<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005">
<channel xmlns:cfi="http://www.microsoft.com/schemas/rss/core/2005/internal" cfi:lastdownloaderror="None">
<title cf:type="text"><![CDATA[Editorial department of the Journal of National University of Defense Technology -->信息与通信工程·计算机科学与技术]]></title>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Fourier decomposition model of group delay and its estimation method]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202105008]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[A group delay model based on trigonometric function series was proposed. And it was theoretically proved that only a finite order of trigonometric function group delay can characterize the influence of arbitrary group delay on signal correlation peaks. On this basis, the trigonometric decomposition series of the group delay were obtained by measuring the correlation peaks and matching the correlation peaks under different combinations of trigonometric function group delays. As a result, the equivalent group delay with similar effects on the correlation peaks was obtained. Simulation results show that the correlation peak of the signal is approximately the same as that of the ideal correlation peak, and the delay estimation error is less than 0.1 ns at different delay time intervals after calibration of the channel by using the group delay estimated by this method.]]></description>
<pubDate>2021/9/29 9:04:41</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[XIAO Zhibin, HUANG Yangbo, TANG Xiaomei, LIU Zengjun, NI Shaojie]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>XIAO Zhibin, HUANG Yangbo, TANG Xiaomei, LIU Zengjun, NI Shaojie</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202105008]]></guid><cfi:id>31</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Video smoke detection method combining Y<sup>d</sup>U<sup>a</sup>V<sup>a</sup> color model and improved MobileNetV3]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202105009]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to reduce the false alarm rate and improve the detection efficiency for video smoke detection, the Y<sup>d</sup>U<sup>a</sup>V<sup>a</sup> color model was proposed, which can characterize the spatial distribution and temporal variation of smoke. By using this color model to quickly screen the suspected smoke image blocks, the false alarm rate was reduced and the computing efficiency was improved. An improved MobileNetV3 network structure was proposed, which is aimed to extract deep features of images and to classify the suspected smoke image blocks so as to detect whether there is smoke in a video. The simulation results of video smoke detection show that this method has high accuracy, high detection frame rate, and low false alarm rate.]]></description>
<pubDate>2021/9/29 9:04:41</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[LIU Tong, CHENG Jianghua, HUA Honghu, LUO Xiaobing, CHENG Bang]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LIU Tong, CHENG Jianghua, HUA Honghu, LUO Xiaobing, CHENG Bang</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202105009]]></guid><cfi:id>30</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Correction method for periodic fluctuation of the BDS satellite atomic clocks based on spectrum analysis]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202105010]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to avoid introducing periodic fluctuations in the clock offset of onboard atomic clock into the system time, it is necessary to eliminate the periodic fluctuations when establishing the autonomous time benchmark of satellite navigation system constellation. Based on the clock offset of BeiDou atomic clock provided by IGS, a method of periodic fluctuation correction for onboard atomic clock based on spectrum analysis was proposed. By comparing the performance of frequency stability of onboard atomic clock offset before and after correction, it is proved that this method can successfully eliminate the periodic fluctuation of satellite clock offset caused by environmental factors. Performances of different types of onboard atomic clock of BeiDou are improved after correction. Through this method, performances of onboard atomic clocks with different orbital types in the system have been improved remarkably. Among them, the frequency stability in 10 000 seconds of GEO(geostationary satellite) satellite-borne atomic clocks has been improved about 50%, MEO(medium orbit earth satellite) about 23%, and IGSO(inclined geosynchronous orbit satellite) about 15%. Through this correction method, the frequency stability of cesium clocks in ground stations has been achieved in both BDS-2 and BDS-3 satellite-borne atomic clocks, which lays foundation to the star autonomous timekeeping based entirely on satellite-borne atomic clocks.]]></description>
<pubDate>2021/9/29 9:04:41</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[LI Xiaoyi, GONG Hang, PENG Jing, YU Meiting, SUN Guangfu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LI Xiaoyi, GONG Hang, PENG Jing, YU Meiting, SUN Guangfu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202105010]]></guid><cfi:id>29</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Deviation characteristics analysis of different occultation data using IGRA Sounding data]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202105011]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to verify the accuracy of different occultation data inversion of the wet temperature profile, it is necessary to quantify the error characteristics. The piecewise linear interpolation method, with time window 1 h and horizontal distance 100 km as the matching criterion was adopted. The average deviation and standard deviation of each interpolated height layer temperature of 0.2~30 km were statistically analyzed to explore the deviation characteristics of different occultation data. By using the complete IGRA (integrated global radiosonde archive) sounding data during 2018-2019, the deviation of different occultation data in China was evaluated. The results show that, for the above kind of occultation data, the temperature deviation is negative, and the overall average deviation is from -0.5 to 0.5 K. The absolute value of occultation data is less than 0.4 K compared with the IGRA data, and the accuracy of occultation data is equivalent to IGRA sounding station data. Through the significant detection analysis, it was found that the relative deviation of refractivity is small, combined with the statistical F=0.985 7>0.05, which shows that the detection accuracy of different masking plans has no obvious difference.]]></description>
