology and application, mechanical design and system modell

Proceedings of the 5th International Con
✍ Hossam Gaber (editor) πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<p><span>This book provides readers with peer-reviewed research papers presented at the 5th International Conference on Clean Energy and Electrical Systems held in </span><span>Tokyo, Japan, from April 1 to 4, 2023. </span><span>This proceedings mainly covers theoretical, technical, and practical me

Proceeding of 2021 International Confere
✍ Zhihong Qian (editor), M.A. Jabbar (editor), Xiaolong Li (editor) πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<span>This open access proceedings includes original, unpublished, peer-reviewed research papers from the International Conference on Wireless Communications, Networking and Applications (WCNA2021), held in Berlin, Germany on December 17-19th, 2021. The topics covered include but are not limited to

Proceedings of the 5th China Aeronautica
✍ Ce Chinese Aeronautical Society (editor) πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<span>To sort out the progress of aviation science and technology and industry, look forward to the future development trend, commend scientific and technological innovation achievements and talents, strengthen international cooperation, promote discipline exchanges, encourage scientific and technol