<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005">
<channel xmlns:cfi="http://www.microsoft.com/schemas/rss/core/2005/internal" cfi:lastdownloaderror="None">
<title cf:type="text"><![CDATA[Editorial department of the Journal of National University of Defense Technology -->Management Science & Engineering]]></title>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[The Commercialization of Technology Products in University]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199104016]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[]]></description>
<pubDate>2015/7/4 9:19:34</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[Wang Xinmin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>Wang Xinmin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199104016]]></guid><cfi:id>162</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Basis and Principle on Distribution of Science]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199104017]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[]]></description>
<pubDate>2015/7/4 9:19:34</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[Zhang Biao]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>Zhang Biao</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199104017]]></guid><cfi:id>161</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Map and Graphic Fire-Fighting C<sup>3</sup> System]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199201011]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Map and graphic Fire-Fighting C<sup>3</sup> system (MGFC<sup>3</sup>S) is an advanced Fire-Fighting C<sup>3</sup> system controlled by a micro-computer system. (MGFC<sup>3</sup>S) has been implemented in CHINA and actually put into practical use for the first time. The design of the system is based on C<sup>3</sup>I theory and technology. Using maps at different level,the system has very high performances and powerful functions，with less money than other ones abroad. This paper outlines the overall design ideas and some major technical problems.]]></description>
<pubDate>2015/7/4 9:19:56</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[Wang Honggu<sup>1</sup>, Xu Jie<sup>1</sup>, Xue Xiaoyu<sup>1</sup>, Zhang Guangrong<sup>2</sup> and Chen Derong<sup>2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>Wang Honggu<sup>1</sup>, Xu Jie<sup>1</sup>, Xue Xiaoyu<sup>1</sup>, Zhang Guangrong<sup>2</sup> and Chen Derong<sup>2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199201011]]></guid><cfi:id>160</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Some Models about Decision Support System in the Scientific Research Expenses Management]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199304020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In this paper，with the help of multiple objects decision theory and computer technology and on the basis of analyzing user's repuirements，some  models about scientific research duty forecast and expenses distribution are set up and the property and relation of these models and model's solution are analyzed. According to the features of these models and decision. The main function of the system is described. We believe in that，to use the system will make the scientific research expenses management more convenient and will make fuller use of the limited expenses.]]></description>
<pubDate>2015/1/23 11:00:10</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[Deng Su,Zhang Weiming,Zhang Biao and Dai Changhua]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>Deng Su,Zhang Weiming,Zhang Biao and Dai Changhua</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199304020]]></guid><cfi:id>159</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[The Optimal Firepower Assignment in a Fight of Single-kind Arms Versus Multi-kind Arms]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199303020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Exploiting differential game theories, the rules for optimal firepower assignment in a fight of single-kind arms (X-forces) versus multi-kind arms (Y-forces) are studied in this paper. It is pointed out that at each stage of the fight X-forces should concentrate al1 the remaining fire-power，to attack the kind of arms of the enemy with the maximal lighting strength, which is the product of the power coefficients of both k-forces on the kind of arms of Y-forces and the latter on the former. The similar problem in a fight of multi-kind arms versus multi-kind arms, which is more important and in which much more diffioulty is, will be discussed in another paper later.]]></description>
<pubDate>2015/1/23 11:00:21</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[Sha Jichang]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>Sha Jichang</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199303020]]></guid><cfi:id>158</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Structure Evolution of Complex Systems]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199303021]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Considering one aspect of complexity, proceeding from the simplest non-linear equations, we study the structural evolution of war pattern and the better cycles of defence funds. From the research of the above two examples, We reveal that the problems of study of critical point of controlled parameter and the grasp of extent of change are of great theoritical significance and extensive prospects of applications.]]></description>
<pubDate>2015/1/23 11:00:21</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[Zhou Manshu and Sha Jichang]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>Zhou Manshu and Sha Jichang</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199303021]]></guid><cfi:id>157</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[An Approach for Evaluation of the Effectiveness of C<sup>3</sup>I Systems]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199501001]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[An approach for analyzing the effectiveness of C<sup>3</sup>I systems in the battlefield is presented in this paper. The proposed approach includes modelling，analysis, simulation and data processing methods and techniques. We demonstrate that the effectiveness of C<sup>3</sup>I systems can be evaluated by properly applying the approach. An canonical example is given as well.]]></description>
<pubDate>2014/6/11 0:00:00</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[Luo Xueshan and Su Jianzhi]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>Luo Xueshan and Su Jianzhi</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199501001]]></guid><cfi:id>156</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Evaluation and Analysis Models of the Missile's Comprehensive Effectiveness]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199702005]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[This paper, based on disscusing about the methods of evaluation and analysis of the comprehensive effectiveness of misile weapon system, studied the theory of evaluation and analysis of effectiveness, and introduced the evaluation and analysis model of the strategic missile's comprehensive effectiveness.]]></description>
<pubDate>2014/5/28 0:00:00</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[Xu Peide and Cui Weihua]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>Xu Peide and Cui Weihua</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199702005]]></guid><cfi:id>155</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A Study on Campaign Superiority Parameter and Its Applications]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199805024]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The mathematical methods of analysis play an increasingly significant role in planning military operations. The matrix differential equations educed on the basis of Lanchester combat models for describing the heterogeneous force combat engagements were studied. An investigation was conducted on the campaign superiority parameter derived directly from the control matrix and the initial value of the state variables without solving the equations. Battle outcome prediction, military decision support, force deployment optimization and fire allocation programming have been discussed with an air-combat example to demonstrate the important applications of the campaign superiority parameter. Evaluation of superiority parameter as well as Lanchester equations is presented in the conclusion.]]></description>
<pubDate>2014/1/3 16:01:39</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[Huang Jun,Wu Zhe and Zhu Rongchang]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>Huang Jun,Wu Zhe and Zhu Rongchang</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/199805024]]></guid><cfi:id>154</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[IFMO: Integrative Framework for Model Organizations in Component Based Decision Support Systems]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200102013]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Model organization and description are a basic problem in decision supporting systems. At the same time, they are also the preconditions in model management. After studying the integrated modeling and design and development of CS-DSSP（Client/Server based decision supporting systems platform）, an integrative framework for model organization, called IFMO is introduced, which includes component model description, model component framework, architecture of integrative framework etc. IFMO provides a method that implements a new modeling technique in DSS.]]></description>
<pubDate>2013/8/21 9:52:18</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHAO Xinyu,CHEN Wenwei,ZHANG Weiming and CHEN Weidong]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHAO Xinyu,CHEN Wenwei,ZHANG Weiming and CHEN Weidong</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200102013]]></guid><cfi:id>153</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[An Optimal Model of Target Selection]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200205021]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A tank group may meet with the enemy's tank group in the tank warfare. Each tank will fire at the tank which greatly threatens itself, but the result may not be optimal as a whole. A method of the target selection in the tank warfare is proposed to minimize the enemy's whole threat. The result of the model may improve the combat effectiveness of the tank.]]></description>
<pubDate>2013/8/21 9:50:03</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[WANG Zhengyuan,TAN Yuejin,DI Dongning and CEN Kaihui]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Zhengyuan,TAN Yuejin,DI Dongning and CEN Kaihui</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200205021]]></guid><cfi:id>152</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[The Design and Implementation of Integration Framework in the Weapon System Concept Design]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200204022]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Major issues in integration framework to support the weapon system concept design are discussed. A new architecture based on sharing product model and process model is proposed. Research on implementation of an integration framework is carried out in the light of the concept design of a weapon system. A computing sample is given considering shape design.]]></description>
<pubDate>2013/8/21 9:50:19</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHOU Hongwei,LI Quan,LI Qun,WANG Weiping and WANG Hao]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHOU Hongwei,LI Quan,LI Qun,WANG Weiping and WANG Hao</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200204022]]></guid><cfi:id>151</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A Solution to Dynamic Weapon-target Assignmentin the Tank Warfare]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200306013]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[It is crucial that how to accomplish dynamic weapon-target assignment (DWTA) efficiently to win the tank warfare. A model of DWTA  in tank warfare is built and also a simple solution to it is proposed. The experiment results show that the solution is valid.]]></description>
<pubDate>2013/6/14 9:08:50</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[WANG Zhengyuan and TAN Yuejin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Zhengyuan and TAN Yuejin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200306013]]></guid><cfi:id>150</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[The Formal Specification and Property Verification ofthe Command and Control]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200306014]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A conceptual model of the command and control object (C<sup>2</sup>O) is described using the formal language LOTOS(Language of Temporal Ordering Specification), and the main properties of C<sup>2</sup>O and C<sup>2</sup>O-based systems are defined using ACTL(Action Based Temporal Logical). Then a model-based-verification approach is provided aiming at the above key properties verification. The practical example shows that the new approach is viable.]]></description>
<pubDate>2013/6/14 0:00:00</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[DENG Xiaoni,YUAN Weiwei,ZENG Yi and LUO Xueshan]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>DENG Xiaoni,YUAN Weiwei,ZENG Yi and LUO Xueshan</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200306014]]></guid><cfi:id>149</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[The Approach for Designing Organizations: OrganizationCoordination and Organization Performance]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200304014]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A2C2 experiments are introduced, and based on the analysis of data obtained from a series of A2C2 experiments, the relation between organization coordination and organization performance is primarily explored. With the guidance of the conclusions for organization coordination, an algorithm for organizational hierarchical clustering, which is used for Levchuk's three-phase iterative organizational designing, is introduced, and a new thought to improve the algorithm for platform clustering is presented.]]></description>
<pubDate>2013/6/14 9:08:26</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[YANG Dongsheng,LIU Zhong and ZHANG Weiming]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>YANG Dongsheng,LIU Zhong and ZHANG Weiming</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200304014]]></guid><cfi:id>148</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Research on Network-centric Operation C<sup>4</sup>ISR Architecture ofAntiaircraft Missile System]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200406020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The network-centric operation is a new concept of information warfare. According to the concept of network-centric operation, the network-centric operation C<sup>4</sup>ISR architecture of the antiaircraft missile system is studied. The function units of combat zone are basic nodes of the architecture, the network-centric operation C<sup>4</sup>ISR architecture is composed of three logical networks, namely track-guide network, command-control(C<sup>2</sup>) network and weapon networks. The function and composition of the logic networks are defined. The architecture is valuable in network centric warfare of the antiaircraft missile system.]]></description>
<pubDate>2013/5/8 10:45:34</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LUO Aimin,XIU Shenglong,LUO Xueshan,SHU Zhen and YI Xianqing]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LUO Aimin,XIU Shenglong,LUO Xueshan,SHU Zhen and YI Xianqing</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200406020]]></guid><cfi:id>147</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[New Concepts for the Dynamic System Reliability Analysis]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200402022]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The traditional reliability concepts aim at static logic, which are no longer satisfy the requirement of the modern complex dynamic system reliability analysis. This article provides a different state space and structural function for describing dynamic system reliability. Then concepts of failure sequence and failure cluster are defined for characterizing dynamic systems' failure mode. They are extensions of the traditional static reliability concepts such as cut set and implication set, which are the special example of the provided concepts. The analog concepts including probability importance degree, structural importance degree and critical importance degree are also put forward. At last the relative concepts are illustrated using a simple example of dynamic system.]]></description>
<pubDate>2013/4/22 10:35:44</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[JIN Guang]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>JIN Guang</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200402022]]></guid><cfi:id>146</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Combat Effectiveness Evaluation of the Armored Vehicle Based onCombat Simulation]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200402023]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[It is very important to know whether the combat effectiveness of the armored vehicle is good enough to satisfy the requirements in  the future war. Combat modeling and simulation is a good method to know combat effectiveness of the Armored Vehicle in its development. On the base of the combat simulation, the main index in the evaluation, of the combat effectiveness is selected and synthesis model is built to evaluate the combat effectiveness.]]></description>
<pubDate>2013/4/22 10:35:44</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[WANG Zhengyuan,LIU Jingxu,TAN Yuejin and SHA Hongbin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Zhengyuan,LIU Jingxu,TAN Yuejin and SHA Hongbin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200402023]]></guid><cfi:id>145</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Research on the Concept of C<sup>4</sup>ISR Architecture Engineering]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200401019]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[After studying the deficiency in C<sup>4</sup>ISR architecture development and research in the field, this paper puts forth the idea of C<sup>4</sup>ISR architecture engineering, i.e. applying the concepts, principles, techniques and methods of engineering to the development and maintenance of C<sup>4</sup>ISR architecture within cost and time constraints. We present the definition of C<sup>4</sup>ISR architecture engineering, and delineate the architecture life-cycle of C<sup>4</sup>ISR system.]]></description>
<pubDate>2013/4/22 10:35:30</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[HUANG Li,LUO Aimin and LUO Xueshan]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>HUANG Li,LUO Aimin and LUO Xueshan</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200401019]]></guid><cfi:id>144</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Multicriteria Optimal Imaging Scheduling Basedon Time Ordered Acyclic Directed Graph]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200506014]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[It is a important task for imaging scheduling to acquire more image data of good quality by making rational and efficient use of the remote sensing satellite. To solve this problem a scheme is presented, which includes building satellite imaging time ordered acyclic directed graph, evaluating different imaging path according to multicriteria, and obtaining the optimal imaging path with time ordered multicriteria shortest path algorithm. Theoretical analysis and experimental results show that by using the scheme, multiple optimal pareto paths can be obtained within acceptable time, and better scheduling can be guaranteed.]]></description>
<pubDate>2013/4/10 9:23:44</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Fan,WANG Jun,LI Jun and JING Ning]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Fan,WANG Jun,LI Jun and JING Ning</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200506014]]></guid><cfi:id>143</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[The Study of the Methods of the Linear Combination Weighting forMultiple Attribute Decision-making]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200504027]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The determination of weight vectors is the key problem for multiple attribute decision making. The linear combination weighting is an effective way to do it. The general description of the linear combination weighting problem is provided. Based on the information used to solve the problem, the solution methods are classified as four different classes. The fundamental idea for each class is demonstrated. The characteristics of each class are analyzed. This is useful to understand the different methods, and can provide references to the practical use of the methods.]]></description>
<pubDate>2013/4/8 11:10:22</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LIU Jingxu,TAN Yuejin and CAI Huaiping]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LIU Jingxu,TAN Yuejin and CAI Huaiping</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200504027]]></guid><cfi:id>142</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[The Macroscopical Control of the Life Cycle Costs of theEquipments Based on System Dynamics' Model]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200503024]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Based on the difference of the combat ability of equipments and the influence of life cycle phase on the combat ability of equipments, the system dynamics' model on macroscopical control analysis of the life cycle costs of equipments is set up, which describes the relations between all the phases of the weapons' life cycle objectively and soundly. By simulation experiment of macroscopical control  analysis of the life cycle costs of equipments, some experimental conclusions have valuable reference to the construction and development of equipments.]]></description>
<pubDate>2013/4/8 0:00:00</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Dong<sup>1</sup>,LUO Fei<sup>2</sup> and LUO Xiaoming<sup>2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Dong<sup>1</sup>,LUO Fei<sup>2</sup> and LUO Xiaoming<sup>2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200503024]]></guid><cfi:id>141</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[The Model of Gasoline Blending Optimization]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200503027]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to enhance the scientificity of making the blending plan of refineries, the nonlinear programming (NLP) models of the blending optimization problems was researched in detail, including the formulation of the objective function and constraints. The simulated annealing algorithm is selected to solve the problem according to the characteristics of the model. Finally, the validity of blending optimization model is verified by the application of a refinery.]]></description>
<pubDate>2013/4/8 11:09:50</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LI Jin,LIAO Liangcai and TAN Yuejin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LI Jin,LIAO Liangcai and TAN Yuejin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200503027]]></guid><cfi:id>140</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Analyzing and Designing the Military Organization in theBattlefields of Information Age]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200502024]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In the battlefields of the information age, the flatting and networking organizations are the primary mode of the military organizations  for network centric warfare. To explore the methodology of designing the mode of the military force, the model of PCANS is used to characterize the military organization in the traditional battlefields, on which its shortages are analyzed for organizations in the information age. Importing the information into PCANS, We  advance a new approach to describe the organizations. And the essence, objective and methodology of designing the organization are presented on the organizational description in the information age.]]></description>
<pubDate>2013/3/25 4:57:57</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[YANG Dongsheng,XIU Baoxin,Peng Xiaohong,LIU zhong and ZHANG Weiming]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>YANG Dongsheng,XIU Baoxin,Peng Xiaohong,LIU zhong and ZHANG Weiming</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200502024]]></guid><cfi:id>139</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Using the Sets of Strongly Depended Activities toRecompose the C<sup>4</sup>ISR System]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200501022]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A complex C<sup>4</sup>ISR system is composed of many subsystems. We use activity model to create the activity adjacency matrix, and path matrix (accessible matrix) of graph theory to recognize the strongly connected components, so as to get the sets of strongly depended activities. The activities in one set should be rearranged in one subsystem. We adopt this approach to recompose the C<sup>4</sup>ISR system.]]></description>
<pubDate>2013/3/25 4:48:41</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[XIU Shenglong and LUO Xueshan]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>XIU Shenglong and LUO Xueshan</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200501022]]></guid><cfi:id>138</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[The Analysis of System Safety Based on Probabilistic Risk]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200501023]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to get the risk on the level of system and to obtain the quantitative decision reference of safety, this paper proposes an analytic method of system safety based on probabilistic risk. This method will divide the system into different subsystems according to some criterion, count the danger sources of all subsystems and build causality diagrams corresponding to danger sources, and at last compute the probabilistic risk on the level of system according to some rules. The difficult problem of computing the probabilistic risk by this method is discussed.]]></description>
<pubDate>2013/3/25 4:48:42</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[DONG Doudou,ZHOU Jinglun,FENG Jing,GONG Shiyu and ZHOU Zhongbao]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>DONG Doudou,ZHOU Jinglun,FENG Jing,GONG Shiyu and ZHOU Zhongbao</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200501023]]></guid><cfi:id>137</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Research on Hybrid Indexing Strategy of ResourceMetadata in Semantic Peer-to-peer Network]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200606020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[For the problem of semantic content sharing of information resources in P2P networks, this paper first proposes a multiple-ontology based resource metadata description framework, which divides resource metadata into core metadata and extensional metadata. Then, based on the metadata framework, this paper places emphasis upon the research of indexing strategy of resource metadata. A hybrid indexing architecture is provided. It uses community strategy to organize core metadata element and uses DHT and semantic association to index extensional metadata element, which combines local indexing and global indexing. Based on this indexing strategy, the work flow of resource discovery and the load balance strategy are designed. Compared with the related current systems, this indexing architecture will greatly improve the efficiency of resource discovery and the system's scalability.]]></description>