<pubDate>2021/9/29 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[ZHANG Qiuzhao, WANG Yaoxing, SHEN Zhen]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Qiuzhao, WANG Yaoxing, SHEN Zhen</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202105011]]></guid><cfi:id>28</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Similarity drifting problem in cross-modal retrieval]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202105012]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to reduce the impact of the “similarity drift” problem, a matching strategy based on “neighborhood propagation” was proposed, which maps the intra-modal neighbours of the query items onto the target space, and takes their nearest neighbours in the target space as cross-modal neighbours of the query term. Experiments on real data sets prove that the similarity drifting problem exists widely, and the proposed matching strategy can effectively reduce its impact and improve the accuracy of matching.]]></description>
<pubDate>2021/9/29 9:04:41</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[ZHENG Qibin, DIAO Xingchun, WANG Yanzhen, CAO Jianjun, LIU Yi, QIN Wei]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHENG Qibin, DIAO Xingchun, WANG Yanzhen, CAO Jianjun, LIU Yi, QIN Wei</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202105012]]></guid><cfi:id>27</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Evaluation of the average specific kinetic energy of stun grenade fragments by Monte Carlo subdivision projection simulation]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202105013]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to evaluate the lethality and injury radius of the stun grenade fragments, and to reduce its average specific kinetic energy, the calculation model of the average specific kinetic energy of fragments was established, based on the Monte Carlo subdivision projection simulation method. With co-simulation method of LS-DYNA and self-programming, the calculation models of average specific kinetic energy of natural fragments and semi-prefabricated fragments of stun grenade were simulated and compared separately. The mass distribution, initial velocity, vertical target distribution, average specific kinetic energy threshold and safety radius of the whole fragments in the whole-time domain were obtained. The results show that the mass distribution and initial velocity threshold of semi-prefabricated fragments are lower and more concentrated than that of the natural fragments under the same charge parameters; within the range of less than 2.5 m, the average specific kinetic energy threshold of semi-prefabricated fragments is lower than that of the natural fragments; within the range of more than 2.5 m, the average specific kinetic energy threshold of semi-prefabricated fragments is higher than that of the natural fragments. Compared with the natural fragments, the semi-prefabricated fragments can significantly reduce the lethality radius, but cannot significantly improve the safety radius.]]></description>
<pubDate>2021/9/29 9:04:41</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[LIU Xingyu, ZHAN Renjun, OUYANG Dihua, LI Yongli]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LIU Xingyu, ZHAN Renjun, OUYANG Dihua, LI Yongli</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202105013]]></guid><cfi:id>26</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[System design of high-speed SpaceFibre node]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202105014]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to achieve efficient data transmission of SpaceFibre node, a system design scheme of SpaceFibre node based on FPGA (field programmable gate array) was proposed aiming at the key problems and technologies in network protocols. The polling and arbitration algorithm was adopted to solve the flow control token words application conflict of multiple virtual channels. An efficient processing state machine based on QoS (quality of service) mechanism was designed, which can realize QoS scheduling for multiple virtual channels. A parallel partitioned storage architecture and a resend control algorithm were proposed, which can realize efficient error recovery based on FDIR (fault detection isolation and recovery) mechanism. Different parallel processing schemes were designed for cyclic redundancy check of various data formats and calculation of pseudo-random sequence. A simulation platform was built by ModelSim to test the function simulation of the node system, and the system verification was completed on Virtex-6 FPGA. The results show that the function of SpaceFibre bus node can be realized, and the serial transmission speeds up to 3.125 Gbit/s, which can meet the demand of high-speed data transmission.]]></description>
