Journals
Advanced Photonics
Photonics Insights
Advanced Photonics Nexus
Photonics Research
Advanced Imaging
View All Journals
Chinese Optics Letters
High Power Laser Science and Engineering
Articles
Optics
Physics
Geography
View All Subjects
Conferences
CIOP
HPLSE
AP
View All Events
News
About CLP
Search by keywords or author
Login
Registration
Login in
Registration
Search
Search
Articles
Journals
News
Advanced Search
Top Searches
laser
the
2D Materials
Transformation optics
Quantum Photonics
Home
All Issues
Journals >
Electronics Optics & Control
Contents
2013
Volume: 20 Issue 10
5 Article(s)
Select format
EndNote (RIS)
BibTex
Plain Text
Export citation format
Research Article
An Optimized Guidance-Attack Aerial Matching Method for Multiple Combat Agents Based on TS-NGA
WAN Lujun, YAO Peiyang, JIA Fangchao, and MA Fangfang
The aerial Guidance-Attack Matching (GAM) focuses on the allocating of weapon units guidance units and targets in order to maximize the effectiveness of the multiple combat agents task coalition.The guidance-attack matching process of multiple combat agents based on integrated communication mode was analyzed a constra
The aerial Guidance-Attack Matching (GAM) focuses on the allocating of weapon units guidance units and targets in order to maximize the effectiveness of the multiple combat agents task coalition.The guidance-attack matching process of multiple combat agents based on integrated communication mode was analyzed a constrained optimization model was proposed for the problem and the nested genetic algorithm based on tabu policy was designed to solve the model.The outer-loop of GA was used to search for the optimum weapon-guidance matching and the inner-loop of GA used to search for the optimum weapon-target allocation.Considering the discrete characteristics of the problem the coding rules crossover operators mutation operators and tabu policy were designed.The experimental results show that the proposed algorithm can solve the three-dimensional variable GAM problem effectively..
showLess
Electronics Optics & Control
Publication Date: Jan. 01, 1900
Vol. 20, Issue 10, 1 (2013)
Get PDF
View fulltext
Using an Accurate Flow Model of Virtual Link to Optimize Network Calculus Approach in AFDX
[in Chinese], [in Chinese], [in Chinese], and [in Chinese]
Avionics Full Duplex Switched Ethernet (AFDX) standardized as ARINC 664 is an upgrade from Ethernet for avionics demand.AFDX adopts the mechanisms such as Virtual Link (VL) and traffic policing for the determinacy of communication task.Network calculus approach is a basic tool to compute the upper bound of end-to-end d
Avionics Full Duplex Switched Ethernet (AFDX) standardized as ARINC 664 is an upgrade from Ethernet for avionics demand.AFDX adopts the mechanisms such as Virtual Link (VL) and traffic policing for the determinacy of communication task.Network calculus approach is a basic tool to compute the upper bound of end-to-end delay for VL in AFDX network which give AFDX a useful method to research the real-time performance.However the network calculus approach used a simple flow model of VL.Based on that model the result got by network calculus approach is pessimistic.An accurate flow model of VL is adopted in the network calculus approach in this paper and it helps the network calculus approach to get a tighter upper bound of delay for VL..
showLess
Electronics Optics & Control
Publication Date: Jan. 01, 1900
Vol. 20, Issue 10, 7 (2013)
Get PDF
View fulltext
Evaluation of the Invulnerability of Link-Weighted Military Communication Network
MA Runnian, WEN Gang, LIN Genmao, CAI Wei, and WANG Wei
The evaluation of the invulnerability of military communication network is studied.First the definition of link-weighted network is introduced.Then the evaluation index system evaluation standards of indexes and computing method of the indexes weights are analyzed systematically for the invulnerability evaluation of t
The evaluation of the invulnerability of military communication network is studied.First the definition of link-weighted network is introduced.Then the evaluation index system evaluation standards of indexes and computing method of the indexes weights are analyzed systematically for the invulnerability evaluation of the links of military communication network and the method for computing the links weights is given.Then based on measurements for the invulnerability of link-weighted network the index of average edge connectivity is used to evaluate the invulnerability of network.Finally the process of evaluation is presented with an example.The purpose of the study is to provide a theoretical basis for planning and establishing of the military communication network..
showLess
Electronics Optics & Control
Publication Date: Jan. 01, 1900
Vol. 20, Issue 10, 11 (2013)
Get PDF
View fulltext
Tactical Network Congestion Control Based on Improved Neuron PID
ZHANG Lili, WANG Yuhui, CHEN Shaodong, and WU Qingxian
In the information network centric warfare the network congestion problem becomes the bottleneck of warfare information transformation.In single neuron PID congestion control the neuron gain K is the main factor affecting the system performance of stability and overshoot which is totally depended on expertise and is hi
In the information network centric warfare the network congestion problem becomes the bottleneck of warfare information transformation.In single neuron PID congestion control the neuron gain K is the main factor affecting the system performance of stability and overshoot which is totally depended on expertise and is highly subjective.In this paper the neuron gain K is adjusted dynamically combined with identification-free adaptive control algorithm.In addition in order to improve the quality of the controller the adjustment factor is introduced to adjust the learning rate of neuron weight.The simulation results in the tactical network verified the effectiveness and feasibility of the improved algorithm..
showLess
Electronics Optics & Control
Publication Date: Jan. 01, 1900
Vol. 20, Issue 10, 14 (2013)
Get PDF
View fulltext
Safety Control Means for UAVs Based on Cognition-Guidance
WEI Ruixuan, ZHOU Huan, RU Changjian, and CUI Junhui
The potential risk of control loss collision and hijacking of unmanned aerial vehicle (UAV) has become higher and higher because of the own technical limitation of UAV and environmental complexity all round.Starting from the requirement of increasing the safety of UAV system in combat the autonomous safety control tech
The potential risk of control loss collision and hijacking of unmanned aerial vehicle (UAV) has become higher and higher because of the own technical limitation of UAV and environmental complexity all round.Starting from the requirement of increasing the safety of UAV system in combat the autonomous safety control techniques were studied.The safety intension and current study situation safety control are presented the association between guidance and human cognition is discussed.A safety control means based on the cognition-guidance is proposed and the collision aviodance control policy is established.Simulation was made to the proposed method taking collision aviodance of two UAVs as an example..
showLess
Electronics Optics & Control
Publication Date: Jan. 01, 1900
Vol. 20, Issue 10, 18 (2013)
Get PDF
View fulltext
Email Alert
Submit a Paper
Research Article