<pubDate>2013/3/14 10:39:54</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LIU Zhen,DENG su,LUO Xueshan and HUANG Hongbin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LIU Zhen,DENG su,LUO Xueshan and HUANG Hongbin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200606020]]></guid><cfi:id>136</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Modeling Combat Using Random Mapping]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200606021]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Random network for Lanchester combat, a novel theoretical model for combat is put forward based on the definition of random mapping. The model is an ER random sub-graph of directed bipartite graph, or a series of random mapping with the decreased size of mapping domains, in which the relationship of local interaction and the system behavior  have been formally and explicitly represented. The results obtained mainly by simulation and analysis show that the efficiency of the whole combat network follows the Lanchester's square-law, and that the topological structure of the network generated by the model is heterogenous, following exponential-law of degree distribution. Finally, the influence from the factors of globe information on the efficiency of the whole warfare system is studied through data experiments for both “symmetric” and “asymmetric” combat cases. It ends up with a discussion on the significance of network modeling in the combat modeling theory, experiments and methods of calculation.]]></description>
<pubDate>2013/3/14 10:39:54</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[TAN Dongfeng]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>TAN Dongfeng</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200606021]]></guid><cfi:id>135</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Constraint Programming Model of Satellite Mission Scheduling]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200605026]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Mission planning and scheduling of satellite, which is to support task plan making of satellite scientifically, is a main content of space resource management. One of the most important characteristics of satellite mission scheduling is that it is subject to time windows constraint, which means that tasks can only be completed within the given time windows. The scheduling model is formulated based on reasonable assumptions and constraint programming method. The model is solved with Variable Neighborhood Tabu Search (VNTS) algorithm. On the basis of a limited experiment, we observe that the algorithm is very effective in obtaining near-optimal solutions.]]></description>
<pubDate>2013/3/14 10:39:12</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[CHEN Yingwu,FANG Yanshen,LI Jufang and HE Renjie]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CHEN Yingwu,FANG Yanshen,LI Jufang and HE Renjie</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200605026]]></guid><cfi:id>134</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Design on Architecture Products of C<sup>4</sup>ISR]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200605027]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[C<sup>4</sup>ISR architecture framework defines the products which are used to describe system architecture. It follows that the design of products is an important process of building architecture. Based on C<sup>4</sup>ISR architecture framework, the core products which include Operational Node Connectivity Description, Activity Model, System Interface Description and the like are described normatively. Furthermore, the relationships of products are analyzed, and the methods to validate the design of product are presented.]]></description>
<pubDate>2013/3/14 10:39:13</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LUO Aimin,HUANG Li and LUO Xueshan]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LUO Aimin,HUANG Li and LUO Xueshan</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200605027]]></guid><cfi:id>133</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Research on Optimize Algorithms of Command Relationship inTailoring Military Force Structure]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200604021]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[There exit lots of complex interdependence and communications among decision-making entities because of combat resource entities clustering on task and commander controlling those resource entities to complete combat tasks. Excellent structure of military force should be required to accomplish missions. Military force is composed of two parts: one is collaboration among decision-making nodes of command and control; the other is hierarchy relationship of command among commanders. Military force designing is to optimizing collaboration and hierarchy among commander nodes. In this paper, we set relationship of commander from coordination net among commanders. The optimizing objective is to minimize the overall additional coordination imposed by hierarchy structure among commanders. Algorithms of optimized coordinate tree are employed to generate command relationship in military force.]]></description>
<pubDate>2013/3/25 4:46:14</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LIU Hongfang<sup>1</sup>,YANG Dongsheng<sup>2</sup>,LIU zhong<sup>1</sup> and ZHANG Weiming<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LIU Hongfang<sup>1</sup>,YANG Dongsheng<sup>2</sup>,LIU zhong<sup>1</sup> and ZHANG Weiming<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200604021]]></guid><cfi:id>132</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[On the Markov Characteristic of Dynamic Weapon TargetAssignment Problem]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200603026]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Dynamic weapon target assignment (WTA) is an important theoretical problem for military operation research and a challenging practical concern in the process of combat command. Based on the description and analysis of dynamic WTA problem, the Markov characteristic of the WTA problem was proved with stochastic theory, and the transition possibility matrix of the Markov decision process was also presented. Meanwhile, the characteristic of the transition probability matrix was analyzed. The result of the research sheds light on the study on the WTA problem in theory and method.]]></description>
<pubDate>2013/3/14 10:38:49</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[CAI Huaiping,LIU Jingxu and CHEN Yingwu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CAI Huaiping,LIU Jingxu and CHEN Yingwu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200603026]]></guid><cfi:id>131</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Reliability Evaluation Based on Normal-poisson Process onCondition of Small Sampling Test]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200603027]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Using degradation measurement of product performance over time to analyze product reliability is an effective approach for high-reliability or long-life products. Based on the performance degradation mechanism of aerospace product and the small sampling characteristic of field test, a model in terms of Normal-Poisson process is proposed. Then the calculation formula for parameter and reliability evaluation is presented through the small sampling test combined with Bayes method. Finally, an example is given to show the validity of this method.]]></description>
<pubDate>2013/3/14 10:38:49</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Yongqiang<sup>1,2</sup>,LIU Qi<sup>1</sup> and ZHOU Jinglun<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Yongqiang<sup>1,2</sup>,LIU Qi<sup>1</sup> and ZHOU Jinglun<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200603027]]></guid><cfi:id>130</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Rule Extraction from Support Vector Machines]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200602024]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Support vector machines is a blackbox model whose knowledge is concealed in the decision function. This has not only weakened the confidence of users in building intelligent systems using support vector machines techniques, but also hindered the application of support vector machines to data mining. Since extracting rules from support vector machines help to solve those problems, this area is becoming a hot topic in both machine learning and intelligent computing communities. In this paper, the typical algorithms for rule extraction from support vector machines are introduced, and some issues valuable for future exploration in this area are indicated.]]></description>
<pubDate>2013/3/14 10:38:34</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[WANG Qiang,SHEN Yongping and CHEN Yingwu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Qiang,SHEN Yongping and CHEN Yingwu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200602024]]></guid><cfi:id>129</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Real-time Monitoring Method for System Safety Based on Fault Tree]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200602025]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Most of the current methods for safety analysis belong to the scope of safety pre-analyzing, which analyzes the system safety before system being in service. But the system safety is full of variety because of　the system's dynamic characteristic, such as the running status variation of system component. In order to know well the real-time safety risk, a real-time  monitoring method for system safety is proposed. The safety risk model was established on the fault tree that was used to represent logic structure of system. The real-time safety risk was monitored according to the correspondence between　technical status of system component and running status of system component. Simultaneously the method could account for the change of risks, thus ensuing the taking of precautions. Finally a case monitoring the safety risk for cooling system with pre-feedback was used to demonstrate the effectiveness of the method.]]></description>
<pubDate>2013/3/14 10:38:34</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[DONG Doudou,ZHOU Zhongbao,FENG Jing,SUN Quan and ZHOU Jinglun]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>DONG Doudou,ZHOU Zhongbao,FENG Jing,SUN Quan and ZHOU Jinglun</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200602025]]></guid><cfi:id>128</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Research of Photo-reconnaissance Satellite SchedulingProblem with Variable Profit of Activity]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200602026]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The characteristic that observation activity has variable profit in satellite scheduling is analyzed, and the upper bound and lower bound of profit of activity are discussed. An advanced tabu search algorithm with local derivational is proposed. A mechanism with layered variable evaluating functions is used in the proposed tabu search algorithm, which leads the procedure of searching solution to multiobjective optimization, and both raises the rate of coverage and reduces the consumption of energy. The result of practical example demonstrates that the algorithm proposed in this paper can be applied to the satellites scheduling problem with variable profit of activity effectively.]]></description>
<pubDate>2013/3/14 10:38:34</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[RUAN Qiming,TAN Yuejin,HE Renjie and CHEN Yingwu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>RUAN Qiming,TAN Yuejin,HE Renjie and CHEN Yingwu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200602026]]></guid><cfi:id>127</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Formation Recognition Based on Hough Transform]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200602027]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[As an important property of operation group, formation reflects the cooperative relationships among group members in space arrangement. It often indicates the intention of near future, identity and threat of enemy groups directly. In order to provide much more significant battlefield information and much better support for commanders' situation assessment and command activity, the problem of recognizing made-up lines of formations is researched. Based on Hough Transform, a template-based modeling method for these formations is proposed at first, then the pattern feature extraction strategy based on clustering of points in Hough Space is put forward. At the end of the paper, a formation recognition approach based on the matching between pattern features of a formation and these templates is suggested. Experiment results show that the method is effective.]]></description>
<pubDate>2013/3/14 10:38:34</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[CAI Yichao,ZHANG Weiming,HE Ling and LIU Zhong]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CAI Yichao,ZHANG Weiming,HE Ling and LIU Zhong</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200602027]]></guid><cfi:id>126</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Research of Structure Analyzing and Modeling forComplex System of Systems]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200601014]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[According to the concept and the features of complex system of systems, its structure was synthetically analyzed with its mission and elements composing. Both the three-phase mission decomposing process, which consists of goal decomposing, function decomposing and action decomposing, and the three-element structure framework, which includes system unit, system compound and its environment, were described for complex system of systems. On this basis, a new design method which utilizes the “two-level, four-grade” framework to effectively model the structure for complex system of systems was presented. At the same time, aimed at the location level and function interrelation existing in complex system of systems, such terms as measuring entity, level mapping, relationship between systems and soft structure level were defined. This clarifies the essence of level mapping in the structure analyzing and modeling of system of systems. Therefore, some theoretic guidance for the effectiveness evaluation and the upgrading and optimization of complex system of systems is revealed through this kind of analyzing and modeling methodology.]]></description>
<pubDate>2013/3/25 4:43:42</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Songbao,ZHANG Weiming,LIU Zhong and HUANG Jincai]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Songbao,ZHANG Weiming,LIU Zhong and HUANG Jincai</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200601014]]></guid><cfi:id>125</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[The Earth Rotation Effects on Distributed Spaceborne SAR-GMTI]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200601020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The earth rotation has two main effects on the distributed spaceborne SAR-GMTI. Firstly, the baseline must orient the same direction of radar's footprint on the rotating earth to mitigate the fluctuant terrain clutter and satisfy ATI, DPCA or STAP condition, which means that proper relationships must be maintained between satellites' orbit parameters. Secondly, Doppler is dependent on range, so yaw steering technique is required to mitigate the warping or extended clutter notch. Based on the two effects, a distributed spaceborne SAR system composed of 3 small satellites was designed to perform GMTI function. Performance simulation was made to scale the system capability through SCNR loss metric for both X and L bands.]]></description>
<pubDate>2013/3/25 4:43:48</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[YANG Fengfeng,LIANG Diannong and LIU Jianping]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>YANG Fengfeng,LIANG Diannong and LIU Jianping</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200601020]]></guid><cfi:id>124</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A New Approach of C<sup>4</sup>ISR RequirementsDevelopment：Modeling Based on Ontology]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200706019]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Being complex and special, C<sup>4</sup>ISR requirements are, often comprehended and expressed in various ways. Nowadays the results of C<sup>4</sup>ISR requirements development are unsatisfactory. Therefore, the authors put forward a new approach: modeling C<sup>4</sup>ISR requirements based on ontology. In this paper, the ontology of the basic categories and relationships needed to represent C<sup>4</sup>ISR requirements is present. Ontology model and semantic ontology model are included. In particular, the research focuses on clarifying the domain knowledge about C<sup>4</sup>ISR requirements. After that, a procedure for modeling C<sup>4</sup>ISR requirements based on ontology is supplied. Finally, an illustration is provided to show the feasibility,and effectiveness of the approach, indicating its promising prospect.]]></description>
<pubDate>2013/2/28 5:09:22</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Weiming and DUAN Caiyu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Weiming and DUAN Caiyu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200706019]]></guid><cfi:id>123</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[An Evolving Network Model for Effectiveness ofCombat between SoSs]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200706020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A novel model is put forward which represents combat behavior and network behavior in an unitary form, the evolving network for  the combat on the battlefield F<sub>R,B</sub>is constructed jointly by generating a random network on f<sub>R,B</sub>and removing nodes from fighting forces' networks, under the condition that the assumptions of Lanchester Model is generalized, and represented as a triple of networks F<sub>R,B</sub>=forces R's network I<sub>R</sub>∪ forces B's network I<sub>B</sub>∪ engagement space f<sub>R,B</sub>.In the model the effectiveness of a networked forces relates not only its size and the weapon performance, but also the structure of network and the battlefield in which it operates. An experiment shows that with the same operational assets a scale-free network is more dominant than a random network for both information effectiveness and killing rate but not always wins, the origin is analyzed that the scale-free network is efficiency，robust yet fragile in the conflict system.]]></description>
<pubDate>2013/2/28 5:09:22</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[TAN Dongfeng]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>TAN Dongfeng</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200706020]]></guid><cfi:id>122</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Real-time Reliability Evaluation for Degradation FailureProduct Based on Bayes Method]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200706025]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The failure distribution from traditional reliability methods reflects the “average” characteristics of the same kind of product. In order to get the real time reliability of degradation failure product with history test data, this paper adopts the local updating ideas, uses the on-site measuring data through Bayes method and gets the real time reliability model of the product that timely reflects the on-site data. The result shows that real-time reliability model expresses the specific characters gradually with the increase of fusing on-site data.]]></description>
<pubDate>2013/2/28 5:09:22</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHAO Zhao,DONG Doudou,ZHOU Jinglun and FENG Jing]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHAO Zhao,DONG Doudou,ZHOU Jinglun and FENG Jing</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200706025]]></guid><cfi:id>121</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Research on the Model of Satellite Data Transmission Scheduling]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200706026]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The problem of satellite data transmission is an optimization problem with multi-time windows and multi-resources constrains. In view of the problem, the paper constructs satellite data transmission request model, task model and scheduling model. In the process of constructing models, the style of frame model is adopted, while all the constrains are put into every data transmission task. This not only reduces the complexity of scheduling model, but also reduces the difficulty of designing scheduling algorithm. In addition, this paper also presents the idea of designing scheduling algorithm, and designs a flexibility based scheduling algorithm. Results from simulation show that the model and algorithm are feasible for solving the satellite data transmission scheduling problem.]]></description>
<pubDate>2013/2/28 5:09:22</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LI Yunfeng,CHEN Xiangguo and WU Xiaoyue]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LI Yunfeng,CHEN Xiangguo and WU Xiaoyue</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200706026]]></guid><cfi:id>120</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Framework for Modeling C<sup>4</sup>ISR Requirements]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200705025]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[There has been no mature model for expressing needs and expectations of people within the area of national defense, and it is considered as the most important business in C<sup>4</sup>ISR requirement analysis. In order to cope with this problem, an approach has been put forward in the paper. Firstly, basic concepts were analyzed, the concept of C<sup>4</sup>ISR requirement system was put forward based on concept analysis, and the idea of modeling C<sup>4</sup>ISR requirements was presented. Secondly, elements of C<sup>4</sup>ISR requirements model were studied. Metaclasses in the domain of C<sup>4</sup>ISR requirements and relationships among the metaclasses were distilled and defined. Therefore, C<sup>4</sup>ISR requirements models were designed on purpose to solve C<sup>4</sup>ISR requirement problems. Lastly, the paper provides the process of modeling C<sup>4</sup>ISR requirements based on element analysis. What C<sup>4</sup>ISR requirement models require and how to build the models are clarified. The approach elaborates what the real C<sup>4</sup>ISR requirements are and it can serve as the guideline of modeling C<sup>4</sup>ISR requirements.]]></description>
<pubDate>2013/2/28 5:09:09</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[DUAN Caiyu,ZHANG Weiming and YU Bin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>DUAN Caiyu,ZHANG Weiming and YU Bin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200705025]]></guid><cfi:id>119</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Military Capability-to-system Bilevel Programming Modeland Its Solution Algorithm]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200705026]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A new methodology of Capability Based Planning is introduced, and a bilevel programming model to allocate resources at military capability and system level is presented. The upper level of the model has two global objectives of effect and effect-cost ratio, which determines the constraint of investment scale to the lower. At the lower level, the optimal combinations of alternative systems are attained to maximize each kind of capabilities under the specified cost constraint, and then returned to the upper. To solve the bilevel programming model, the multiobjective genetic algorithm is adopted. The results of the presented example suggest that the bilevel programming model and its solution algorithm are valid to the problem of military acquisition and resource allocation.]]></description>
<pubDate>2013/2/28 5:09:09</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[CEN Kaihui,TAN Yuejin,YANG Kewei and LI Mengjun]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CEN Kaihui,TAN Yuejin,YANG Kewei and LI Mengjun</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200705026]]></guid><cfi:id>118</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Research on Structure Designing for Redundancy-based ComplexSystem of Systems with Dynamic Adaptation]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200705027]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Considering some problems derived from the dynamic adaptation research on complex system of systems, a new design method which applies redundancy theory to effectively improving the dynamic adaptive ability of complex system of systems is presented. The concept of redundancy-based complex system of systems is firstly described. On this basis, both the dynamic game design process of redundancy-based adaptive complex system of systems and its framework are shown. Then three kinds of redundancy, such as task redundancy, system redundancy and structure redundancy, are illustrated in detail according to the structure hierarchy features and the mission performing rule of complex system of systems. Lastly, the redundancy framework existing in complex system of systems is synthetically discussed from the viewpoints of redundancy switching, redundancy material and redundancy character, which indicates that the redundancy framework is not only an adaptive strategy to dynamic environment for complex system of systems, but also the demand and result of its long-lasting evolvement. Thus, some theoretic guidance for structure design and effectiveness evaluation of the dynamic adaptation of complex system of systems and its upgrading and optimization should be conducted with this kind of analyzing methodology.]]></description>
<pubDate>2013/2/28 5:09:09</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Songbao<sup>1,2</sup>,ZHANG Weiming<sup>1</sup>,HUANG Jincai<sup>1</sup> and LIU Zhong<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Songbao<sup>1,2</sup>,ZHANG Weiming<sup>1</sup>,HUANG Jincai<sup>1</sup> and LIU Zhong<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200705027]]></guid><cfi:id>117</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[The Structural Model for Mobile Missile SystemSurvivability Assessment]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200704026]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Based on the component analysis of missile system, the survivability block model of series, parallel, backup were built, and the analytical solution for structuralized model were illustrated. Finally, an example was presented to show the analysis process.]]></description>
<pubDate>2013/2/28 5:08:54</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LIU qi<sup>1</sup>,HU Juntao<sup>2</sup> and LI Hengfeng<sup>3</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LIU qi<sup>1</sup>,HU Juntao<sup>2</sup> and LI Hengfeng<sup>3</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200704026]]></guid><cfi:id>116</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Safety Analysis Algorithm Based on Large ScaleBayesian Networks]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200704027]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The computation consumption of Bayesian network increases exponentially with the nodes number and that limits the application of large－scale Bayesian network. In order to relieve this situation, this paper makes use of the independence condition to decompose the whole Bayesian network according to the characteristics of safety analysis, compresses the items number in reasoning process, proposes the algorithms for top event probability and cut sets, simultaneously analyses the computational complexity. Compared with BDD－based FTA algorithm, the proposed algorithms showed a lower memory demand and a higher speed performance when meeting the need of safety engineering.]]></description>