<pubDate>2021/9/29 9:04:41</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[ZHU Ping, ZHU Yan, AN Junshe, JIANG Yuanyuan, ZHOU Li]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHU Ping, ZHU Yan, AN Junshe, JIANG Yuanyuan, ZHOU Li</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202105014]]></guid><cfi:id>25</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Current status and trend of UAV swarm communication payload technology based on free space optical]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202104015]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The application requirements of UAV (unmanned aerial vehicle) swarm communication payload technology based on FSO (Free Space Optical) were summarized, and the current status of FSO technology and application at home and abroad UAV payloads was discussed. The development prospect of the payload technology of UAV swarm based on FSO communication in high-speed mobile communication environment was also analyzed. Furthermore, a profound analysis on the key technologies in FSO communication links applied to UAV swarm was conducted. Predictably, FSO-based communication payload will be used widely for wide-bandwidth communication networking of UAV swarm in the future.]]></description>
<pubDate>2021/7/20 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[SU Shaojing, TONG Xiaozhong, WEI Junyu, WU Peng]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>SU Shaojing, TONG Xiaozhong, WEI Junyu, WU Peng</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202104015]]></guid><cfi:id>24</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Selective harmonic elimination multi-level RF-PWM strategy and performance analysis]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202104016]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to relax the filtering requirements and improve the wideband performance of the all-digital transmitters, a novel multi-level RF-PWM(radio frequency pulse width modulation) method for all-digital transmitters was introduced. This method limits the selective harmonics of RF-PWM signals by controls the pulsewidth of the corresponding subpulses to make the selected harmonics cancel each other out and keep the weighted superposition of fundamental frequency components proportional to input envelope. For the third harmonic elimination, the corresponding 5-level RF-PWM scheme was presented. And the optimal gain index for 5-level RF-PWM scheme was also analyzed and proved. On this basis, the proposed scheme was verified by extensive simulations.]]></description>
<pubDate>2021/7/20 17:26:15</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[CHEN Jianbin, ZHOU Qiang, ZHU Lei, ZHANG Jiang]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CHEN Jianbin, ZHOU Qiang, ZHU Lei, ZHANG Jiang</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202104016]]></guid><cfi:id>23</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Multipath scenario beam performance and characteristics analysis for meter-wave OFDM-MIMO radar]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202104017]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to solve the beamforming problem of meter-wave OFDM-MIMO (orthogonal frequency division multiplexing-multiple input multiple output) radar, a signal model of frequency division multiplexed MIMO radar array under meter-wave conditions was established, and a theoretical framework for quantitative analysis of multipath characteristics of this system was derived theoretically. The direct-wave and multipath echo models, as well as the closed-form expression of the gain of the joint transmitter-receive bi-directional pattern were derived. A multipath suppression algorithm with range-angle two-dimensional resolution based on the bi-path pattern of a meter-wave OFDM-MIMO radar array was proposed. The proposed method can effectively suppress the multipath echo in the normal direction of the array, and also effectively suppress the periodic loss of the output fresh dryness ratio, and the inhibition ability is further improved with the increase of the frequency offset bandwidth.]]></description>
<pubDate>2021/7/20 17:26:15</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[XIONG Zhimin, WANG Dangwei, LI Xinghui, MA Xiaoyan]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>XIONG Zhimin, WANG Dangwei, LI Xinghui, MA Xiaoyan</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202104017]]></guid><cfi:id>22</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Region proposals optimization algorithm combining neural networks and superpixels]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202104018]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to solve the low recall problem of the region proposals in object detection, the object region proposals algorithm, which combines neural networks and superpixels, was proposed. The edge features, which can be represented clearly by neural networks, were extracted from the images to be detected, and the score of edge information for per sliding window was computed by the strategy of edge clustering and the affinities between the edge groups. The several superpixels of this images were obtained by simple linear iterative clustering algorithm, and the salient object score of a superpixel was calculated using the location, integrity of this superpixel and the contrast with neighbors. The salient objects score of per sliding window was received by these saliency scores of superpixels according to the Euler distance strategy between the sliding window and these superpixels. The region proposals were determined by two components including edge information scores and salient object scores. The comparative experiments were conducted in PASCAL VOC 2007 test set, and the experiment results show that the proposed algorithm can fast generate a set of region proposal with higher localization.]]></description>
<pubDate>2021/7/20 17:26:15</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[WANG Chunzhe, AN Junshe, JIANG Xiujie, XING Xiaoxue, CUI Tianshu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Chunzhe, AN Junshe, JIANG Xiujie, XING Xiaoxue, CUI Tianshu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202104018]]></guid><cfi:id>21</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Intermediate code optimization method for binary translation based on intermediate representation rule replacement]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202104019]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In the process of realizing multi-source to multi-target program translation, the dynamic binary translation uses intermediate code to shield the hardware differences between different source platforms, and the memory virtual strategy is adopted to achieve the goal. As a result, it brings about the problem of intermediate code expansion. Traditional intermediate code optimization methods usually use the method of matching and deleting redundant instructions. The intermediate representation rule replacement for special instruction matching was focused on, and an intermediate code optimization method for binary translation based on intermediate representation rule replacement was proposed. This method described the corresponding intermediate representation replacement rules for several typical scenarios of intermediate code expansion, and the register direct mapping strategy used in the back-end code optimization was applied here. By establishing mapping formula, the memory virtual operation was replaced by local register operation, thus reducing the expansion degree of intermediate code. The SPEC CPU2006 test suite was used to carry out the experimental, and the experimental results verify the correctness and effectiveness of this optimization method. The results before and after optimization are consistent, which verifies the correctness of the optimization method, meanwhile, the average reduction rate of intermediate code for each case after optimization is 32.59%, which verifies the effectiveness of the optimization method.]]></description>
<pubDate>2021/7/20 17:26:15</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[LI Nan, PANG Jianmin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LI Nan, PANG Jianmin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202104019]]></guid><cfi:id>20</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Modeling framework for intelligent unmanned swarm operation simulation under OODA-L pattern]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202104020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The related concept of intelligent unmanned swarm operation was introduced. In order to reflect the autonomous capability and adaptive capability of intelligent unmanned simulation entity, the OODA-L (observe, orient, decide, act and learning) pattern was proposed to make the learning process explicit, and was further extended to Co-OODA-L pattern. In the general description of the intelligent unmanned simulation entity, Markov decision process was adopted to carry out the mathematical abstraction, and a three-domain hierarchical structure of intelligent unmanned Agent was proposed. In order to embody the characteristics of autonomous cooperation and distribution of intelligent unmanned swarm operation, an architecture for cooperative operation modeling of swarm was proposed, which uses an artificial neural network to integrate a variable number of intelligent unmanned Agents into a homogeneous or heterogeneous swarm.]]></description>
<pubDate>2021/7/20 17:26:15</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[ZOU Liyan, ZHANG Mingzhi, BAI Junru]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZOU Liyan, ZHANG Mingzhi, BAI Junru</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202104020]]></guid><cfi:id>19</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Review on the memristor based neuromorphic chips]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301001]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to master the current development status and development trends of memristor based neuromorphic chips, the existing memristor based neuromorphic chips and architectures were investigated. The memristor array structure and integration process, anterior and posterior neuron circuits, multi-array interconnection topology and data transmission strategy used in the chip, as well as the system simulation and evaluation methods used in the chip design process were compared and analyzed. It is concluded that the current circuit design of memristor based neuromorphic chips still need to solve the problems of limited resistance states, large device parameter fluctuation, complex array peripheral circuits, small integration scale, etc. It is pointed out that the actual application of this type of chip still faces challenges such as the improvement of memristor production process, improvement of development tool support, special instruction set development, and determination of typical traction applications.]]></description>
<pubDate>2023/1/16 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[CHEN Changlin, LUO Changhang, LIU Sen, LIU Haijun]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CHEN Changlin, LUO Changhang, LIU Sen, LIU Haijun</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301001]]></guid><cfi:id>18</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Enhanced hierarchy directed graph method for fault diagnosis of large-scale satellite ground station]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301002]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[To solve shortcomings of traditional hierarchy directed graph method when applied to satellite ground station fault diagnosis, the EHDG (enhanced hierarchy directed graph) fault diagnosis method was proposed. In process of modeling, considering large number of fault symptoms and complex modeling, nodes of the same kind were consolidated according to the fault propagation paths of devices working status to reduce the scale of the model. Furthermore, the node effectiveness enabling function was introduced into the model to overcome the problem of remodeling in the traditional hierarchy directed graph model when the system structure was changed caused by the active/standby switching of device. In process of fault diagnosis reasoning, the search space of fault source was reduced by the combination of backtracking and forward reasoning method. The fault probability was calculated with the number of search hits of the nodes in order to enhance the efficiency. Fault diagnosis method in single fault and multiple faults scenarios of BeiDou radio determination satellite service ground station system was verified, and the results demonstrate that the EHDG method improves the accuracy and comprehensiveness in fault diagnosis.]]></description>