<pubDate>2013/2/28 5:08:54</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[DONG Doudou,Zhou Jinglun,ZHAO Zhao and ZHOU Zhongbao]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>DONG Doudou,Zhou Jinglun,ZHAO Zhao and ZHOU Zhongbao</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200704027]]></guid><cfi:id>115</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[An Approach to Task Allocating among Group of Agents Basedon the Theory of Information Granulation]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200703015]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[An effective task allocating is important for MAS to complete its mission through efficient cooperation among agents. A new approach is introduced on the basis of the theory of information granulation, which includes two phases: the phase of granulating agents and tasks and the phase of allocating tasks in granular. The mathematical formulation of the first phase is presented, and its solution is proposed based on genetic algorithm. A numerical example shows a better performance of the proposed method.]]></description>
<pubDate>2013/2/28 5:08:41</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[XIU Baoxin,LIU Zhong,ZHANG Weiming and YANG Dongsheng]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>XIU Baoxin,LIU Zhong,ZHANG Weiming and YANG Dongsheng</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200703015]]></guid><cfi:id>114</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Research on Architecture Model with AutonomousCooperation for DSS Based on MAS]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200804022]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The qualitative analysis and comparison of commonly-used autonomous control architectures of Distributed Satellite Systems (DSS) are discussed. Based on it, a hybrid systematic hierarchical architectures model  with two levels is put forward to fulfill autonomous cooperation demands of DSS under the dynamic and complicated uncertain circumstances. Furthmore, a novel agent model on satellite control architecture is outlined, and the components, functions and relationships of agents in the architecture are analyzed. It is designed for multi-satellites cooperation and satellite self-government, thus it has generality to a certain extent.]]></description>
<pubDate>2012/12/7 2:57:38</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[GAO Li and SHA Jicang]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>GAO Li and SHA Jicang</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200804022]]></guid><cfi:id>113</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A Study of Executable Architecture]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200803015]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Architecture is a blueprint of system design and implementation, and whether it can guide practice correctly largely depends on the architecture verification and evaluation. Executable architecture provides a new way to validate and evaluate the architecture. In order to make all architecture products into a whole executive entity, this paper puts forward a new concept—execution rules description. Execution rules describe the execution, call and data flow relationship between architecture products, and thus provide special background information for the architecture execution. Through standard dynamic executive model interfaces, execution rules can call the models' executable engines, and then attain the aim to run the architecture on the whole. That architecture can run successfully, providing justification for architecture verification, and its executive result also provides justification for architecture evaluation.]]></description>
<pubDate>2012/12/7 2:57:24</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[JIANG Jun,LUO Xueshan,LUO Aimin and YANG Chunhui]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>JIANG Jun,LUO Xueshan,LUO Aimin and YANG Chunhui</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200803015]]></guid><cfi:id>112</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Application of the Kernel Principal Component AnalysisMethod to University S&T Innovation Capability Evaluation]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200803016]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Universities play an important role in the national innovation system, and the research on the university S&T innovation capability evaluation is of great significance. Kernel principal component analysis(KPCA) method is proposed for the evaluation of university S&T innovation capability. This method, in comparison with Principal Component Analysis (PCA) method, can solve nonlinear correlation problem of evaluation index in the analysis of the S&T data released in 2002 from 15 universities directly subordinate to Chinese Ministry of Education. In particular, the result shows that contribution of the first and second principle components are more concentrated by KPCA than by PCA, and KPCA has better evaluation performance than PCA.]]></description>
<pubDate>2012/12/7 0:00:00</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LU Wei<sup>1,2</sup>,WANG Xinfeng<sup>2</sup> and SUN Zhixin<sup>2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LU Wei<sup>1,2</sup>,WANG Xinfeng<sup>2</sup> and SUN Zhixin<sup>2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200803016]]></guid><cfi:id>111</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A Conceptual Model for Describing C<sup>4</sup>ISR Military Requirements]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200802023]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Conceptual model for describing military requirements of C<sup>4</sup>ISR plays an important role for modeling C<sup>4</sup>ISR requirements. Based on 　the analysis of the model for C<sup>2</sup> process, a conceptual model for C<sup>4</sup>ISR military requirements description is put forward. On the whole, the conceptual model comprises object, subject and modeling. At the same time, the common concepts  and terminologies, which are often used to describe C<sup>4</sup>ISR requirements, are defined. With the help of the conceptual model for describing C<sup>4</sup>ISR military requirements, relations among these common concepts and terminologies are explained  and clarified. Therefore, constraints and fundamentals for describing C<sup>4</sup>ISR military requirements are presented. Finally, an example about anti-air system is presented, which shows that the conceptual model is highly feasible and promising.]]></description>
<pubDate>2012/12/7 2:57:08</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[YU Bin,DUAN Caiyu and RAO Dehu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>YU Bin,DUAN Caiyu and RAO Dehu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200802023]]></guid><cfi:id>110</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Organizational Design of C2 by NSGA-Ⅱ Multi-objective Optimization Algorithm]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200905013]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[An efficient multi-objective optimization (MO) algorithm named as NSGA-Ⅱ is applied to solve the problem of organizational design of C2. Before introducing the settings of NSGA-Ⅱ, a discussion is made about the shortcomings in forming optimizing objective by weighted method and proceeding procedure like nested GA, which exist in popular algorithms of organizational design of C2. With this MO algorithm, more indexes can be optimized within one procedure which makes it more practical than dealing with single index as usually. Some modifications are made for  NSGA-Ⅱ to match the specifications of the experiment, a group of appealing and inductive results are reached, which reveals the effectiveness of NSGA-Ⅱ in the problem of organizational design of C2.]]></description>
<pubDate>2012/11/8 3:52:02</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[QIAO Shidong,HUANG Jincai,XIU Baoxin and ZHANG Weiming]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>QIAO Shidong,HUANG Jincai,XIU Baoxin and ZHANG Weiming</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200905013]]></guid><cfi:id>109</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[An QFD and ANP Based Equipment Operational RequirementsAnalysis Approach]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200904027]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In equipment demonstration, it is a difficult task to map vague operational requirements onto quantitative requirements of operational performances logically and reasonably. A requirements analysis approach based on the Quality Function Development (QFD) and Analytic Network Process(ANP) is proposed to solve this problem. It can help analysts to understand the causal relationship between factors and make reasonable judgments. Operational performance ratings can be obtained in the structured operational requirements analysis procedure. Finally, an example is presented to validate the proposed method.]]></description>
<pubDate>2012/11/8 3:52:18</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[XU Yongping,YANG Feng and WANG Weiping]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>XU Yongping,YANG Feng and WANG Weiping</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200904027]]></guid><cfi:id>108</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Analysis of Problem Frame and Properties Materiel Requirements]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200903022]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to extropolate what are involved in materiel requirements, problem frame for materiel requirements is provided and substantive properties which belong to materiel requirements are rigorously analyzed based on key artifacts, which are distilled from the wide variations in the use of terms. Problem frame for materiel requirements focuses on the key artifacts, their attributes, and relationships at a general level. By using higher-order logical notational conventions, formal analyses are made, describing the relations that material requirements and their reflection must satisfy. Adequacy, precondition, feasibility, necessity, and hierarchy of materiel requirements are included. Adequacy, necessity, and guidablity of materiel requirements reflection are also included. Finally, an example about the presumed urban antimissile defense system shows that the approach is highly feasible, effective and promising.]]></description>
<pubDate>2012/11/8 3:52:33</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[DUAN Caiyu,ZHANG Weiming and YU Bin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>DUAN Caiyu,ZHANG Weiming and YU Bin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200903022]]></guid><cfi:id>107</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Simulation and Evaluation of Space Force Command Schemein Joint Operation]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200903025]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Space force command scheme in joint operation determines the efficiency of the relevant command system, so it is necessary to quantitatively evaluate the command schemes and to optimize them. This paper introduces how to evaluate command scheme by the efficiency of the space force command system in joint operation. Based on command activities  the command efficiency index architecture is built, and a blueprint of the simulation system for command scheme evaluation is suggested.]]></description>
<pubDate>2012/11/8 3:52:33</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Taihua<sup>1</sup>,CAO Yuhua<sup>2</sup>,HU Xiaofeng<sup>2</sup> and LIAO Xinghe<sup>2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Taihua<sup>1</sup>,CAO Yuhua<sup>2</sup>,HU Xiaofeng<sup>2</sup> and LIAO Xinghe<sup>2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200903025]]></guid><cfi:id>106</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Research on the Matter-element Belief Network Model]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200901026]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Integrated with matter-element theory, a new theory of matter-element bayes network is put forward, in terms of an analysis of the limitation in the process of modeling bayes network. This new theory can syncretize each advantage of both theories, which can be used to handle the uncertainty of complex systems and make full use of all the useful information in these systems at the same time. Therefore, a better evaluation of complex systems can be obtained with this new theory.]]></description>
<pubDate>2012/11/8 3:52:59</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[WANG Peng<sup>1</sup>,ZHOU Houshun<sup>2</sup> and WANG Shuzong<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Peng<sup>1</sup>,ZHOU Houshun<sup>2</sup> and WANG Shuzong<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200901026]]></guid><cfi:id>105</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Research on Description of Weapon Equipment System ofSystems Capability Spaces]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200901027]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The weapon equipment system of sytems capability is an important part of the weapon equipment system of sytems. In this paper, the weapon equipment system of sytems capability is described formally, and the character is given. The weapon equipment system of sytems capability spaces is analyzed and the relation between the capabilities is defined from different viewpoints. The weapon equipment system of sytems capability subsystem is built. Based on the singer capability, capability relation and capability system, the weapon equipment system of sytems capability is discussed, which establishes the basis for the study of the weapon equipment system of sytems and the weapon equipment system of sytems capability.]]></description>
<pubDate>2012/11/8 3:52:59</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHAO Qingsong,TAN Weisheng and LI Mengjun]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHAO Qingsong,TAN Weisheng and LI Mengjun</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/200901027]]></guid><cfi:id>104</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Design and Analysis of C2 Robust OrganizationalCommunication Structure]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[C2 (Command and Control) organizational communication structure and its restriction of design were introduced. The design issue on a robust communication of C2 was discussed. Then the research proposed a robust design methodology of organizational communication  structure based on Nested GA (Genetic Algorithms). The topology and the capability of link were searhed in the outer GA; the inside GA could calculate the average delay in the mission set which could be used to evaluate the capability of link in the outer GA as adaptability value. A numerical example and the cases show the performance of the robust design method proposed can achieve the design objectives.]]></description>
<pubDate>2012/8/28 16:45:11</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LIU Zhong,YANG Shan,XIU Baoxin and HUANG Jincai]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LIU Zhong,YANG Shan,XIU Baoxin and HUANG Jincai</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005020]]></guid><cfi:id>103</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[System Cohesion Analysis Method on Information SystemsArchitecture]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005021]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[System cohesion is an important evaluation factor in information system architecture. Based on the architecture framework, the formal description of system interfaces and system functions were provided. In terms of functions and data relationships, the function cohesion and data cohesion were defined respectively, and the system cohesion evaluation method was proposed. Furthermore，an application example was presented．The method is helpful in system design, function assignment, and improving the quality of architecture development.]]></description>
<pubDate>2012/8/28 16:45:11</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LUO Aimin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LUO Aimin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005021]]></guid><cfi:id>102</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Exploratory Analysis Modeling for the Measurement of Commandand Control System Effectiveness Based on Granular Computing]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005022]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The granular principles of exploratory analysis model was investigated, a granular computing-based exploratory model was constructed for the measurement of command and control system effectiveness. The paper focused on model construction, granular acquisition and attribute function formation in the exploratory model. For the minimizing of the mission completion time, the exploratory analysis experiment was designed, with reference to cases of  multi-branch joint operations. The exploration shows that the exploratory analysis modeling based on granular computing can reduce the complexity by granular conversion and keep consistency of problem description on different granular levels.]]></description>
<pubDate>2012/8/28 16:45:11</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[XIU Baoxin,LIU Zhenya,ZHANG Weiming and LIU Zhong]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>XIU Baoxin,LIU Zhenya,ZHANG Weiming and LIU Zhong</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005022]]></guid><cfi:id>101</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Research on Pattern of Generating C<sup>4</sup>ISR RequirementsBased on Evolutionary Rules]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005023]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to generate C<sup>4</sup>ISR requirements systemically, systems must be classified in particular. However, the taxonomies of systems are still in their early stage, which is not adaptive to C<sup>4</sup>ISR requirements generation. Therefore, a three-dimensional (3-D) taxonomy, which is based on characters of C<sup>4</sup>ISR requirements and evolutionary rules of weapon materiel, is put forward. In 3-D taxonomy, weapon materiel were classified according to three levels of task illegibility, three levels of structure complexity, and three levels of technological uncertainty. Based on the hypothesis that C<sup>4</sup>ISR requirements generation must be adaptive to the type, it is suggested that C<sup>4</sup>ISR requirements generation comprise three modes, which are reproduction, discovery and creation respectively. They can provide the way to be exact, right and advanced respectively. The relation between the modes of generating C<sup>4</sup>ISR requirements and the types is presented. At last, an example is analyzed to illustrate the pattern. The example shows that the pattern is feasible and that C<sup>4</sup>ISR requirements can be generated systemically.]]></description>
<pubDate>2012/8/28 16:45:11</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Weiming and DUAN Caiyu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Weiming and DUAN Caiyu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005023]]></guid><cfi:id>100</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A Distributed Cooperative Situation Analysis ApproachBased on Dialectic Semantics]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005024]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The distributed cooperative situation analysis plays a significant role in the Campaign Planning of Joint Operations. Since the current environments of battlefields are so dynamic and full of uncertainty, the traditional methods of situation analysis deal with the uncertain, inconsistent and incomplete information in these contexts with limited capability. This paper proposes a novel approach for the distributed cooperative situation analysis based on the Dialectic Semantics of the Argumentation Theory. The approach analyzed and represented the claims of different participants, the attack relationships among the arguments from different participants, and the focuses of contradictions between different claims using the multilateral dialogue games, and constructed a Grid of Dialectical Analysis Trees to assist the decision makers to cooperatively solve the inconsistencies of their beliefs and the conflicts among their standpoints in situation analyses. This study will provide a new methodology for the situation analysis of Joint Operations.]]></description>
<pubDate>2012/8/28 16:45:11</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[YAO Li,YUAN Jinping and QI Xuetian]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>YAO Li,YUAN Jinping and QI Xuetian</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005024]]></guid><cfi:id>99</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A Model of Network Synchronization for Value Chain ofCombat of SoSs]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005025]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Lanchester equations that describe the “size effect” of casualties assume that the intra-structure of a force is perfect, which  is sublated in this article. It puts forwards firstly an opinion formation dynamic model expressing the “synchronization effect” for value chain of combat of systems of systems (SoSs). It is a topological and characterized attributes-based methodology for presenting conceptions, such as battlefield variation, individual/shared cognition, self-synchronization and equilibrium in combat of SoSs, and the “synchronization fragility” of scale-free network under equilibrium is found in simulation of combat of SoSs.]]></description>
<pubDate>2012/8/28 16:45:11</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[TAN Dongfeng<sup>1</sup>,BAO Xiankun<sup>1</sup> and HU Dinglei<sup>2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>TAN Dongfeng<sup>1</sup>,BAO Xiankun<sup>1</sup> and HU Dinglei<sup>2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005025]]></guid><cfi:id>98</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[The Problem of Disaster Monitoring Satellite SchedulingBased on CHARTER Mechanism]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005029]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The problem of disaster monitoring satellite (imaging satellite) scheduling based on CHARTER mechanism is researched. At the very beginning the mechanism on which CHARTER is working was introduced. The problem was taken as a rescheduling problem against area targets according to the mechanism. To observe effectively, a dynamic partitioning algorithm for area target was proposed, and a dynamic rescheduling algorithm was raised to support satellite       re- rescheduling. Finally an example was constructed to testify the correctness and validity of the algorithm proposed.]]></description>
<pubDate>2012/8/28 16:45:11</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LIU Xiaolu,CHEN Yingguo,LI Jufang and CHEN Yingwu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LIU Xiaolu,CHEN Yingguo,LI Jufang and CHEN Yingwu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005029]]></guid><cfi:id>97</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Approach to Group Decision Making with Multi-granularity andMulti-semantic Linguistic Comparison Matrices]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005030]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In group decision-making problems with linguistic comparison matrices, different decision makers may use linguistic term sets with different granularity and different semantic to represent their preferences. A new approach to deal with this issue was presented, which uniform the linguistic term sets with multi-granularity and multi-semantic into the normalized representations of two-tuple linguistic. It was approved that by this approach there is no information loss and the linguistic comparison matrix can keep its properties after unification. Then, based on some aggregation operators of 2-tuple linguistic, different decision makers' preference information was aggregated into the group preference information and most desirable alternative is selected. An example was presented to validate the proposed method.]]></description>
<pubDate>2012/8/28 16:45:11</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[XU Yongping,WANG Weiping and YANG Feng]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>XU Yongping,WANG Weiping and YANG Feng</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201005030]]></guid><cfi:id>96</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Simulation Modeling for Equipment Maintenance SupportSystem Based on Stochastic Service Resource Management Object]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201002023]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Equipment Maintenance Support System (EMSS) is a class of complex dynamic system. How to effectively analyze and construct simulation model for EMSS is a problem. Firstly，a two-layers framework named “physical layer—operation layer” framework is presented to analyze the EMSS in detail. Secondly, the concept of Object is extended to Stochastic Service Resource Management Object (SSRMO) to model the physical layer of EMSS. Thirdly, a modeling approach based on UML dynamic modeling technique for the operation procedure of EMSS is presented and the operation procedure model is further decomposed into the operation rules of SSRMO. Finally, a detailed simulation experiment nearly including all the important aspects of EMSS is designed and conducted. The results have revealed the integrality of the two-layers analyzing method and the feasibility of SSRMO in modeling the physical resource and the artificial rules.]]></description>
<pubDate>2012/9/19 9:01:23</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LI Lingwei,CHEN Tong and GUO Bo]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LI Lingwei,CHEN Tong and GUO Bo</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201002023]]></guid><cfi:id>95</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Performance Analysis of JTIDS with Partial Band Noise Interference]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201001023]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The combined modulation methods as well as various encoding methods adopted in Joint Tactical Information Distribution System (JTIDS) guaranteed the message transmission reliability. The anti-jamming performance of JTIDS on rice fading channel is analyzed; the symbol error rate and the message discarded rate of the system in partial band noise interference are derived by simulation. The simulation result shows that various anti-jamming technology such as RS encoding, and Interleaving and DS/FFH MSK modulation combined in JTIDS can improve the performance of data link communication so much that a lower symbol error rate and message discarded rate can be obtained in complex channel environment and the requirement of message transmission reliability is satisfied.]]></description>
<pubDate>2012/9/19 9:01:36</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[YANG Guang<sup>1,2</sup>,ZHOU Jinglun<sup>1</sup> and LUO Pengcheng<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>YANG Guang<sup>1,2</sup>,ZHOU Jinglun<sup>1</sup> and LUO Pengcheng<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201001023]]></guid><cfi:id>94</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Application of Modified Electromagnetism-like Algorithm in Weapon-target Assignment Problem]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201106027]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A method of particle coding based on progression was applied to the simplification of constraints in Weapon-Target Assignment (WTA) model. The original EM algorithm was modified in all steps, including the initialization of the population, the local searching, the calculation of total force vector and movement along the total force, and the WTA problems with integer solution space was settled by the algorithm. Finally, the numerical experiments verified the effectiveness of the algorithm for solving WTA problems.]]></description>
<pubDate>2012/9/12 11:15:11</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[YANG Xiaoling,QIU Dishan,PENG Li and TAN Qun]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>YANG Xiaoling,QIU Dishan,PENG Li and TAN Qun</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201106027]]></guid><cfi:id>93</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Capability Views Model for Weapon System-of-systems]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201106030]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Poor reusability, semantic inconsistency and difficult implementation really exist in weapon system of systems capability (WSoSC) modeling due to capability concept and complicated relationships. To solve this problem, an ontology-based capability views construction method and six capability meta-models were proposed. The first step is to determine capability domain problems and specify core ontology of WSoSC domain and its building guidance. Next is to describe ontology in formal way and construct their relationships. The final step is to develop meta-model and create views production using relative tools. Armored equipment system-of-systems capability views were built as an illustration based on previous approach.]]></description>
<pubDate>2012/9/12 11:15:11</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[CHENG Ben<sup>1</sup>,LU Yanjing<sup>1</sup>,GE Bingfeng<sup>1</sup> and TAN Xu<sup>2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CHENG Ben<sup>1</sup>,LU Yanjing<sup>1</sup>,GE Bingfeng<sup>1</sup> and TAN Xu<sup>2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201106030]]></guid><cfi:id>92</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A Hybrid NSGA-II Algorithm Combined with Taguchi Method]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201106031]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Some effective modifications upon NSGA-II were proposed to further improve its optimization ability, which results in a hybrid multi-objective optimization algorithm. In the hybrid algorithm, Taguchi-method was incorporated into the crossover and mutation options of NSGA-II, whose effectiveness was approved by experiments on typical test functions, and the hybrid algorithm can be easily implemented since it makes no change on the framework of NSGA-II.]]></description>
<pubDate>2012/9/12 11:15:11</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[Qiao Shidong,LIU Zhong,HUANG Jincai and ZHANG Weiming]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>Qiao Shidong,LIU Zhong,HUANG Jincai and ZHANG Weiming</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201106031]]></guid><cfi:id>91</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Stochastic Timed Influence Net Based Joint Fire Strike Plan Assessment]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201105019]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Assessment of the joint strike plan is a pivotal task for planning and decision-making, and it plays a crucial role in selection and employment of operational art. The challenge is how to model the mapping from plans to mission effectively in uncertain situation. Simulation system is inefficient in evaluating plans, while analytic models are unable to reflect the interaction and overall effect of the target system. The probability reasoning models have currently been utilized extensively in the assessment of military operation, and the typical model is Timed Influence Net (TIN). Stochastic Timed Influence Net (STIN) is an extensional version of TIN that has enhanced the description of uncertain delay in TIN. Thus, the method of STIN based joint strike plan assessment was provided. Finally, a numerical experiment was presented to demonstrate the effectiveness of above method.]]></description>
<pubDate>2012/8/28 11:51:54</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHU Yanguang,ZHU Yifan,LEI Yonglin and CAO Xingping]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHU Yanguang,ZHU Yifan,LEI Yonglin and CAO Xingping</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201105019]]></guid><cfi:id>90</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Aggregation Analysis of Surveillance Trajectory  Based on Motion Similarity]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201105020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[For surveillance trajectory, a potential semantic content discovering method based on motion features was investigated. In the phase of feature estimation, precise and smooth multi-modal distribution of direction was obtained by combining inflection points of trajectory curve with the kernel density estimation. Then sequential and concurrent temporal patterns of trajectory sub-class were modeled by Hidden Markov Model. With motion feature distribution, a hierarchical trajectory aggregation model based on motion similarity was proposed. Experimental results show that the model can be used to discover potential structure of trajectory set which reflect the motion region information of surveillance scene.]]></description>
<pubDate>2012/8/28 11:51:54</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LIANG Haozhe,HUANG Kuihua,LI Guohui and Zhang Jun]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LIANG Haozhe,HUANG Kuihua,LI Guohui and Zhang Jun</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201105020]]></guid><cfi:id>89</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A Description Method on Classification of Equipment Information Based on Knowledge Factor Expression Theory]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201105028]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The formalistic description about classification of information is an important and difficult point in information integration currently. The factor expression theory based on knowledge can describe the relationship between concepts, and also can describe the concept’s semantics through this relationship. This method has uniform frame of knowledge description and strict mathematical theory foundation. This research puts forward the architecture model of equipment total system and life cycle information, and the knowledge expression theory based on factor describes the classification of equipment information. With the basic information of equipment, it also proves that the method is valid in the equipment information integration. Therefore, it can provide theory support for resolving the semantically heterogeneous problem in the information integration of equipment field.]]></description>
<pubDate>2012/8/28 11:51:55</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[WANG Panqing<sup>1,2</sup> and LI Xiaohui<sup>2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Panqing<sup>1,2</sup> and LI Xiaohui<sup>2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201105028]]></guid><cfi:id>88</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A Behavior Restriction Based Description and FilteringMethod for Military Information Services]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201104030]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Traditional service description model cannot completely and normally describe military information services' non-functional restrictions, such as service using right, service using scope and so on. Aimed at this problem, a behavior restriction based description method that extends the common web service description model was proposed to support the description of the functionality, behavior restrictions and QoS attributes of military information services. By adopting level based matching idea, a behavior restriction based filter method was provided. The method imported similar degree and matching arithmetic to compute the similarity of restrictions quantificationally to improve the precision and efficiency of service discovery. Case analysis and simulation results testify the feasibility and effectiveness of the method.]]></description>
<pubDate>2012/8/28 10:29:48</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[YU Xiaohao<sup>1,2</sup>,LUO Xueshan<sup>1</sup>,HU Dan<sup>2</sup> and LV Xiang<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>YU Xiaohao<sup>1,2</sup>,LUO Xueshan<sup>1</sup>,HU Dan<sup>2</sup> and LV Xiang<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201104030]]></guid><cfi:id>87</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[ANP Power Index Evaluation Method for OperationalCapability of Submarine Equipment Based on Simulation]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201104032]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to cope with the interdependence and interrelationship between evaluation criteria in conventional power index model, and to eliminate the subjectivity of expert's preference in the evaluation process, this study proposes a framework to create a novel Analytic Network Process (ANP) power index model for operational capability evaluation of submarine equipments based on simulation experiment. Then, by taking an     anti-ship operations scenario of submarine as example, the method to design and optimize of networked evaluation index system, the approach to construct ANP Supermatrix based on expert's knowledge and simulation, and the approach to construct power index model based on criteria weights, were presented in detail. Through comparing and analyzing the results of ANP power index model and the results of AHP power index model       for operational capability of submarine anti-ship, the feasibility and effectiveness of proposed framework was verified.]]></description>
<pubDate>2012/8/28 10:29:48</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[SHI Fuli<sup>1</sup>,FANG Zhigang<sup>2</sup>,YANG Feng<sup>1</sup>,XU Yongping<sup>1</sup> and WU Guodong<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>SHI Fuli<sup>1</sup>,FANG Zhigang<sup>2</sup>,YANG Feng<sup>1</sup>,XU Yongping<sup>1</sup> and WU Guodong<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201104032]]></guid><cfi:id>86</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Formalized Description of Service View and EvolutionWithin C<sup>4</sup>ISR Architecture]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201103026]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to describe the dynamic integration of C<sup>4</sup>ISR system resource and implement decoupling between operational process and military system resource, a service view within C<sup>4</sup>ISR architecture framework based on the research on DoDAF2.0, NATOAFv3.0 and MoDAF1.2 is proposed. Through the formalized description of service view products, this study firstly analyzes the logical relationship between the products within service view. Especially it emphasizes on the formalized description of service interaction process based on OWL-S speciation to adapt to the change of operational process. Furthermore, this paper transforms the evolution description of service interaction process to the change operation of process's ontology description and analyzes the evolution description through the basic and composite change operation finally.]]></description>
<pubDate>2012/9/13 9:40:52</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[WANG Lei,LUO Xueshan and SHU Zhen]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Lei,LUO Xueshan and SHU Zhen</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201103026]]></guid><cfi:id>85</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Weapon Equipment System-of-Systems CapabilityPlanning Based on Multi-objective Optimization Model]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201103027]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Weapon equipment system-of-systems(WESoS) capability planning is an important part of the WESoS research area. Taking the time span and cost of capability planning as the optimization objectives, the multi-objective optimization model of WESoS capability planning is proposed. At the base of WESoS capability spaces description, the method of modeling WESoS capability planning is presented. Genetic algorithm is employed to solve the optimization problem. Then the quantitative method of capability gap analysis is presented as well. The proposed approach provides groundwork in certain degree for quantitative analysis of WESoS capability. Finally, a numerical example is given to illustrate the reasonability of the proposed approach.]]></description>
<pubDate>2012/9/13 9:40:52</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[XIONG Jian,ZHAO Qingsong,GE Bingfeng and CHEN Yingwu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>XIONG Jian,ZHAO Qingsong,GE Bingfeng and CHEN Yingwu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201103027]]></guid><cfi:id>84</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Crowd Psychology Simulation Incorporating Psychometrics andIntervention of Relationship Spaces]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201103029]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Computer simulation is a promising approach to better understand the crowd psychological dynamics. The lack of real data in crowd simulations, however, usually results in heavy dependence on assumptions, and thus hampers the confidence. This research presents the simulation of crowds under confrontation of psychological stimuli, which focuses on the psychological aspect of the crowd and introduces the intervention between two different relationship spaces in the crowd. Firstly, with the agent-based approach, psychometrics is employed in the construction of the individual model to improve the trustworthiness. Secondly,  the research describe, by means of the model, the phenomenon that individuals tend to get involved in various relationship spaces, which plays an important role in the procedure of psychological propagation. Finally, a scenario of a crowd in large-scale public activity under terrorist threat is studied, in which the workflow for psychometrics based crowd simulation is demonstrated, and the preliminary results are also discussed.]]></description>
<pubDate>2012/9/13 9:40:52</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LIAO Dongsheng<sup>1</sup>,HOU Bonan<sup>2</sup>,WANG Bing<sup>2</sup>,GUO Qin<sup>1</sup> and GUO Jing<sup>3</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LIAO Dongsheng<sup>1</sup>,HOU Bonan<sup>2</sup>,WANG Bing<sup>2</sup>,GUO Qin<sup>1</sup> and GUO Jing<sup>3</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201103029]]></guid><cfi:id>83</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A Model of Earth Observing Satellite Application Task Describing]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201102020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Modeling of earth observing satellite (EOS) application task is an important part in EOS mission planning and scheduling. From the perspective of the system components, characters of application tasks of EOS and modeling factors, a detailed analysis of EOS application task was accomplished. Among them, task periodicity, strict time limits, entity property complexity and suddenness of mission were investigated in characters of EOS application task. The constraints of task and actions were taken for the main modeling factors and applied to model EOS application task by plan domain define language (PDDL). Finally, through designing a case that EOSs take images from point target, the modeling method presented is illuminated and validated.]]></description>
<pubDate>2012/8/28 10:30:14</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[MA Manhao,ZHU Jianghan,FAN Zhiliang and LUO Xueshan]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>MA Manhao,ZHU Jianghan,FAN Zhiliang and LUO Xueshan</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201102020]]></guid><cfi:id>82</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A Load Balancing Method for Matching ReconnaissanceTasks and Satellite Resources]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201102021]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In current space-based reconnaissance task pretreatment process, resource allocation generally lies on task requirements, which may lead to load imbalance. In light of this, a matching method that considers both task requirements and resource load was presented. For the sake of load balancing, the key task elements and their description method were analyzed. Based on the task flow model, formula and algorithm for calculating the probability of the executed task were available, then the execution probability were used to measure the load status of satellite resources. Finally, the research put forward a load balancing model and a corresponding heuristic algorithm for matching reconnaissance tasks and satellite resources, which takes into consideration the workload, priority, quality of tasks and execution probability. Simulation results show that the proposed load balancing method can effectively improve the utilization of satellite resources and reconnaissance benefit.]]></description>
<pubDate>2012/8/28 10:30:14</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[TAN Qun<sup>1</sup>,PENG Li<sup>1</sup>,LI Zhimeng<sup>1</sup> and QI Wei<sup>2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>TAN Qun<sup>1</sup>,PENG Li<sup>1</sup>,LI Zhimeng<sup>1</sup> and QI Wei<sup>2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201102021]]></guid><cfi:id>81</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Study on Simulation Model Description for C<sup>4</sup>ISR Systems Development]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201102022]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Simulation models of C<sup>4</sup>ISR possess the properties of multi-granularity in development and relating to many application domains. During the phase of development, those simulation models may have pertinent relationship. The current research proposed simulation model system for C<sup>4</sup>ISR systems development, which provided simulation model with standardization description. First, simulation concept model wasestablished, which consists of simulation entity, organization structure, interface junction, information interaction, function, activity and dynamic behavior for simulation entity to reflect C4ISR systems characteristic abstractly. Simulation component model was designed with hiberarchy idea, which is composed of atomic component model and complex component model. Each component model consists of component description and component implement, whose component description adopts formatting form to describe component model roundly. Finally, component model was encapsulated in Web Services and published as simulation model service which is described in formalization. Through simulation model system and model specification description, simulation models of each development phase can be associated organically, which promotes model reuse and interoperability,and improves system development simulation efficiency.]]></description>
<pubDate>2012/8/28 10:30:13</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[BAI Xiaoli<sup>1,2</sup>,YI Xianqing<sup>2</sup>,LUO Xueshan<sup>2</sup> and BAI Xiaohui<sup>3</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>BAI Xiaoli<sup>1,2</sup>,YI Xianqing<sup>2</sup>,LUO Xueshan<sup>2</sup> and BAI Xiaohui<sup>3</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201102022]]></guid><cfi:id>80</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[C2 Organization Decision-layer Structure Dynamic AdaptiveOptimization Based on Rolling Horizon Procedure]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201101026]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Aiming at the adaptive optimization problem of command and control (C2) organization decision-layer structure, the mission adaptability measure of decision-layer structure was defined, uncertainty factors that affect C2 organization decision-layer structure were analyzed and the decision-layer structure adaptive optimization model was constructed. In order to reduce the solution uncertainty of the adaptive optimization problem and the change cost of decision-layer structure, a dynamic adaptive optimization approach based on the rolling horizon procedure (RHP) was designed. It is found that it improved the performance of decision-layer structure, and also controlled the change cost of decision-layer structure. The efficiency of RHP is confirmed by the computational experiments.]]></description>
<pubDate>2012/8/29 10:50:39</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[MU Liang,ZHANG Weiming,XIU Baoxin and HUANG Jincai]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>MU Liang,ZHANG Weiming,XIU Baoxin and HUANG Jincai</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201101026]]></guid><cfi:id>79</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Military antagonism decision approach based high-level 
hypergame under the uncertainty of strategy]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201206024]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The main problem of military antagonism decision is its difficulty to confirm the strategy set of adversary. This research analyzes the military decision under the uncertainty of strategy set based on hypergame. The decision approach of high-level hypergame was proposed after analysis the belief relationship of each level. The result of high level was put back to low-level to refine the decision based on the analysis of the possible decision of adversary. Consequently, this makes decision of friendly forces more pertinent and reasonable against to adversary. Finally an example is used to illustrate the approach.]]></description>
<pubDate>2013/1/11 4:19:31</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[DU Zhengjun,CHEN Chao and WANG Changchun]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>DU Zhengjun,CHEN Chao and WANG Changchun</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201206024]]></guid><cfi:id>78</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Action planning for agile earth-observing satellite
mission planning problem]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201206025]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The mission of Earth observing satellite (EOS) is to acquire photographs of specified areas on Earth surface at the requests of users. The goal is to select a feasible task sequence to maximize the sum of weights. This research presents the mission planning problem of the next-generation agile Earth-observing satellite(AEOS). The complex user requests(including multi-strip area, real time download request, and stereoscopic request) and complex satellite constraints were considered, covering eight satellite actions(including observe action, data download, SSR Erase action, attitude movement, heliocentric pointing, geocentric pointing, and instrument action). A chronological look ahead algorithm was designed to solve the problem, heuristic rules based on expert knowledge were used to make choices and arrange satellite actions, which satisfy all satellite physical constraints and operational constraints. For the current experiment instances and applications, the algorithm can give results in very short time. Experiment results suggest that our algorithm works well for the agile earth-observing satellite planning problem.]]></description>
<pubDate>2013/1/11 4:19:31</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[SUN Kai,BAI Guoqing,CHEN Yingwu,HE Renjie and XING Lining]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>SUN Kai,BAI Guoqing,CHEN Yingwu,HE Renjie and XING Lining</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201206025]]></guid><cfi:id>77</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Risk analysis method of large-scale space development project based on multi-agent technology]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201206026]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Large-scale space development project (LSDP) is a kind of project which possesses some special characteristics and is significant for the social economy development and national security. Risk analysis is an important guarantee to accomplish these projects designed with high quality and low cost. According to the characters, management process and risk factors of the LSDP, using the theory and technology of Multi-Agent and Disturb Project Management, a new risk analysis method of LSDP based on Multi-Agent technology is proposed. It is applied to a large-scale space development project. The risk level of the project is evaluated and the key risk factors are identified. These results can provide decision information for the project risk control and management.]]></description>
<pubDate>2013/1/11 4:19:31</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LI Jiang and LEI Xiaogang]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LI Jiang and LEI Xiaogang</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201206026]]></guid><cfi:id>76</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Modeling and solution method of course of action based on influence net and multi-stage games with incomplete information]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201203013]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The development of Course of Action(COA) is a key step of military planning. In most existing literature on COA development, the previous studies only take unilateral actions of friendly force into account. Considering the antagonism of war, we propose models that contain actions of both friendly and enemy force based on multi-stage games with incomplete information. Influence net is used to analyze the uncertain relationships between actions and battlefield situation. In the end, numerical examples are presented to illustrate the models and solution, showing that the COA developed in the current study is suitable for the antagonistic situation.]]></description>
<pubDate>2012/8/28 10:28:45</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[DU Zhengjun,CHEN Chao and JIANG Xin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>DU Zhengjun,CHEN Chao and JIANG Xin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201203013]]></guid><cfi:id>75</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A spares allocation model for repairable systems consideringcorrelated spare demands]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201203014]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[For a repairable system consisting of multiple equipments of the same type, spare demand and its supply plan will affect the number of workable equipments, and hence exerts effects on the demand of other spares for the equipment. Therefore, the assumption that the spare demands are mutually independent and have no relation with the spare supply plan of the system is not correct. This study considers the correlated demands as well as the effects of the spare supply plan on the spare demand, and describes the spare demand law by the Markov process. Availability calculus methods are presented according to the two cases of cannibalization and non-cannibalization respectively. Based on the methods, a spare optimal allocation model is constructed by setting spare allocation cost as the optimization target and system availability as the constraints. The model is solved by marginal analysis. Finally, a case study is presented to illustrate the validity of the proposed model.]]></description>