<pubDate>2023/1/16 9:46:30</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[LI Jingyuan, ZHOU Rong, LIU Zengjun, SUN Guangfu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LI Jingyuan, ZHOU Rong, LIU Zengjun, SUN Guangfu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301002]]></guid><cfi:id>17</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Forward main lobe jamming adaptive suppression method for OFDM-MIMO radar]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301003]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Because of the high correlation between the forward jamming and the radar transmitting waveform, it is easy to cause serious jamming to the radar after being received by the radar main lobe. In order to solve the main lobe interference problem, the forward interference signal model of OFDM-MIMO (orthogonal frequency division multiplexing-multiple input multiple output) radar main lobe was established, and the interference mechanism of OFDM-MIMO radar was analyzed. At the same time, based on the adaptive method processing theory, the analytical formula of OFDM-MIMO radar adaptive processing weight vector was derived, and an OFDM-MIMO radar forward main lobe interference adaptive suppression method based on range-dependent beam was proposed. Theoretical research and simulation results show that the proposed method can improve the output signal to interference plus noise ratio and effectively suppress the forward main lobe interference.]]></description>
<pubDate>2023/1/16 9:46:30</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[XIONG Zhimin, WANG Dangwei, LI Xinghui]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>XIONG Zhimin, WANG Dangwei, LI Xinghui</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301003]]></guid><cfi:id>16</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Multi-channel power distribution for anti-jamming based on asymmetric Colonel Blotto game]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301004]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Aiming at the multi-channel power allocation problem of the communication system with a fix transmitting rate, which is undergoing intelligent jamming attack, an asymmetric Colonel Blotto game model was proposed. Under the condition of complete information, the equivalent optimal power allocation strategies at a single channel were deduced for the communication system and the jammer. Moreover, the only mixed Nash equilibrium strategy of them was proved, and the Nash equilibrium benefit was acquired. Based on the equivalent optimal power allocation strategies at a single channel, a direct column element exchange algorithm by multiple scanning was proposed to construct the multi-channel mixed power distribution matrix, which could adapt to more channels and wider power distribution range than the linear programming method. Through numerical simulation, the effectiveness of the multi-channel mixed power allocation matrix construction algorithm and the optimality of the proposed power allocation strategies were verified.]]></description>
<pubDate>2023/1/16 9:46:30</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[WEI Peng, WANG Shilian, LU Ruimin, LUO Junshan]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WEI Peng, WANG Shilian, LU Ruimin, LUO Junshan</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301004]]></guid><cfi:id>15</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Spectrum spread and compression shift-frequency jamming suppression by combining generalized S transform and threshold segmentation]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301005]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[According to the time-frequency distribution difference between SSC(spectrum spread and compression) shift-frequency jamming and echo, a jamming suppression method based on generalized S transform and Tsallis cross entropy threshold segmentation was proposed. The jamming principle of SSC shift-frequency jamming was analyzed and the jamming signal model after dechirp processing was constructed . And the generalized S transform, which is of good time-frequency concentration performance, was utilized to acquire the time-frequency image of received signals after dechirp processing. Based on the related gray-scale image of time-frequency image, the minimum Tsallis cross entropy was utilized to obtain the optimal segmentation threshold and the time-frequency filter was constructed according to the segmentation threshold to suppress jamming. The simulation results show that the proposed method is of good jamming suppression performance to the false targets produced by SSC shift-frequency jamming and the jamming suppression ratio can reach more than 30 dB.]]></description>