<pubDate>2012/8/28 10:28:45</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHOU Wei,JIANG Ping,LIU Yajie and GUO Bo]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHOU Wei,JIANG Ping,LIU Yajie and GUO Bo</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201203014]]></guid><cfi:id>74</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Modeling and analysis of the experts thought convergence in war design engineering]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201203015]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Expert’s opinion consensus is one of key problems in the War Design Engineering. Firstly, the characteristics of experts thought, such as adaptive, cluster and non-linear, are analyzed from the view of complex theory. According to their interactive relationship, experts are divided in to two categories, and the convergence process is modeled by Markov transmission matrix. Then, the necessary and sufficient conditions of reaching consensus for each category experts are presented and proved. It ends with the conclusion that the condition of experts thought convergence is not only relative to interactive relationship matrix, but also the primal opinion of expert. Finally, some propositions are verified by computer simulation.]]></description>
<pubDate>2012/8/28 10:28:45</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[WANG Changchun,CHEN Junliang and CHEN Chao]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Changchun,CHEN Junliang and CHEN Chao</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201203015]]></guid><cfi:id>73</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[The optimization of capacitor maintenance strategy based on semi-Markov decision process]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201201017]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[For the characteristics of capacitor’s stochastic deterioration, the research studied the scheme design and strategy optimization problem of its preventive maintenance based on semi-Markov process. Taking the inspecting time as optimization variable and considering the threshold of preventive maintenance times, the research built the long-run expense rate optimizing model of the capacitor based on the Gaussian-Poisson process model of its stochastic deterioration. The analysis shows that for the capacitors preventive maintenance is superior to posterior replacement in the saving of long-run expense rate.]]></description>
<pubDate>2012/8/27 9:46:18</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[JIN Guang,XIAO Lei and LI Haitao]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>JIN Guang,XIAO Lei and LI Haitao</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201201017]]></guid><cfi:id>72</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Meta-model based modeling of military information system architecture]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201201018]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to enhance the understanding, comparison and integration of architecture developed under different architecture frameworks and tools, and to promote the sharing and reuse of architecture data, a new method, named meta-model based methodology of architecture modeling, was proposed. Based on the idea of model driven architecture (MDA), this method presented a transformation approach from architecture meta-model to modeling languages with the extensible markup language (XML) format. On the other hand, the modeling method under the meta-model specification was proposed and three mapping specifications mentioned in the method were designed. To verify its feasibility, the IDEF3-based modeling methods of operation rule model was designed, and the main rule-named modeling primitives and patterns based transformation was analyzed.]]></description>
<pubDate>2012/8/27 9:46:18</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[XIE Wencai,LUO Xueshan and LUO Aimin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>XIE Wencai,LUO Xueshan and LUO Aimin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201201018]]></guid><cfi:id>71</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Using improvement generalized pattern search to optimizedesign multi-satellites’ cooperated observation]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201201019]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Multi-satellites’ cooperated observation is an effective way to maximize satellite system performance. How to deploy these satellites is an optimization problem, which involves a huge design space and many design parameters. For this problem, an improved generalized pattern search algorithm, which is based on Kriging model, was put forward. For the search step, two point selection mechanisms were constructed. One is to choose the point with maximal predict value about the surrogate and the other is to choose point with maximal expect improvement. For the poll step, the surrogate was used to predict the expected improvement of the points in the poll set and rank them accordingly. It can reduce the unnecessary simulation analysis. Finally, the proposed algorithm was applied to deploy multi satellites for a given scenario. Compared with the results obtained by STK-Analyzer, the proposed algorithm operated better in performance. The results prove the feasibility and effectiveness of the algorithm.]]></description>
<pubDate>2012/8/27 9:46:18</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[CHEN Yingguo,LIU Xiaolu,CHEN Yingwu and HE Renjie]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CHEN Yingguo,LIU Xiaolu,CHEN Yingwu and HE Renjie</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201201019]]></guid><cfi:id>70</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Performance evaluation of ordnance maintenance equipment supply chain based on evidence theory during wartime]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201201020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Based on the common index system of performance evaluation of supply chain and the characteristics of modern warfare ordnance maintenance equipment supply chain, the current study established the index system of performance evaluation of ordnance maintenance equipment supply chain during wartime from source, output and flexibility. Considering the information is fuzzy and uncertain under the environment of war, the evidence theory model was established to evaluate the performance of ordnance maintenance equipment supply chain. Finally, a wartime ordnance maintenance equipment supply chain was explored as a case study, using the index system and the evaluation model which was established earlier to study its performance. The result shows that the performance evaluation model of ordnance maintenance equipment supply chain during wartime is feasible and effective.]]></description>
<pubDate>2012/8/27 9:46:18</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZUO Zhenyu,JIANG Hongli and YE Chunhua]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZUO Zhenyu,JIANG Hongli and YE Chunhua</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201201020]]></guid><cfi:id>69</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[An enforceability probability estimation model for
satellite observing tasks]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201306031]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The enforceability probability of satellite observation requires timely and accurate estimation to provide the fundamental basis for satellite task planning and scheduling. An estimation model of the enforceability probability of satellite earth observation is established based on the Logistic regression method. Firstly, the influence factors of observation enforceability probability were analyzed, including the property of observation task, resources limitation, competitive relations among tasks, etc. Secondly, independent variables were extracted and their quantitative methods were given, then the Logistic regression model was established. Thirdly, experiments were implemented on the planning and scheduling system of satellite imaging observation to obtain the sample data of independent variables and planning results. Moreover, the sample data was analyzed by using the Logistic regression method, and then the variables and parameters of the model and the function forms were all determined, Lastly, the effectiveness of the model was validated.]]></description>
<pubDate>2014/1/8 17:09:36</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LI Zhimeng<sup>1</sup>,TAN Qun<sup>2</sup>,LIU Gang<sup>1</sup> and GUO Shaoyang<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LI Zhimeng<sup>1</sup>,TAN Qun<sup>2</sup>,LIU Gang<sup>1</sup> and GUO Shaoyang<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201306031]]></guid><cfi:id>68</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[The transmission characteristics  of radio wave 
in the plasma based on finite difference time domain]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201306032]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[According to the basic principles of the finite difference time domain (FDTD) method, firstly the physical field characteristics and the numerical calculation of the plasma were analyzed; and then the reentry plasma sheath formed and plasma relative dielectric constant of the wave attenuation were introduced; lastly the propagation of electromagnetic waves in the plasma with three-dimensional FDTD method and two-dimensional FDTD method were simulated. Simulation results proved that the FDTD method is an effective method to solve the electromagnetic wave propagation in the complex medium.]]></description>
<pubDate>2014/1/8 17:09:36</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[GUO Tong,PENG Jian and XIAO Weidong]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>GUO Tong,PENG Jian and XIAO Weidong</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201306032]]></guid><cfi:id>67</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Mission reliability analysis of space TT&C system using 
extended object-oriented Petri net model]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201305007]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A methodology is proposed to evaluate the mission reliability of TT&C scenarios by modeling and analyzing space tracking, telemetry and command (TT&C) system using extended object-oriented Petri nets (EOOPN). The formal definition, operational rules and the modeling approach were given. It can embody the object-oriented idea by introducing the concepts of public place, message arc and message handle function into the model, and it has good hierarchical structure and modularity. The EOOPN model can completely describe the TT&C system composite and mission process and reflect the dynamic stochastic factors in system operation. After simulating the EOOPN model, the case study reveals that the simulation results have a good convergence, and the errors are controlled within one percent compared with the analytical result of Markov models, proving the effectiveness of the model.]]></description>
<pubDate>2013/11/6 15:57:50</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[YANG Xiaosong and WU Xiaoyue]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>YANG Xiaosong and WU Xiaoyue</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201305007]]></guid><cfi:id>66</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Maintenance optimization under non-periodic imperfect inspections]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201304031]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[This paper develops a non-periodic inspection maintenance model for a gamma deteriorating single-unit system based on regenerative and semi- regenerative process theory. Minimizing the expected average cost per unit time is chosen as the optimization goal. The model uses an inspection scheduling function to arrange the inspection scheme based on the system state. Considering measurement errors make the model more realistic. The preventive maintenance threshold and the inspection scheme are obtained after the optimization. A numerical example is given in the last and proves the effectiveness of the model by the sensitivity analysis of degradation rate and cost parameters. By the comparison with the optimal results without considering measurement errors, it proves that measurement error is not a trivial thing for the maintenance optimization. ]]></description>
<pubDate>2013/8/22 16:54:29</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[GUO Chiming<sup>1</sup>,GUO Bo<sup>1</sup>,WANG Wenbin<sup>2</sup> and PENG Rui<sup>2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>GUO Chiming<sup>1</sup>,GUO Bo<sup>1</sup>,WANG Wenbin<sup>2</sup> and PENG Rui<sup>2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201304031]]></guid><cfi:id>65</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Scheduling multi-platforms collaborative observation based 
on cooperative evolution]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201304032]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Based on the analysis of the features and differences between satellite and UAV in earth observation and scheduling, a mathematical model was presented to formulate the scheduling problem for the multi-platforms collaborative observation, and a multi-platforms cooperative evolutionary planning and scheduling algorithm (MPCCPSA) was proposed to solve this problem. MPCCPSA uses co-evolution framework for solving the different platforms' observing plans generated in a unified manner. Based on the divide-cooperation strategy and different characteristics of platforms, the observed targets were allocated to each platform. On the top-level, crossover and mutation operations ensured the diversity of the various groups, and the underlying divide-cooperation operators ensured the dynamic complementarity between different platforms. Simulation results show that this method can effectively solve the multi space aeronautics collaborative observation tasks scheduling problem.]]></description>
<pubDate>2013/8/22 16:54:29</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[BAI Guoqing,XING Lining,HE Renjie and CHEN Yingwu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>BAI Guoqing,XING Lining,HE Renjie and CHEN Yingwu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201304032]]></guid><cfi:id>64</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Clustering cadet recruiting plans based on labeled trees]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201303005]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Cadets recruiting plan is an essential measurement to prescribe source and quantity of officers, which is significant for the construction and development of officer. With the accumulation of recruiting plans, it is meaningful to make analysis and evaluation of them. By utilizing the clustering technique, this research analyzed recruiting plans in the past years, and provided a quantitative approach to look into the fluctuation of plans and to understand and evaluate closeness of plans with policies. Firstly, the paper summarized characteristics of recruiting plans. Secondly, it proposed a solution which utilized labeled tree to represent recruiting plan and extracted representative subtrees to participate in clustering. Finally, it used co-occurrence idea of "forming clustering cores first, classifying the plans then" to finish the clustering process. Experimental results reveal that the method can provide better clustering results and is efficient.]]></description>
<pubDate>2013/7/4 10:40:10</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[QIAN Gaoxiang<sup>1,2</sup>,ZHANG Chong<sup>1</sup> and ZHANG Weiming<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>QIAN Gaoxiang<sup>1,2</sup>,ZHANG Chong<sup>1</sup> and ZHANG Weiming<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201303005]]></guid><cfi:id>63</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Method for modeling and solving military mission planning with
uncertain resource availability]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201303006]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[According to the ubiquitous uncertainty of resource availability, a multi-objective military mission planning model with uncertain resource availability is proposed based on reasonable hypotheses. A proactive schedule method based on resource buffer was designed according to the special features and particularity of the model. In the method, the resource buffer was added into the project during the task-platform allocation in order to minimize the disadvantage of resource uncertainty; the multi-objective evolutionary algorithm NSGA-Ⅱ was adopted to calculate the Pareto Front of the problem. Finally, an example was illustrated to show the feasibility and practicability of the proposed model and method.]]></description>
<pubDate>2013/7/4 10:40:10</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Yingxin,CHEN Chao,LIU Zhong and SHI Jianmai]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Yingxin,CHEN Chao,LIU Zhong and SHI Jianmai</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201303006]]></guid><cfi:id>62</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[An integrated decision making and optimization framework for system of 
armament systems portfolio planning]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201303007]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Aiming at the complexities such as huge solution space and many decision-making objectives in the system of armament systems portfolio planning, an integrated decision making and optimization framework is proposed to select the models from the candidate armament systems, and to plan the development time and production quantity of the selected armament systems. By quantitatively describing and formulating the system of armament systems portfolio planning, and focusing on the NP-hard and the large-dimensional multi-objective nature firstly; a dual-objective optimization model was proposed through adopting the goal programming method; an intelligent optimization approach was developed based on the NSGA-II evolutionary computation method, in order to obtain the Pareto solutions set thirdly; the TOPSIS method was applied to acquire the compromise solution finally. A portfolio planning example on a system of intelligence, surveillance, and reconnaissance systems validated the effectiveness of the framework. When given empirical data and decision-makers preferences, the framework can get the satisfactory portfolio plan, which supports the demonstration and development for the system of armament systems.]]></description>
<pubDate>2013/7/4 10:40:11</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHOU Yu,YANG Kewei,JIANG Jiang and TAN Yuejin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHOU Yu,YANG Kewei,JIANG Jiang and TAN Yuejin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201303007]]></guid><cfi:id>61</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Operational network combat model based on control loop]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201303008]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Means of warfare and using of the military force are always changing as technology changes. Learning from the idea of NCW, it explored the formation mechanism of the operation network, and analyzed the combat behavior of micro and macro mechanisms. Aiming at the feature of obtaining the operational effectiveness through the information superiority，it proposed the conception of the control loop and the action rhythm in the information age, which reflected the different capability of using information between the combat systems. Thus, it proposed the combat model of operational network, and the performance indicators of measuring the operational network. It designed the experiments to study the engagement process and results of the different network structures, the different attack patterns.]]></description>
<pubDate>2013/7/4 10:40:11</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[BAI Liang,XIAO Yandong,HOU Lvlin and LAO Songyang]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>BAI Liang,XIAO Yandong,HOU Lvlin and LAO Songyang</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201303008]]></guid><cfi:id>60</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Method of creating architecture executable model based on DM2]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201302006]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Architecture design and development based on Meta-Model and architecture evaluation method based on executable model are two hot topics in architecture domain study, but there is no study combining these two topics. Based on the conception of Meta-Model Data (DM2) which puts forward DoDAF 2.0, the research combined the idea of DM2 and the evaluation method based on the executable model, analyzed the relationship between the logical data based on DM2 and the executable model, designed the progress of supporting data using DM2 Foundations change directly into executable model, especially focused on  the method of changing the architecture data into executing model. The study provides the basis for architecture executable evaluation, and helps to take further study on architecture automatic validation and evaluation. Finally, the 
case study demonstrates the method proposed in this paper. ]]></description>
<pubDate>2013/5/21 9:27:54</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Xiaoxue,LUO Aimin,HUANG Li and LUO Xueshan]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Xiaoxue,LUO Aimin,HUANG Li and LUO Xueshan</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201302006]]></guid><cfi:id>59</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Uplink task scheduling model and two-phase heuristic algorithm of navigation satellites]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201302007]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Scheduling the contact between the navigation satellites and ground unlink stations and navigation data uplink process is of important significance to keep the accuracy of the navigation data on board. After analyzing the navigation data uplink process of the satellite navigation system, a multi-objective mix-integer model was devised, considering the technological constraints in uplink process. Because of the complexity of the model, a two-phase heuristic algorithm based on rules is devised. A set of test scenarios were devised consulting the COMPASS of China, the GPS Satellite Navigation Systems. The mathematical model and algorithm  proved effectively for the uplink task schedule process. Several factors that influence the completion of the uplink tasks were obtained by analyzing the computational results. ]]></description>
<pubDate>2013/5/21 9:27:54</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LONG Yunjun,CHEN Yingwu,XING Lining and ZHANG Zhongshan]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LONG Yunjun,CHEN Yingwu,XING Lining and ZHANG Zhongshan</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201302007]]></guid><cfi:id>58</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Planning and scheduling for the air defense of warship]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201302008]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In light of the time-continuity of warships’air defense process and the uncertainty effect of intercepting operation a novel generating method of intelligent planning and scheduling for the air defense of warships is proposed. When a new anti-ship target is detected, the air defense system of the warship will search the constraint satisfaction plan with the highest intercepting probability immediately. Then, when one intercepting operation fails, the secondary intercepting strategy will be generated timely. The current conventional methods all handle it as the Weapon-Target Assignment (WTA) problem, which cannot model the time-continuous and uncertain process, while the method proposed integrates 
the planning and Scheduling strategies. For each new detected or failed intercepted target, the action-reasoning algorithm of the AI (Artificial Intelligence) planning system is used to search the possible candidate intercepting plans. Then, the optimal scheduling algorithm checks the temporal and resource conflicts among the actions of each candidate plans, and returns the constraint satisfaction strategy with the 
highest intercepting probability. Planning and scheduling process takes the weapons coordination, the time-continuity and uncertainty of the intercepting operation, and the optimal intercepting time selection into account. Compared with the discrete-time based algorithm used for WTA, the Planning-Scheduling model is more appropriate to describe the air defense process. The property of the algorithm is verified by the Monte Carlo simulation experiment, which shows the method proposed provides a new approach to handle the automatic air defense problem of the warship. ]]></description>
<pubDate>2013/5/21 9:27:54</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LUO Jiangfeng,ZHU Cheng,CUI Jing,LIU Zhong and ZHANG Weiming]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LUO Jiangfeng,ZHU Cheng,CUI Jing,LIU Zhong and ZHANG Weiming</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201302008]]></guid><cfi:id>57</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Scheduler reliability model of spacecraft launch based on BER and CTMC]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201302009]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In spacecraft launch engineering, it is very difficult to quantify reliability of implementation process. In terms of the peculiarities which the reliability of implementation process presents, such as many sub-processes having concurrency and every sub-process having the Markovian property and homogeneity. this research presents a model of implementation processes reliability with multi-absorbing state by utilizing the model of continuous-time Markov chain (CTMC), which simplifies the state space of the implementation processes reliability through the use of bisimulation equivalence relation. Moreover, the calculation method for various state transition rates and implementation process reliability is also presented. Finally，the simulation case by engineering data verifies the role and significance of the model in the assessment schedule of spacecraft launch engineering.]]></description>
<pubDate>2013/5/21 9:27:54</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[DONG Xuejun<sup>1,2</sup>,BAI Guoqing<sup>1</sup> and CHEN Yingwu<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>DONG Xuejun<sup>1,2</sup>,BAI Guoqing<sup>1</sup> and CHEN Yingwu<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201302009]]></guid><cfi:id>56</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Opinion dynamic evolution: a comparison of group experts 