<pubDate>2023/1/16 9:46:30</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[LI Xin, LUO Fuyou, YUAN Tian]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LI Xin, LUO Fuyou, YUAN Tian</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301005]]></guid><cfi:id>14</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Optimizing parallel matrix transpose algorithm on multi-core digital signal processors]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301006]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Matrix transpose is one of the common matrix operations, which is widely employed in various fields such as signal processing, scientific computing, and deep learning. With the popularization of Phytium heterogeneous multi-core DSPs(digital signal processors) developed by National University of Defense Technology, there is a strong demand for high-performance matrix transpose implementations for Phytium multi-core DSPs. Based on the architecture of multi-core DSPs and the characteristic of matrix transpose operations, a parallel matrix transpose algorithm (called ftmMT) for matrices with different element bit widths (8 B, 4 B, and 2 B) was proposed. In ftmMT, the main optimizations include vectorization based on vector Load/Store functions, core-level parallelization based on matrix blocking, and overlapping between vectorization and memory access through implicit ping-pong methods. The experimental results show that ftmMT can significantly improve the performance of matrix transpose operations, and achieve a speedup of up to 8.99 times in comparison with the open-source transpose library HPTT running on CPU.]]></description>
<pubDate>2023/1/16 9:46:30</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[PEI Xiangdong, WANG Qinglin, LIAO Linyu, LI Rongchun, MEI Songzhu, LIU Jie, PANG Zhengbin]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>PEI Xiangdong, WANG Qinglin, LIAO Linyu, LI Rongchun, MEI Songzhu, LIU Jie, PANG Zhengbin</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301006]]></guid><cfi:id>13</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[System design and verification of rotating-magnet based mechanical low-frequency antenna]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301007]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to achieve the miniaturization and low power consumption of the low-frequency electromagnetic transmitter, a system design and performance verification method based on multi-physics coupling simulation was proposed for the theoretical research and technical practice of RMBMA(rotating-magnet based mechanical antennas). A RMBMA system scheme including a permanent magnet source, a high-efficiency drive motor and its controller was designed. By developing an experimental prototype, the system performance and near magnetic field characteristics were tested experimentally, and the feasibility and effectiveness of the proposed design method and system scheme were verified. Results show that the main indexes of the prototype, such as magnetic field intensity and size, meet the requirements of the penetrating radio frequency technical area in the AMEBA(a mechanically based antenna) project of the United States, which provides a feasible idea for the scheme research and prototype design of RMBMA.]]></description>
<pubDate>2023/1/16 9:46:30</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[HAO Zhenyang, WANG Yuxuan, ZHOU Qiang, LI Xue, ZHANG Qiyao, SHI Wei]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>HAO Zhenyang, WANG Yuxuan, ZHOU Qiang, LI Xue, ZHANG Qiyao, SHI Wei</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301007]]></guid><cfi:id>12</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Fast and accurate detection of infrared dim small target in low altitude complex scenes]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301008]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Aiming at the high difficulty and high false alarm rate of infrared dim small moving target detection in low altitude and complex scenes, a precise detection method based on full convolution network and a low-latency parallel processing method based on FPGA (field programmable gate array) were proposed to meet the real-time processing application requirements of high frame rate images in the detection system. A lightweight full convolutional network was used to detect dim small targets in spatial domain, and time domain trajectory correlation on suspected targets in adjacent frames was performed to further reduce false alarms. The experimental results show that the detection rate and false alarm rate are significantly improved compared with the five traditional methods. And the real-time processing of 100 Hz image is completed on a single FPGA with the processing delay less than 1.8 ms. This method realizes high-precision, high-robust and fast real-time detection of dim small targets in complex low altitude scene.]]></description>
<pubDate>2023/1/16 9:46:30</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[ZHOU Hai, LI Baoquan, WANG Huaichao, BIAN Chunjiang]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHOU Hai, LI Baoquan, WANG Huaichao, BIAN Chunjiang</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301008]]></guid><cfi:id>11</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Evaluating matrix multiplication-based convolution algorithm on multi-core digital signal processors]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301009]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The matrix multiplication-based convolutional algorithm, which can efficiently implement convolutions with different parameters, is the first choice of convolution performance optimization for a given chip. Based on the architecture of Phytium heterogeneous multi-core DSPs(digital signal processors) developed by National University of Defense Technology and the characteristic of the matrix multiplication-based convolutional algorithm, a parallel implementation of the matrix multiplication-based convolutional algorithm (called ftmEConv) for different convolutions on multi-core DSPs was proposed. The ftmEConv consists of four parallelized parts(input feature maps transformation, filter transformation, matrix multiplication, and output feature maps transformation), all of which were optimized for multi-core DSPs, and the performance of each part was improved by effectively exploiting the potential of all functional units in DSP cores. The experimental results demonstrate that ftmEConv achieves computational efficiency of up to 42.90%. Compared with other implementations of the matrix multiplication-based convolutional algorithm on heterogeneous chips, ftmEConv gets a speedup of up to 7.79 times.]]></description>