rounds’ discussions with free ones]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201302010]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The opinion evolution results of both dynamic models of group experts round discussion and free discussion in collective discussion are analyzed and compared by computer simulation. Statistical results show that under the same initial conditions, the model of free discussion using the speech sequence rule of authoritative experts first and then experts with the maximum of opinion cumulative change first has less average opinion clusters. It also finds that discussions after 15 rounds have less improved impact on indicators. As the free discussion is followed by serial speeches that are less efficient, in the actual selection of the mode of discussion, when there are fewer experts and plenty of time, it should use free discussion, and vice versa it should adopt discussion by round.]]></description>
<pubDate>2013/5/21 9:27:54</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[SU Jiongming,LIU Baohong,LI Qi and MA Hongxu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>SU Jiongming,LIU Baohong,LI Qi and MA Hongxu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201302010]]></guid><cfi:id>55</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Analysis on influential factors to inadequate information using 
evidential reasoning approach]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201301031]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Inadequate information under uncertainty is indispensable to multiattribute analysis, which can be well handled by the Evidential Reasoning Approach. The factors which bring about influence on the belief of the inadequacy in the assessment results were studied, including the belief of the inadequacy in the rules as input, the weights and the consistency of the rules. The domain of the inadequacy in the assessment results was determined and a preliminary result was drawn: the belief of the inadequate information in the assessment result can be less than the bigger one of the belief of inadequate information in the rules as input, but may not be more than the smaller one of the belief of inadequate information in the rules as input. The logical and geometry meaning of consistency of the rules was illustrated. The link between the consistency of the rules and the concept of “degree of conflict” was studied. ]]></description>
<pubDate>2013/3/13 9:54:34</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[CHANG Leilei<sup>1</sup>,LI Mengjun<sup>1</sup> and XIANG Chengan<sup>2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CHANG Leilei<sup>1</sup>,LI Mengjun<sup>1</sup> and XIANG Chengan<sup>2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201301031]]></guid><cfi:id>54</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Impact analysis of satellite reconnaissance information precision on missile hitting maritime floating target]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201301032]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The impact of satellite reconnaissance information precision on hitting probability of missile hitting maritime floating target was investigated，which is significant for improving the operational efficiency of missile. According to the principle of missile hitting maritime floating target, the operational process was depicted, the impact factors of hitting probability were analyzed, and the calculating model of hitting probability based on satellite reconnaissance information precision was established. The impact of satellite reconnaissance information precision on hitting probability was analyzed by Monte-Carlo method. The results prove that if the satellite reconnaissance information precision is in the acceptable range，the impact is able to be ignored；otherwise，the missile hitting probability descends along with the fall of the information precision.]]></description>
<pubDate>2013/3/13 9:54:35</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[WANG Jianjiang,XU Peide,WANG Huilin and LI Zhimeng]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Jianjiang,XU Peide,WANG Huilin and LI Zhimeng</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201301032]]></guid><cfi:id>53</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Resource constraint reasoning methods for spacecraft scheduling]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201406019]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The estimation of resource level’s envelope is a basic problem in constructing a feasible schedule for resource utilization. A new resource reasoning description method that combining resource temporal network, constraint network and temporal network was proposed by analyzing the resource constraint characteristics, such as coexistence of sharing and detaching resource, coexistence of cumulative and instantaneous consumption, coexistence of over-subscription and interval scheduling resource. Considering the specific characteristic of resource temporal network, a resource model was constructed, and two algorithms of the EBA (Envelop Based Algorithm) based on maximal flow and the ESTA<sup>c</sup> (Early Start Time Algorithm with Chaining) based on early start time solution to solve with a resource feasible solution were given. The incremental EBA algorithm and ESTA<sup>c</sup> algorithm were presented to get a feasible solution quickly. Finally, some experiments were presented to prove the validity of the methods. Results show that the efficiency and validity of the proposed methods are better than EBA algorithm and ESTA<sup>c</sup> algorithm in solving the problems of resource constraint reasoning.]]></description>
<pubDate>2015/1/22 16:38:32</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LIAN Zhenyu<sup>1,3</sup>,WANG Yun<sup>2</sup>,CHEN Cheng<sup>3</sup> and TAN Yuejin<sup>3</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LIAN Zhenyu<sup>1,3</sup>,WANG Yun<sup>2</sup>,CHEN Cheng<sup>3</sup> and TAN Yuejin<sup>3</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201406019]]></guid><cfi:id>52</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Goodness-of-fit test for life distributions based on 
parametric Bootstrap]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201406020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Goodness-of-fit test plays an important role in the statistics and reliability fields. Goodness-of-fit test for the common life distribution of unknown parameters was based on the resembling idea of parametric bootstrap. Simulation results show that goodness-of-fit test based on parametric bootstrap is superior to the traditional EDF tests, such as Liefors test, CvM test and AD test, especially in small samples.]]></description>
<pubDate>2015/1/22 16:38:32</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[SUN Quan,ZHOU Xing,FENG Jing and PAN Zhengqiang]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>SUN Quan,ZHOU Xing,FENG Jing and PAN Zhengqiang</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201406020]]></guid><cfi:id>51</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Failure safety risk evaluation approach for complex systems]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201406021]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[As various issues and impacting factors involved in the safety risk of complex systems, systematic and operational approach was desirable to instruct the evaluation process of safety risk for complex systems. Among the safety risks of a system, failure safety risk, the risk of accidents caused by various failures, is the most common system safety problem, so the evaluation of failure safety risk for complex systems was studied. The evaluation requires the support of explicit parameters and proper approach. Therefore, the paper presented the evaluation process of failure safety risk for complex systems, hierarchical evaluation parameters and approach, and examples were applied to demonstrate the evaluation process in detail. Results show that the proposed evaluation approach provides a feasible solution to evaluate the failure safety risk of complex system.]]></description>
<pubDate>2015/1/22 16:38:32</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[JIANG Ping<sup>1</sup>,XING Yunyan<sup>2</sup>,WANG Dong<sup>1</sup> and GONG Shiyu<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>JIANG Ping<sup>1</sup>,XING Yunyan<sup>2</sup>,WANG Dong<sup>1</sup> and GONG Shiyu<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201406021]]></guid><cfi:id>50</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A network modeling and structure optimization approach 
for  technology system of systems]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201406022]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The approach of network modeling and structure optimization for technology system of systems was researched to solve the problems of reusability and redundancy which are key properties of the development and management of weapon technologies. Abstracting weapon technologies as nodes and abstracting technology relationships as sides, the network modeling approaches based on the description property framework of weapon technologies and the analysis of technology relationships were proposed; three typical approaches of the network community detection were applied to cluster the weapon technologies and the optimization method of technology clustering was generated by comparing the evaluation index of this three approaches; at last, the weapon technologies which are the most influential factors to the redundancy of system were identified at the basis of the centrality measure of weighted networks. A case which includes 235 laser weapon technologies was studied to validate the efficiency of the proposed approach and to summarize the structure optimization method of the system.]]></description>
<pubDate>2015/1/22 16:38:32</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[YOU Hanlin,LI Mengjun,JIANG Jiang,LUO Jili and XU Jianguo]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>YOU Hanlin,LI Mengjun,JIANG Jiang,LUO Jili and XU Jianguo</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201406022]]></guid><cfi:id>49</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Multi-Dimensional modeling method of uncertain data stream]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/14040010]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Because of emergence of uncertain data stream applications, the traditional multidimensional model based on precise and static data is in the face of some new challenges. This paper proposes a multidimensional uncertain data stream model based on characters of  uncertain data stream, such as dynamic, infinite, uncertain and so on. This model introduce uncertain object to depict uncertain facts, and define the time dimension with multi-level time windows to reflect the dynamic and infinite of data stream. Finally, we give the basic algebraic operations and analytic algebraic operations of multi-dimensional uncertain data stream, which gives theoretical support for multidimensional query and analysis of uncertain data stream.]]></description>
<pubDate>2015/1/22 15:55:57</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[李 明,张维明,刘青宝]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>李 明,张维明,刘青宝</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/14040010]]></guid><cfi:id>48</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Invulnerability analysis of anti-air communication system]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201405027]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The invulnerability characteristic of communication system is an important element in the study of military combat system. According to the organization structure and countermeasure of anti-air communication system, performance evaluation process algebra(PEPA) was introduced to describe the evolution process of anti-aircraft communication system by the state. PEPA-based invulnerability analysis method of communication system was proposed. A case study was given to testify the organization structure and the capacity against soft destruction or hard destruction of communication system by modeling and simulating. Experimental results show that PEPA is available for anti-aircraft communication systems' modeling and analyzing, which can realize the structural modeling in antagonistic process of anti-air communication system. The different elements of communication system have different influence on the invulnerability. Effective strategies can be taken to enhance the invulnerability of anti-aircraft communication system.]]></description>
<pubDate>2014/11/25 10:16:03</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[CHENG Guangquan,HUANG Jincai,ZHAO Feng and CHEN Saran]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CHENG Guangquan,HUANG Jincai,ZHAO Feng and CHEN Saran</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201405027]]></guid><cfi:id>47</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Multi-dimensional modeling method of uncertain data stream]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201405029]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Because of the emergence of uncertain data stream applications, the traditional multi-dimensional model based on precise and static data is confronted with some new challenges. A multi-dimensional uncertain data stream model based on characters of uncertain data stream was presented, such as dynamic, infinite, uncertainty and so on. This model introduced uncertain object to depict uncertain facts, and defined the time dimension with multi-level time windows to reflect the dynamic and infinity of data stream.The basic algebraic operations and analytic algebraic operations of the multi-dimensional uncertain data stream was defined formally, which gives theoretical support to multidimensional query and analysis of uncertain data stream were provided.]]></description>
<pubDate>2014/11/25 10:16:03</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LI Ming,ZHANG Weiming and LIU Qingbao]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LI Ming,ZHANG Weiming and LIU Qingbao</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201405029]]></guid><cfi:id>46</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A community detect algorithm  on force-directed model]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201404028]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Aimed at the problem of detecting and characterizing community structure is one of the outstanding issues in the study of complex network, a new community detect algorithm based on Force-directed model was proposed, which categorizes the point to community decided by the force between them. An algorithm named Force-Directed Community Detect, FDCD, and an implementing algorithm using four different Force-directed Models were designed. The experiments show that the algorithms can find community in real social network with high Q Modularity, and each efficiency of algorithm based on LL model reaches the complexity degree of linear computation, which proves fit for the community detection in large network.]]></description>
<pubDate>2014/9/4 17:19:45</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[SHUI Chao<sup>1</sup>,CHENG HongHui<sup>1</sup>,CHENG Tao<sup>1</sup> and LI Hui<sup>2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>SHUI Chao<sup>1</sup>,CHENG HongHui<sup>1</sup>,CHENG Tao<sup>1</sup> and LI Hui<sup>2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201404028]]></guid><cfi:id>45</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Temporal reference representation and 
nonmonotonic deduction in planning]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201404030]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A research on the temporal preference in course-of-action planning is presented, focusing on the scheme to implement planning with inconsistent temporal preference. The difficulties and innovations lie in two aspects. Firstly, considering the representation issue, a unified binary format is established for temporal preference and temporal constraints. Secondly, argumentation is utilized to develop a deduction framework in order to sort out the conflicts inside the constraint/preference set, achieving a subset of constraints/preferences with maximum consistence. A plan generation strategy was then proposed to acquire segments of plan via mapping, and to combine the segments into a complete plan. A case study was done in detail to show the effectiveness of the scheme.]]></description>
<pubDate>2014/9/4 17:19:45</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[WANG Yanjuan,HAO Zhiyong and YAO Li]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Yanjuan,HAO Zhiyong and YAO Li</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201404030]]></guid><cfi:id>44</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[JavaKBB: An expert systems tool of integrating frame 
with production rule]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201404031]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[This paper describes JavaKBB, an expert systems tool, is described and the central idea of the project is to make an easy-to-use and easy-to-extend tool for building practical expert systems. It can simultaneously represent conceptual knowledge and procedural knowledge of domain; which can run on commercial operating systems such as Windows along with military domestic operating systems such as NeoKylin. This study presents a knowledge representation model of integrating frame with production rule, which defines five levels of abstraction in order to design an expert system, including knowledge primitives, knowledge units, knowledge elements, knowledge base and knowledge systems. Based on this model, JavaKBB was designed and implemented with Java language. Another important feature of JavaKBB is its capability of saving knowledge bases in XML format, thus making them potentially easy to interoperate with other knowledge bases on the Internet. Currently, JavaKBB has been used to build the Chronic Hepatitis Prophylaxis and Treatment Expert System and the Equipment Decision Support System.]]></description>
<pubDate>2014/9/4 17:19:45</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[CAO Zewen and DAI Chaofan]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CAO Zewen and DAI Chaofan</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201404031]]></guid><cfi:id>43</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[The moving probability model of urban cabs based ]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201403023]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The model of urban cabs moving is one of the key issues for model building. The model needs reflecting moving state information of cabs. More importantly, users can quickly query the moving cabs. Under the condition of real time information of cabs which is hard to obtain, we should model the moving points and forecast the state information according to the moving history. A method which applies Hidden Markov theory to model of the moving trajectory is proposed. Through an analysis of real trajectory data of San Francisco, the caps moving model which is used to query the caps by users was constructed. Experiment with real datasets shows that the method proposed can simulate the moving state of caps. Users can also quickly obtain the useful location information from the model. ]]></description>
<pubDate>2014/7/17 17:22:23</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[MA Wubin,LIU Mingxing,HUANG Hongbin and DENG Su]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>MA Wubin,LIU Mingxing,HUANG Hongbin and DENG Su</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201403023]]></guid><cfi:id>42</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Modeling and analysis of air defense process for warship 
formation]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201403032]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Air defense is a basic operational pattern of large surface warship formation. The PEPA (Performance Evaluation Process Algebra) method was applied to model the whole-process air defense operation of surface warship formation. The main air defense process, such as early warning, information transmission, giving orders and interception, was described formally. The established model which has the hierarchical structure takes into account the cooperation among elements and represents the concurrency and distributed character of the air defense operation. By doing performance index choosing and steady state analysis, it obtains the influences of different factors on the performance of air defense of warship formation. The appropriate composition of the basic formation elements in air defense operation is also obtained. Therefore, it provides a new method to deal with the air defense problem of warship formation.]]></description>
<pubDate>2014/7/17 17:22:24</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[HUANG Jincai,CHEN Saran and CHENG Guangquan]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>HUANG Jincai,CHEN Saran and CHENG Guangquan</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201403032]]></guid><cfi:id>41</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Research on the method of target selecting policy based on 
the Markov decision process]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201402027]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Target selecting is an important aspect of military operational planning. The Markov Decision Process(MDP) method was used to solve the multi-phase target selecting problem which has complex relations among targets. Firstly, the and-or tree was used to describe the relations among the layers of the target system of system(TSoS), and a Discrete Time Markov Decision Process(DTMDP) method was proposed for modeling target selecting whose objective was to neutralize the TSoS. Secondly, an LRTDP algorithm based heuristic was proposed to give the estimate value of the current state of the TSoS, which was calculated by considering the potential resource consumption and failure probability of the evolution process from the current state to the lapse state of the TSoS, and the heuristic can effectively exclude the intermediate states which cannot be transferred to the lapse state, in order to reduce the huge search space of the model because of the complex relations among targets. Finally, a case was proposed to validate the method. The results show that the method is intuitive and practical, and can facilitate the target selecting decision making when there are complex relations among the targets.]]></description>
<pubDate>2014/5/14 17:10:49</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LEI Ting<sup>1,2</sup>, ZHU Cheng<sup>1</sup>, ZHANG Weiming<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LEI Ting<sup>1,2</sup>, ZHU Cheng<sup>1</sup>, ZHANG Weiming<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201402027]]></guid><cfi:id>40</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Data yard based system effectiveness evaluation and 
decision support method]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201401022]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[With the development of information technology, the increase of system information brings new problems to the military system effectiveness evaluation. Aiming at nonlinear, high dimension and strong coupling data of system effectiveness analysis, a data yard based system effectiveness evaluation and decision support method was proposed. Data recovery, subtraction, refinement and reconstruction operations were applied to the simulation data processing, then a data yard cube was built up to meet the multiple demands for system analysis of different levels and data dependency were reduced. Taking task-oriented networked fire control system for example, its system effectiveness evaluation, timeliness evaluation and indices analysis were carried out, and practicability and validity of the method were verified in three levels.Applying data mining technology to the simulation system effectiveness evaluation decision-making,makes it get more extensive application.]]></description>
<pubDate>2014/3/12 14:49:32</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[CHEN Chen<sup>1,2</sup> and WANG Yun<sup>1,2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CHEN Chen<sup>1,2</sup> and WANG Yun<sup>1,2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201401022]]></guid><cfi:id>39</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Configuring and optimizing the operational support equipment of the 
antimissile guided missile based on the improved PSO]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201401031]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[As the process of operational support on the antimissile guided missile is complicated, it is very hard to configure and optimize the operational support equipment. The model of configuring and optimizing the operational support equipment was created in this study, based on the requirement of the mission and the character of use support. The model is a NP-hard problem, so the improved particle swarm optimization (PSO) was adopted to solve the problem. In the algorithm proposed, the way of swarm moved was changed from liner mode to non-liner mode so that the algorithm is more efficient. The shift vector representation was first used to code the solution and a new heuristic algorithm to repair the swarm was designed, which makes it simpler to solve the model. Finally, an instance was given and the comparative experiments were designed. The results show that the method proposed can solve the problem of configuring and optimizing the operational support equipment of the antimissile guided missile. Furthermore, it is valuable to solve the other problem of optimizing the resource.]]></description>
<pubDate>2014/3/12 14:49:33</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[QI Jianjun,GUO Bo,ZHANG Tao and LEI Hongtao]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>QI Jianjun,GUO Bo,ZHANG Tao and LEI Hongtao</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201401031]]></guid><cfi:id>38</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Model and algorithm of automatic planning for agile imaging satellite]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201506019]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Aiming at the problem of automatic planning for agile imaging satellite, the architecture of automatic planning combined with planning, decision making and information feedback was presented. The architecture, components and functions of automatic planning were introduced. The model based on constraint network on timelines was constructed according to the satellite physical constrains and operational constrains. The activity sequences were constructed through connecting various activities. And a heuristic algorithm based on activity sequences was presented. The algorithm was composed of two parts: planning and decision making. The algorithm could plan based on heuristic rules when satellite was performing every activity sequence, and make decision when the activity sequence was completed. Finally, satisfactory results are obtained through experiments, which show that the architecture of automatic planning and the model are reasonable, and the algorithm is efficient.]]></description>
<pubDate>2015/12/31 10:11:21</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LIU Song<sup>1，2</sup> and CHEN Yingwu<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LIU Song<sup>1，2</sup> and CHEN Yingwu<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201506019]]></guid><cfi:id>37</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Schedule of rescue helicopter departure time considering airway intersection]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201506020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Aiming at minimizing the departure time of the last helicopter, a mathematical programming model for multiple helicopters in multiple airports was set up to solve the departure time scheduling problem of multiple helicopters. A heuristic algorithm based on task priority was designed to solve the model, a scheme to deal with the airway intersection was put forward and an algorithm to solve the departure time was also established. Basing on the disaster rescue of the 6.8 magnitude earthquake in Yunnan Ludian, a departure time scheduling case which includes 24 helicopters in 12 airports was designed to validate the model and algorithms. The influence of airway intersection and the treatment measures were deeply discussed. The results demonstrate the efficiency of the model and algorithms in dealing with the scheduling problem of multiple helicopters.]]></description>
<pubDate>2015/12/31 10:11:22</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Jiaming<sup>1</sup>, LIU Zhong<sup>1</sup>, SHI Jianmai<sup>1</sup>, HE Yunyue<sup>1</sup>, WANG Yishan<sup>2</sup> and CHEN Chao<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Jiaming<sup>1</sup>, LIU Zhong<sup>1</sup>, SHI Jianmai<sup>1</sup>, HE Yunyue<sup>1</sup>, WANG Yishan<sup>2</sup> and CHEN Chao<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201506020]]></guid><cfi:id>36</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Petri Net distribution method for aircraft system safety index]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201506025]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[To solve the abstractness and communication difficulties of dynamic fault tree, a distribution method based on Petri Net for system safety index was proposed by utilizing the advantages of Petri Net including intuition, easy and wide application. Failure rate was selected as a safety index through arranging the safety index and related reliability index. In the comparison of  the modeling methods between dynamic fault tree and Petri Net, the latter was chosen to establish index distribution models for static and dynamic logic changes. On the basis of this, the hash classification for the refinement of system safety index distribution method was proposed. And through example analysis, a Petri Net hierarchical model for system faults was constructed to distribute index. Distribution results demonstrate that all the distributed values are within the corresponding safety indexes and this method can overcome the defects of non-intuition in dynamic fault tree method and of excessive roughness in equal distribution method, which provides references for the design and evaluation of aircraft safety.]]></description>
<pubDate>2015/12/31 10:11:29</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[WANG Qiang, WANG Xiaohan, LIU Gang and GENG Huixin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Qiang, WANG Xiaohan, LIU Gang and GENG Huixin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201506025]]></guid><cfi:id>35</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[A reliability analysis method on  constant current remotepower feeding system of cabled seafloor observatory network]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201505029]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Based on underwater unit short/open circuit failure modes, a method for analyzing the reliability of constant current remote power feeding system of cabled seafloor observatory network was proposed. According to system power supply and structural properties, the system was divided into different links and segments. Influence on power supply state of the links and observation equipments by unit failures in different position was studied in detail. The causes of leading system and link cannot be conducted and observation equipment cannot be operated were summarized, and the probability of different fault occurrence was analyzed, then power supply reliabilities method of system, links and observation equipments were obtained. Through example analysis，the general law of the three kinds of power supply reliability needs comprehensive considerations in system construction and design phase.]]></description>
<pubDate>2015/11/9 16:21:59</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[WANG Xichen, ZHOU Xuejun, ZHOU Yuanyuan, ZHANG Xiao and SU Binbin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Xichen, ZHOU Xuejun, ZHOU Yuanyuan, ZHANG Xiao and SU Binbin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201505029]]></guid><cfi:id>34</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Modeling and simulation of operation process for networked air and missile defense systems]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201503029]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Complexity of NAMD(Networked Air and Missile Defense) systems which is evolved in networked centric warfare makes researches on its modeling and simulation still stay in the initial exploring phase. Many novel characters of systems operation for this domain were introduced, and several models for it were developed from target，weapon and C2 (command and control) perspective respectively, eventually a typical simulation case of relay guidance was designed for models validation. Results analysis not only demonstrates the process of NAMD, but also push forward the effectiveness simulation of NAMD. ]]></description>
<pubDate>2015/6/30 18:53:57</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHU Zhi, LEI Yonglin and ZHU Yifan]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHU Zhi, LEI Yonglin and ZHU Yifan</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201503029]]></guid><cfi:id>33</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[System of systems safety analysis method for GNSS]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201502018]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to address challenges of safety analysis of global navigation satellite systems (GNSS) brought by its system of systems (SoS) characteristics such as complex relationships between its component systems, to identify and study the SoS safety hazards across-the-board, and to improve its safety and enhance the service, a GNSS safety modeling method was proposed in the base of the functional dependency network analysis theory from the view of SoS. The effects and reasons of hazards promulgation and random failures combination caused by complex relationships between component systems in GNSS were analyzed and investigated with some emphasis. The simulation results show that the method is able to describe the influencing process of hazards promulgation and failures combination clearly and conduct both orthodromic and antidromic reasoning analysis. The results also demonstrate the great potential and applicability of the method to SoS safety analysis of GNSS.]]></description>
<pubDate>2015/5/16 9:33:24</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Wangxun, LI Qun, HOU Hongtao and WANG Weiping]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Wangxun, LI Qun, HOU Hongtao and WANG Weiping</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201502018]]></guid><cfi:id>32</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Air defense and anti-missile weapons allocation in hierarchical systems under multi-objectives and multi decision-makers condition]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201501029]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Combat system is an aggregation of various relatively independent subsystems, organizing in a large-scale hierarchical structure. The structure with multilevel, multisystem, multi decision-makers and multi-objectives complicated the allocation process of weapons and equipment to each subsystem when facing an attack. For optimizing the complicated structure, a model with multi-objectives and multi decision-makers based on risk management was built, which could deal with the hierarchical couplings between subsystems and conflicts between multi-objectives, especially in uncertain situations. In order to solve the air defense and anti-missile weapons allocation problem of the MOMDRA model, the idea of system decomposition and weighting method are used to generate Pareto optimal allocation solutions from the aspect of different decision makers’ concerns. In the end, the feasibility of this method is illustrated by an example.]]></description>
<pubDate>2015/3/19 11:35:44</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Jun,JIANG Jiang and CHEN Yingwu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Jun,JIANG Jiang and CHEN Yingwu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201501029]]></guid><cfi:id>31</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Air defense system modeling and target value ranking]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201501030]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[To solve the problem of air defense system modeling and assessing which is partial to determine the nature, only paying attention to system structure and overlooking entity and relation property in system, some efforts have to be done. On the basis of recent model and assess method, put forward air defense system model based on adjacency matrix, define capacity assess vector, use the target value evaluation method that was based on target contribution degree to system capacity and put forward target rank and discrete degree based on Pareto dominance and crowding distance so as to form Non-inferiority rank algorithm, and use the weighting and cost performance and other network access methods as the comparison, establish random examples for simulation, simulation result proves that the air defense system model based on Markov logic and Non-inferiority value rank algorithm are efficiency.]]></description>
<pubDate>2015/3/19 11:35:45</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[YANG Yao<sup>1</sup>,CHEN Chao<sup>1</sup>,LIU Yanjun<sup>2</sup>,LIU Zhong<sup>1</sup> and BAO Weidong<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>YANG Yao<sup>1</sup>,CHEN Chao<sup>1</sup>,LIU Yanjun<sup>2</sup>,LIU Zhong<sup>1</sup> and BAO Weidong<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201501030]]></guid><cfi:id>30</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Weapon system development risk comprehensive assessment method with set pair analysis and LS-SVM]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201606028]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[To effectively reduce or hedge the development risk of weapon equipment for smooth project progress, a comprehensive assessment method based on SPA(set pair analysis) theory and LS-SVM (least square support vector machine) method was proposed for weapon equipment development. Firstly, according to the specific characteristics of weapon equipment development, the weapon equipment development risk assessment index system was established. Secondly, on the basis of this, the concept of connection degree and set pair in SPA theory was introduced to construct the training samples and test samples. Finally, through the obtained samples, LSSVM was trained and tested to get the assessment model and to produce the assessment result. An example analysis shows that the proposed method has many advantages in simple implement, combining the qualitative analysis and the quantitative analysis, easy understanding. The assessment results are more close to the actual development. It has important practical significance to improve the risk management and decisionmaking level of weapon equipment development project.]]></description>
<pubDate>2016/12/31 18:39:28</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[BAI Yan<sup>1</sup>, GAN Xusheng<sup>2</sup>, DONG Xin<sup>2</sup> and DAI Zhe<sup>2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>BAI Yan<sup>1</sup>, GAN Xusheng<sup>2</sup>, DONG Xin<sup>2</sup> and DAI Zhe<sup>2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201606028]]></guid><cfi:id>29</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Storage and query processing for semi-structured spatio-temporal data in HBase]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201603029]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A study about how to effectively achieve semi-structured spatio-temporal data storage and query in HBase was carried out. The formal description of the problem was issued; the HBase semi-structured spatio-temporal storage model was proposed by using a semi-structured approach TwigStack. On this basis, semi-structured spatio-temporal range query and kNN queries were carried out. An experiment was made in terms of real data and a comparison was made with MongoDB which needs higher hardware configuration, the results show that the performance of semistructured spatiotemporal query algorithm is similar to MongoDB in the machine with general configuration, so that it has the advantage in the practical application.]]></description>
<pubDate>2016/7/7 11:14:31</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[FENG Xiaosheng, ZHANG Chong, CHEN Xiaoying, TANG Jiuyang and GE Bin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>FENG Xiaosheng, ZHANG Chong, CHEN Xiaoying, TANG Jiuyang and GE Bin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201603029]]></guid><cfi:id>28</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Optimization method of carrying maintenance material support project for warship formation based on CML model]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201602022]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[At present, studies in spares allotment optimization area mainly focus on the conditions that there is only qualitative or quantitative constraint. Nevertheless, the mix-conditions have not been reported to the best of our knowledge from the literatures. The researches usually concern the single warship, but fewer show concern about the warship formation. In view of this problem, the mission preparation of warship formation before sailing was taken as a research background; the warship formation support cost, warship storage space, warship carrying ability and crew maintenance ability were adopted as the mixed-constraints conditions; the spare parts support probability was served as the objective function. A normal reverse distribution cloud model, the  marginal effect and the Lagrange multiplier methods (CML model) were used to solve such warship formation spare parts allotment problem. A method was proposed for the determination and dynamical updating of system resource constraint factors, meanwhile, the selecting methods and calculating process of the model was optimized. The reliability of the method which can provide a new trial for the problem of warship formation spare parts allotment under the mixed constraints condition was proved by an actual case.]]></description>
<pubDate>2016/5/6 16:32:22</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[JIN Jiashan<sup>1,2</sup>, CAI Zhiming<sup>1,2</sup> and CHEN Yanqiao<sup>1,2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>JIN Jiashan<sup>1,2</sup>, CAI Zhiming<sup>1,2</sup> and CHEN Yanqiao<sup>1,2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201602022]]></guid><cfi:id>27</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Multi-skilled labor allocating method based on improved Hungary algorithm]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201602024]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The optimal allocation of labor is of great significance to improve the efficiency of equipment manufacturing. For the shortcoming of traditional Hungary algorithm could not solve the resource scheduling problem with parallel links, an improved Hungary algorithm was proposed. The improved algorithm converted the problem into a typical assignment problem by replacing parallel link jobs with virtual jobs,  and optimized it with classical Hungary algorithm and determined the realizability of the virtual jobs based on the results. Finally, the optimal scheme was obtained through iterative searching. In addition, an example of multi-skilled labor allocation system is introduced to verify the effectiveness of the proposed algorithm.]]></description>
<pubDate>2016/5/6 0:00:00</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LI Tingpeng, QIAN Yanling and LI Yue]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LI Tingpeng, QIAN Yanling and LI Yue</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201602024]]></guid><cfi:id>26</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Comprehensive analysis method for vulnerability of complex systems]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201602025]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to identify vulnerable points in complex system roundly and assess its vulnerability scientifically, to improve the insufficiency of the pure topological methods, an analysis method integrated complex network theories and effectiveness assessment technologies was proposed, which considers both the topological and non-topological factors of vulnerability. Based on centricity measurements of complex network, a generalized indicators method was used for topological vulnerability analysis. Referring to the probability risk assessment theory, non-topological vulnerability was analyzed from susceptibility and brittleness. Then the final vulnerability results were integrated from the former two results. The demonstration results show that there is an intersection set but also some differences between topological and non-topological analysis. These two aspects of vulnerability are correlative and complementary close, they both contribute to the screening of critical points and links in a complex system, and compared to purely topological study, conclusions from integrated analysis were more comprehensive.]]></description>
<pubDate>2016/5/6 16:32:22</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Wangxun, LI Qun, WANG Weiping and Li Haibing]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Wangxun, LI Qun, WANG Weiping and Li Haibing</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201602025]]></guid><cfi:id>25</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Evaluation model of time-varying availability for combat units under finite repair capacity]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201601019]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Aimed at the demand of spare parts changes dynamically as the mission phases change, and considering the influence of the scrap probability owing to the finite carrying repair capacity of combat units, by the introduction of the scrap factor, the evaluation model of time-varying operation availability for two echelon support system was developed, in which, the failure parts can be scrapped and there is no exterior supply. And then, a simulation is realized based on the  ExtendSim software and the availability results was received. According to the results, the parameter fitting was carried into execution and the approximate analytical formula of scrap factor in the availability model was obtained. In a given example, the scrap factor can adapt to different reliability and maintainability parameters, and the adaptability is validated. The evaluation model is a complementary for conventional models which is developed based on the spare parts balance in support system and can help equipment personals to make appropriate spare parts programs. ]]></description>
<pubDate>2016/3/7 9:21:22</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[XU Li<sup>1</sup>, LI Qingmin<sup>2</sup>, LI Hua<sup>1</sup> and SHAO Songshi<sup>2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>XU Li<sup>1</sup>, LI Qingmin<sup>2</sup>, LI Hua<sup>1</sup> and SHAO Songshi<sup>2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201601019]]></guid><cfi:id>24</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Review of the interdependent networks]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201601020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In recent years, the network dependency and interdependent networks have become a research hotspot in the field of complex network, but literature about the overview of related research progress is still very rare. Based on the systematic research of domestic and overseas literatures, the percolation theory of the interdependent networks was briefly introduced, and the cascading failure process of the interdependent networks was described. Then the related progress was summarized from three aspects that can affect the robustness of interdependent networks: characteristics of sub network, type of dependency edge, the combination of sub networks. Finally, the future development direction of interdependent networks was prospected in both theoretical and practical aspects.]]></description>
<pubDate>2016/3/7 0:00:00</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LAO Songyang, WANG Junde and BAI Liang]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LAO Songyang, WANG Junde and BAI Liang</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201601020]]></guid><cfi:id>23</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Air traffic management system performance evaluation based on linguistic decision map with multi-subnets]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201706020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[For evaluating the performance of air traffic management system, a model based on linguistic decision map with multi-subnets was proposed as well as the indexes. The influences among indexes were analyzed by using a multi-subnets strategy, and the initial judgment matrices and influence connective matrices were built by multiple experts using linguistic scales. The proposed  approach can achieve global priorities of indexes and evaluation results of alternatives. Finally, the case study illustrates that, in comparison with the independent situation, results of the model can represent priorities of indexes more objectively and comprehensively, and can present the gap among the alternatives more obviously.]]></description>
<pubDate>2018/1/16 17:02:01</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[MA Yuefei<sup>1,3</sup>, CHEN Feng<sup>2</sup>, YAO Di<sup>2</sup> and WU Xiaoyue<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>MA Yuefei<sup>1,3</sup>, CHEN Feng<sup>2</sup>, YAO Di<sup>2</sup> and WU Xiaoyue<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201706020]]></guid><cfi:id>22</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Intuitionistic fuzzy matter-element and its application in multiattribute group decision-making with unknown weight]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201705024]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The intuitionistic fuzzy matter-element model with intuitionistic fuzzy decision information was proposed for the traditional matter-element theory which cannot be applied in intuitionstic fuzzy decision-making. It presented relative similarity to replace the traditional correlation function and then integrally described intuitionistic fuzzy matter-element multi-attribute decision-making method and its steps. An example was used to show the effectiveness of this method, especially it analyzed the multi-attribute group decision-making problem with unknown weight by using the projection method and intuitionistic fuzzy entropy to prove the practicability of this method.It is proved that the method presented here can offer a new approach to solve intuitionistic fuzzy multi-attribute group decision-making problems.]]></description>
<pubDate>2017/11/7 0:00:00</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Yangming<sup>1</sup>, CHEN Yunxiang<sup>1</sup>, XIANG Huachun<sup>1</sup>, ZHAO Zhining<sup>2</sup> and LIU Nian<sup>3</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Yangming<sup>1</sup>, CHEN Yunxiang<sup>1</sup>, XIANG Huachun<sup>1</sup>, ZHAO Zhining<sup>2</sup> and LIU Nian<sup>3</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201705024]]></guid><cfi:id>21</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[ROBDD algorithm for analyzing the reliability of phased-mission system]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201705026]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The reliability analysis approach of PMS (phased-mission system) based on Markov process encounters the state-explosion problem for large systems. To avoid the state-explosion problem, the PMS reliability model using hierarchical method was proposed. The hierarchical method uses a low-level continuous time Markov chain and an upper-level binary decision diagrams. The isomorphic nodes consolidation strategy and the redundant nodes removal strategy were given to construct reduced hierarchical model. The above nodes compressing strategies can improve the efficiency of model generation and storage. A recursive computing algorithm solving the hierarchical model was designed on the basis of the PMS components ordering, and its computational complexity was linear with the number of nodes in model. Finally, by a case study, the number of nodes in the original model was compared with the proposed model  using nodes compressing strategy, also the mission reliability in the hierarchical model was compared with it in the Markov model. Results show the correctness and effectiveness of the reduced hierarchical model.]]></description>
<pubDate>2017/11/10 10:01:13</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[YAN Hua<sup>1</sup>, XING Yunyan<sup>2</sup>, ZHANG Li<sup>1</sup> and GUO Liqing<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>YAN Hua<sup>1</sup>, XING Yunyan<sup>2</sup>, ZHANG Li<sup>1</sup> and GUO Liqing<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201705026]]></guid><cfi:id>20</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Modified ADC method and its application for weapon system effectiveness evaluation]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201703020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Based on analyses about system effectiveness of the weapon and aiming at application requirements from the weapon type approval tests, a modified ADC(availability-dependability-capability) method was put forward in order to solve the problem that the actual usability of the weapon cannot be presented accurately and entirely by dividing system conditions using the traditional ADC method. Comprehensive modifications were performed, such as putting forward the strategy of adding the medial conditions in the model. As the results showed, functions for integrating the sub-system effectiveness, for describing and computing the conditions, for transfers between conditions, and for capabilities were all improved. A software platform SEEK was developed based on these modifications. System effectiveness evaluation of a main tank was selected as an example for demonstrate feasibility and validity of the method.]]></description>
<pubDate>2017/7/9 11:57:46</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LIU Shilei<sup>1</sup> and LI Hao<sup>2,3</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LIU Shilei<sup>1</sup> and LI Hao<sup>2,3</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201703020]]></guid><cfi:id>19</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Binary decision diagram model for reliability analysis of phased mission system]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201702028]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to implement the automatic generation of binary decision diagram (BDD) for phased mission system reliability analysis, a universal approach for establishing BDD reliability model was proposed. A nested BDD data structure named BDD_Element was defined, and the approaches of BDD description and storage were given. Algorithms for transforming AND Gate, OR Gate and k/n Gate into BDD models were proposed. The BDD model for reliability analysis of phased mission system was constructed in 2 steps: based on the logic gate transforming algorithms, structure functions of the component logic relationship were transformed into phase BDD models; based on the BDD manipulation rules, phase BDD models were integrated together. By analyzing the reliability of satellite attitude adjustment mission, it shows that this approach can be effectually applied in the reliability analysis of phased mission system.]]></description>