<pubDate>2023/1/16 9:46:30</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[WANG Qinglin, PEI Xiangdong, LIAO Linyu, WANG Haoxu, LI Rongchun, MEI Songzhu, LI Dongsheng]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Qinglin, PEI Xiangdong, LIAO Linyu, WANG Haoxu, LI Rongchun, MEI Songzhu, LI Dongsheng</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202301009]]></guid><cfi:id>10</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Group false-target jamming method with stable position against linear frequency modulation radars]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250518]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to generate multiple false targets and interfere the advanced chirp rate agile LFM( linear frequency modulation) radars, a group false-target jamming method with stable position, based on intermittent sampling repeater jamming and bidirectional shift-frequency modulation, was proposed. The intermittent sampling frequency and frequency shift modulation were obtained by mixing the radar signal with two time-delay signals at the same time. The interference signal was obtained by intermittent sampling and repeating processing and bidirectional frequency shift modulation processing in sequence. Theoretical analysis and simulation experiments show that the position of the false target group generated by this jamming method is constant for advanced LFM radar systems such as frequency modulation slope agility. The proposed method is conducive to forming good interference effects during pulse accumulation. Meanwhile, compared with the intermittent sampling repeater jamming or the shift-frequency jamming, the range of group false targets via the proposed method is more wider, which is valuable in practical engineering applications.]]></description>
<pubDate>2025/10/8 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[PAN Xiaoyi, FENG Xuewen, ZHOU Li, CHENG Yang, CHEN Jiyuan, MENG Xiaoming]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>PAN Xiaoyi, FENG Xuewen, ZHOU Li, CHENG Yang, CHEN Jiyuan, MENG Xiaoming</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250518]]></guid><cfi:id>9</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Detecting domain-specific social events via temporal evolution feature mining]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250519]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In view of the insufficient mining of implicit associative relationships and the problem of neglecting the temporal evolution factor, a domain-specific social event detection method via temporal evolution feature mining was proposed. The data was sliced by time and an entity interaction graph was constructed by considering the impact of duplicate event records from different sources on detection, in order to reduce the influence of database errors. Multi-relational graph convolutional network was improved, and the graph structure information of historical evolution sequence was updated by interaction relationships. Attention mechanism was used to learn core features to obtain global embedding of sequence units. Implicit association was mined sufficiently. Based on recurrent neural network, temporal evolution features were extracted to obtain the global embedding and the temporal evolution factor was mined effectively. Experiment results show that the proposed method can be applied to domain-specific social event detection task, which is better than existing methods.]]></description>
<pubDate>2025/10/8 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[ZHAO Dongxu, ZHANG Xin, PAN Yan, DUAN Jiashun]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHAO Dongxu, ZHANG Xin, PAN Yan, DUAN Jiashun</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250519]]></guid><cfi:id>8</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Reinforcement learning method via meta-learning the exploring latent variable]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250520]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Aiming at the issues of low utilization of interaction data or the need for additional task data in traditional agent exploration work, an online-learnable exploration latent variable that characterizes the current task features to assist the policy network in behavioral decision-making was innovatively introduced. There was no need for additional multi-task data or additional environmental interaction steps in the current task. The exploring latent variable was updated in the learnable environment model, and the environment model underwent supervised updates based on the intelligent agent and real environment interaction data. The exploration in advance in the simulated environment model was assisted by the exploring latent variable, and thus the performance of agents in the real environment was improved. The performance in typical continuous control tasks was raised by about 30% in the experiments, which was of guiding significance for the single-task exploration and meta reinforcement learning research.]]></description>