<pubDate>2017/5/11 16:56:56</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[MENG Li<sup>1,2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>MENG Li<sup>1,2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201702028]]></guid><cfi:id>18</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Game analysis for nuclear crisis using the graph model for conflict resolution]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201702029]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Nuclear security is an important part of national security. To deal with the lack of quantitative methodologies in the current researches, the GMCR（graph model for conflict resolution） was adjusted and applied to games analysis for nuclear crisis. Firstly, the analysis framework, the related definitions and the matrix representation approaches were proposed. Secondly, the conflict model was calibrated based on the history background of the Sino-Soviet nuclear crisis in 1969, and the evolution of game state was unveiled by using matrix analysis algorithms. Thirdly, two parameters of conflict model were introduced, namely game policy and military capability, and the sensitivity analysis for their influence to stability results was researched. Fourthly, coalition analysis methodologies were utilized to identify the potential alliances of decision makers and its impact on national relation evolution. Finally, relevant conclusions and decision suggestions of nuclear security were summarized based on the analysis results of the conflict model. Results show that the GMCR is suitable for investigating nuclear crisis and the strategy matching with military capability play a key role in game evolution.]]></description>
<pubDate>2017/5/11 16:56:56</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[YOU Hanlin, LI Mengjun, JIANG Jiang, GE Bingfeng, ZHANG Xueting and XU Jianguo]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>YOU Hanlin, LI Mengjun, JIANG Jiang, GE Bingfeng, ZHANG Xueting and XU Jianguo</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201702029]]></guid><cfi:id>17</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Capability requirements oriented weapons portfolio planning model and algorithm]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201701016]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Aiming at solving the difficulties of choosing and planning in the weapon systems development problems, a bi-objective optimization model was proposed to minimize the capability gaps plus the total risk values, and to look for the best development scheme by comparing different combinations of weapons based on the given capability requirements. The total budget limitation, annual budget constraint and the planning period were taken into account in this model. A solving algorithm, based on non-dominated sorting genetic algorithm-Ⅱ and differential evolution, was presented to obtain the Pareto set. The technique for order preference by similarity to ideal solution method was employed to reach a final compromise solution．A case was studied to demonstrate the effectiveness of the proposed model and hybrid algorithm, which can support the decision making on the weapons development and planning.]]></description>
<pubDate>2017/3/7 11:55:44</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Xiaoxiong, GE Bingfeng, JIANG Jiang and TAN Yuejin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Xiaoxiong, GE Bingfeng, JIANG Jiang and TAN Yuejin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201701016]]></guid><cfi:id>16</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Initiating event identification method for  systematic missile safety analysis]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201701018]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Initiating event identification is the primary task in safety analysis based on accident mechanism. The comprehensiveness and the completion of identification have a direct effect on final results. Due to the width of related facets and multitude of impact factors, an operable systematic method is required to guide the identification process. Aiming at the properties of missile weapon, the MLD (master logic diagram) was proposed to provide a systematic hierarchical description of missiles. It was also utilized to collect and classify identified initiating events. For the first time, the HAZOP (hazard and operability analysis) was introduced in missile system safety analysis to identify the initiating events. Combined with FMEA (failure modes and effects analysis), this framework provided  support for the identification of initiating events which were caused by single failure or parameter abnormity. Results show that the proposed framework provides a practical way to ensure the comprehensiveness of initiating event identification for system safety analysis of missile weapon.]]></description>
<pubDate>2017/3/7 11:55:44</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[WANG Dong<sup>1</sup>, JIANG Ping<sup>2</sup>, CHENG Zhijun<sup>2</sup> and GUO Bo<sup>2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Dong<sup>1</sup>, JIANG Ping<sup>2</sup>, CHENG Zhijun<sup>2</sup> and GUO Bo<sup>2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201701018]]></guid><cfi:id>15</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Node importance evaluation and network vulnerability analysis on complex network]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201701019]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A method for node importance evaluation and network vulnerability analysis based on node’s cascading failure model was proposed. The mechanism of fault transmitting and evolution was the reason for vulnerability of basic complex networks. A model that can get real-time state of nodes’ loads and reallocating loads was raised based on node’s cascading invalidation model. A node importance evaluation and network vulnerability analysis method based on nodes’ state evolution were put forward, by which the robustness parameters of networks were found out, and the failure effect analysis was conducted. Its effectiveness was verified through simulation experimental results.]]></description>
<pubDate>2017/3/7 0:00:00</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[CHENG Guangquan, LU Yongzhong, ZHANG Mingxing and HUANG Jincai]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CHENG Guangquan, LU Yongzhong, ZHANG Mingxing and HUANG Jincai</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201701019]]></guid><cfi:id>14</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Equipment time-varying availability evaluation and support project optimization for multi-echelon support system with finite repair capacity]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201701020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The spare parts inventory and department repair capacity are important factors to influence the process of maintenance turnover for spare part, and it restricts the use effect of equipment. Aiming at the support project evaluation and optimization when the demand of spare parts is dynamic in the mission phases and considering the influence of repair capacity to spare parts repair process, an evaluation model of time-varying availability was set up for the multi-echelon support system with finite repair capacity on the basis of the METRIC methodology and dynamic queuing theory. Based on the evaluation model, an optimization model for the support project of multi-echelon support system during the mission phases was proposed by taking the support cost as the optimization objective and the equipment availability as the constraints. The minimum availability of the whole mission was taken as observation value and the margin optimization was used to get the optimized project for each resource. The analysis results of an example show the availability value for different mission phases can be given by the evaluation model, and the optimized project of resources for the multi-echelon support system can be obtained by the optimization model and method. The proposed models and optimization method can provide decision support to equipment support staff for rational support project.]]></description>
<pubDate>2017/3/7 11:55:45</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[XU Li<sup>1</sup>, LI Qingmin<sup21</sup>, HU Yijun<sup>1</sup>, HU Xiaoqi<sup>1</sup> and LIU Xin<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>XU Li<sup>1</sup>, LI Qingmin<sup21</sup>, HU Yijun<sup>1</sup>, HU Xiaoqi<sup>1</sup> and LIU Xin<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201701020]]></guid><cfi:id>13</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Tensor decomposition based clustering method for heterogeneous information in networks]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201805022]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A tensor decomposition based clustering method was proposed for heterogeneous information in networks. This clustering method can cluster multiple types of objects and rich semantic relationships simultaneously. The multi-types of information objects in networks were modeled as a high-dimensional tensor, and the rich semantic relationships among different types of objects were modeled as elements in the tensor. Based on an effective tensor decomposition method, the multi-types of objects were partitioned into different clusters simultaneously. The experimental results on both synthetic datasets and real-world dataset show that the proposed clustering method can deal with the heterogeneous information in networks well, and can outperform the state-of-the-art clustering algorithms.]]></description>
<pubDate>2019/1/21 16:09:52</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[WU Jibing, HUANG Hongbin and DENG Su]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WU Jibing, HUANG Hongbin and DENG Su</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201805022]]></guid><cfi:id>12</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Multi-attribute game theoretic model for resource allocation in military attack-defense application]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201805023]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A multi-attribute game theoretic model was proposed to address a two-stage attack-defense resource allocation problem. That is, under limited resources, the defender first allocates different types of safeguard measures among possible targets, against which the attacker chooses a combination of threats and targets to attack. The proposed model, using game theory, was used to determine the optimal resource allocation for both the defender and attacker. The results can minimize the loss for the defender while maximizing the utility for the attacker. In addition, some lemmas were given on the basis of the particularities of this solving model. An illustrative example was studied to verify the feasibility of the proposed model and the accuracy of the lemmas, which can provide decision support for the resource allocation process.]]></description>
<pubDate>2019/1/21 16:09:53</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHANG Xiaoxiong<sup>1,2</sup>, GE Bingfeng<sup>1</sup> and TAN Yuejin<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Xiaoxiong<sup>1,2</sup>, GE Bingfeng<sup>1</sup> and TAN Yuejin<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201805023]]></guid><cfi:id>11</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Multi-resolution risk assessment for complex system including technical risk]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201805024]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to deal with the difficulty of technical risk direct measurement and the strong subjectivity for model parameter setting,  the TRL (technology readiness level) as a standard method, was applied for evaluating the condition and the difficulty of technology realization. The quantitative relations were built by system representation with matrix and relation inference between the TRLs of all subsystems and the dynamic parameters of system process model. Then the uncertainties of schedule and cost beyond tolerable range were evaluated by the indirect method of system process modeling and simulation for the technical risk assessment of complex system development. Additionally, to improve the system resolution for analysis, the multi-resolution modeling method is designed to update the assessment continuously and to improve the analytical resolution along with system evolution.]]></description>
<pubDate>2019/1/21 0:00:00</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[XU Yifan, LYU Jianwei, XIE Zongren and WANG Guangqiang]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>XU Yifan, LYU Jianwei, XIE Zongren and WANG Guangqiang</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201805024]]></guid><cfi:id>10</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Hierarchical iteration algorithm for multi-satellite observation scheduling]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201805027]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A novel satellite scheduling framework based on the divide and conquer principle was proposed. Under this framework, an ant colony optimization algorithm was employed to distribute observation tasks to different satellite orbits. Then, an adaptive simulated annealing algorithm was designed to solve the satellite observation problem involved in each orbit. According to the feedback on the scheduling results at each orbit, the task distribution schema was adjusted. This process was repeated until the termination condition was met. To improve the efficiency of the algorithm, the domain knowledge of the satellite scheduling problem was considered into the heuristic information model of the ant colony optimization algorithm. Next, two neighborhood structures were designed in the simulated annealing algorithm. In addition,  the dynamic selection strategy was used to choose the most appropriate neighborhood search structure. Extensive experiments show that the proposed method can reduce the problem complexity effectively, especially in solving the large-scale satellite observation scheduling problems, which exhibits extraordinary performance.]]></description>
<pubDate>2019/1/21 16:09:53</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LIU Jianyin<sup>1</sup>, JIA Xueqing<sup>2</sup> and WANG Zhongwei<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LIU Jianyin<sup>1</sup>, JIA Xueqing<sup>2</sup> and WANG Zhongwei<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201805027]]></guid><cfi:id>9</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Supply network optimization for spare parts of equipment based on the life cycle]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201804020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[For the problem of the existing spare parts supply optimization method cannot consider the life cycle, the life cycle was merged into network design in stakes and it was optimized based on the dynamic characteristics of the spare parts demand. Firstly, the requirement characteristics of spare parts at different stages of life cycle were deeply analyzed. Secondly, the spare parts supply respond time transfer equation was built, and the programming model with the optimization goal of maximum support effectiveness throughout life cycle was established under constraint conditions. Simulation cases indicate that a combination of a variety of spare parts protection model can improve the effectiveness of the life cycle, and the overall optimization of the life cycle can be implemented with more efficient spare parts supply.]]></description>
<pubDate>2018/9/17 11:14:36</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[DONG Xiaoxiong, CHEN Yunxiang, MENG Xiangfei and WANG Lili]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>DONG Xiaoxiong, CHEN Yunxiang, MENG Xiangfei and WANG Lili</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201804020]]></guid><cfi:id>8</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Image restoration via robust alternating direction method of multipliers]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201802018]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The ADMM (alternating direction method of multipliers) with appropriate parameters plays a successful role in solving linear inverse problems (including image restoration). But the results obtained by ADMM are sensitive to the choices of the penalty parameter, and this bad robustness brought some troubles in its applications. Based on a scheme of choosing the penalty parameter adaptively, a RADMM (robust ADMM) was proposed to tackle this shortcoming. Through analyzing optimization conditions and convergence of RADMM, we can conclude that the adaptive control of the penalty parameter provides good robustness, faster speed of convergence and better solution. And the experiments show that, in the application of image restoration based on the Parseval tight frame, the RADMM is robust to the choices of the penalty parameter, outperforms the ADMM, and is far superior to other alternative state-of-the-art methods.]]></description>
<pubDate>2018/5/11 16:33:57</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[WU Yue, ZENG Xiangrong, ZHOU Dianle, LIU Yan, ZHOU Jiaqing and ZHOU Jinglun]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WU Yue, ZENG Xiangrong, ZHOU Dianle, LIU Yan, ZHOU Jiaqing and ZHOU Jinglun</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201802018]]></guid><cfi:id>7</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Method for hybrid multi-attribute decision making based on prospect theory and evidential reasoning]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201905008]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[For the hybrid multi-attribute decision making problems with completely unknown attribute weights, a decision-making method based on the prospect theory and the evidential reasoning was proposed. The decisionmaking information of three kinds of hybrid attributes including precision numbers, interval numbers and linguistic variables was unified by intuitionistic fuzzy numbers and transformed according to the prospect theory. An attribute reliability evaluation method based on intuitionistic fuzzy entropy and similarity was proposed. And the attribute weights were determined by combining the importance of attribute. The evidential reasoning algorithm was used to assemble the attribute information to obtain the comprehensive prospect values of alternatives, and then the alternatives can be sorted. The results of numerical example analysis show that the proposed method has a strong discriminating ability and can effectively reduce the uncertainty of decisionmaking results. The proposed method has good applicability to hybrid multi-attribute decision making problems.]]></description>
<pubDate>2019/9/30 15:58:00</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[LUO Chengkun<sup>1</sup>, CHEN Yunxiang<sup>1</sup>, GU Tianyi<sup>2</sup> and XIANG Huachun<sup>1</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LUO Chengkun<sup>1</sup>, CHEN Yunxiang<sup>1</sup>, GU Tianyi<sup>2</sup> and XIANG Huachun<sup>1</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201905008]]></guid><cfi:id>6</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Interactive visualization decision-making method of  Pareto front]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201905018]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Considering the inability of current visualization technology of high dimension multiobjective to effectively display preference information of decision-making, a new graphical visualization method of interactive ndimension Pareto front method based on radial axes plots was proposed. Firstly, the fitness functions were standardized to eliminate dimensional gaps. Secondly, the least square problem model was established according to the interactively updated axes matrix and solved by the Moore-Penrose pseudoinverse method. Sequentially the diagram of dynamic Pareto front distribution was obtained, which effectively shows the data information of each dimension objective, the variation tendency towards performance and the preference information for decisionmakers. Finally, the visualization model is devised and the extensive experimental analysis is provided to investigate the Pareto optimal solutions for decision-makers.]]></description>
<pubDate>2019/9/30 15:58:01</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[HU Jiaxin and YANG Leping]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>HU Jiaxin and YANG Leping</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201905018]]></guid><cfi:id>5</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Layout of functional tanks in semi-submersible repair vessels based on two-stage algorithm]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201905019]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A layout optimization model about functional tanks in semi-submersible repair vessels was established under the premise that relevant technologies can be reached. The objective function of this model was put forward under the consideration of three factors about maintenance and repair tanks, such as tank size, tank adjacency, and tank global position. The constraints of this model were set to meet initial metacentric height requirement and guarantee to float on even keel. This optimization model was solved by a two-stage algorithm of combining greedy dropping heuristic algorithm with programming solve. The functional tanks layout solution was obtained with the aid of a semi-submersible hull whose capacity reaches the level of 50 000 tons. This testified the rationality of this model and practicability of this algorithm. And the number of feasible layout solutions shows an upward trend with the increase of the maintenance equipment weight coefficient. This method can improve scientificity in decisionmaking process about functional tanks′ layout in semisubmersible repair vessels.]]></description>
<pubDate>2019/9/30 15:58:01</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[ZHAO Ruijia<sup>1,2</sup>, XIE Xinlian<sup>1,2</sup> and ZHAO Jiabao<sup>1,2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHAO Ruijia<sup>1,2</sup>, XIE Xinlian<sup>1,2</sup> and ZHAO Jiabao<sup>1,2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201905019]]></guid><cfi:id>4</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Maintenance model for T/R unit of phased array radar′s antenna under the restriction of reliability]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201902020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to describe the maintenance activities for the phased array radar′s antenna system, a time based maintenance model that “T/R unit can not be restored to as good as new” under the foundation of reliability was built. Firstly, the antenna′s construction parameters under the T/R unit failure in series were analyzed and the threshold value of failure T/R unit was determined. Then in view of the fact that“T/R unit can not be restored as good as new”, a maintenance model that minimizes the average cost per unit time under the restriction of antenna′s operational availability was established by introducing failure rate increasing factor. Finally, the marginal efficiency analysis algorithm was applied to achieve the optimized maintenance cycle and service group. Several examples are given to verify that the model excludes the restriction of “T/R unit cannot be restored to as good as new”, which are more in accordance with the actual situation and will provide the theoretical foundation for preventive maintenance policy.]]></description>
<pubDate>2019/4/24 0:00:00</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[JIANG Wei, SHENG Wen, LIU Shihua and LU Li]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>JIANG Wei, SHENG Wen, LIU Shihua and LU Li</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201902020]]></guid><cfi:id>3</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Dynamic evaluation methods for spare parts support effectiveness]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201901024]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[According to the fact that current effectiveness evaluation models lay more emphasis on the static observations of indicators and less on the trend information inherent in sequential observations, a new dynamic evaluation methods for spare parts support effectiveness based on grey clustering-rough set and set pair analysis was proposed. Compared with the subjective and the objective weight-deciding method′s virtue and disadvantage, the weight of every index was decided by using grey clustering-rough set combinational method. By establishing the set of spare parts support effectiveness evaluation set pair, the dynamic variation law of the protection of spare parts was described by definition of set pair equal power balance power and opposite power, Based on Markov chain, the dynamic set pair model was analyzed, The results show that the model can reflect the spare parts support effectiveness dynamic characteristics effectively, giving the decision makers a scientific reference to develop a long-term plan for the support of spare parts.]]></description>
<pubDate>2019/3/15 11:33:35</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[DONG Xiaoxiong<sup>1,2</sup>, CHE Fei<sup>1</sup>, CHEN Yunxiang<sup>1</sup>, HE Zhen<sup>3</sup> and ZHU Qiang<sup>4</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>DONG Xiaoxiong<sup>1,2</sup>, CHE Fei<sup>1</sup>, CHEN Yunxiang<sup>1</sup>, HE Zhen<sup>3</sup> and ZHU Qiang<sup>4</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201901024]]></guid><cfi:id>2</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Adaption analysis of ship repair and maintenance at far sea and platform type selection]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201901027]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The essence of the type selection of the platform for ship repairing and maintenance at far sea is a decision-making with multiple fuzzy related attributies, including of operability, stability, timeliness, safety and economy. In order to reflect the decision-making intention of decision makers and integrate decision information more accurately in the platform selection process, a R-THIOWGA (related triangular hesitate intuitionistic ordered weighted geometric average) operator was built, and a new comparison rule of the triangular hesitate intuitionistic fuzzy number was also presented. A method of the group decision-making for type selection of ship repairing and maintenance at far sea was proposed, based on the R-THIOWGA operator. The application of the method was analyzed on Chinese Navy ship repairing and maintenance practically. The result shows that the R-THIOWGA operator is feasible for multiple fuzzy related attributes decision-making, and  the self-propelled semi-submersible repair and maintenance ship is confirmed as the best platform type for China navy.]]></description>
<pubDate>2019/3/15 11:33:35</pubDate>
<category><![CDATA[Management Science & Engineering]]></category>
<author><![CDATA[XU Xiaowei<sup>1</sup>, XIE Xinlian<sup>1</sup>, TIAN Cong<sup>1</sup>, HUANG Jine<sup>2</sup> and XU Dong<sup>2</sup>]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>XU Xiaowei<sup>1</sup>, XIE Xinlian<sup>1</sup>, TIAN Cong<sup>1</sup>, HUANG Jine<sup>2</sup> and XU Dong<sup>2</sup></atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/201901027]]></guid><cfi:id>1</cfi:id><cfi:read>true</cfi:read></item>
</channel>
</rss>