<pubDate>2025/10/8 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[LI Yiying, ZHOU Wei]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LI Yiying, ZHOU Wei</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250520]]></guid><cfi:id>7</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Designing online anti-jamming strategy for agile frequency radar via Thompson sampling]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250521]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In the context of dynamic countermeasures between radar and active jammer, the working frequency of radar and adversarial jammer were modeled as the combat action space based on the multi-arm bandit model in online learning theory. By exploring the uncertainty of the jamming environment state through multiple-round pulse transmission, a frequency channel jamming recognizer based on a convolutional neural network was constructed to obtain the posterior probability estimation of the belief state of each frequency channel. Then the Thompson sampling algorithm efficiently solved the built multi-arm bandit model, achieving a balance between exploration and exploitation. Simulation results show that compared with random frequency agility and deep reinforcement learning algorithms, the method had higher convergence performance and was more adaptable to dynamic fast-changing jamming environments, which can give full potential to the antagonism advantage of radar active waveform transmission.]]></description>
<pubDate>2025/10/8 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[WU Zhenhua, QIAN Jun, ZHANG Lei, CHEN Lili, ZHU Ning, YANG Lixia]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WU Zhenhua, QIAN Jun, ZHANG Lei, CHEN Lili, ZHU Ning, YANG Lixia</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250521]]></guid><cfi:id>6</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Extraction of dynamic electrical parameters of electromagnetic rail launcher by equivalent frequency method]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250522]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to establish a more accurate dynamic launch calculation model of the electromagnetic rail launcher, the equivalent frequency was introduced according to the current diffusion equation to simulate the change of skinning depth during the armature launching process, so as to calculate the motion process of the armature equivalently by using the results of the static simulation of the armature. A parameter extraction method was proposed, in which the corresponding relationship between electrical parameters and frequency was extracted by finite element simulation, and then the corresponding equivalent frequency was obtained by calculating the skin depth of the current in the launch process by the micro-element method. The equivalent frequency was combined with the above finite element simulation-results to calculate the dynamic electrical parameters of the system.The method is used in the whole system simulation, and the error between simulation and experiment is within 1%, which proves the effectiveness of the method.]]></description>
<pubDate>2025/10/8 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[LI Xinhang, ZHAI Xiaofei, LIU Hua, LIU Jinli]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LI Xinhang, ZHAI Xiaofei, LIU Hua, LIU Jinli</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250522]]></guid><cfi:id>5</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Prior distribution determination method for maintainability multi-source conflict evidence data fusion]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250523]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[To make full use of maintainability multi-source prior data and improve the fusion accuracy of prior distributions to ensure the accuracy of maintainability verification results, a prior distribution determination method for maintainability multi-source conflict evidence data fusion was proposed to solve the problem of conflicts in multi-source data. Fully mining and extracting the feature information of multi-source data, constructing evidence mass function based on sample size, distribution characteristics and data importance respectively, comprehensively considering the correlation between evidence and the uncertainty of evidence itself, introducing angle cosine to measure the degree of conflict between evidence. By combining the support degree and uncertainty of the evidence, the multi-source conflict evidence data fusion model was established to achieve the effective fusion of multi-source data and determine the comprehensive prior distribution. Combined with the analysis of two cases, the proposed method is proved to be effective and feasible.]]></description>
<pubDate>2025/10/8 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[ZHOU Cheng, XU Da, CAO Zhendi]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHOU Cheng, XU Da, CAO Zhendi</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250523]]></guid><cfi:id>4</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Bevel gear dynamic modeling and fault response analysis of helicopter main reducer]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250524]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The dynamic characteristics of the helicopter main reducer bevel gear have a direct influence on the operating performance of the helicopter transmission system. Taking into account factors such as transmission error and backlash, a nonlinear damage dynamic model of a bevel gear system with bending-torsion-axial coupling was established by using the lumped-parameter method. In order to obtain the key parameter in the damage dynamics model, a slicing method for calculating the time-varying meshing stiffness of spur bevel gear pair was proposed, which broke through the limitations of traditional potential energy method that can only be applied to cylindrical gear pair and can achieve rapid evaluation of time-varying meshing stiffness under different states. By comparing the model simulation and experimental results, it is shown that the established model can effectively simulate the dynamic response characteristics of the bevel gear system under normal and fault conditions, reveal the system fault response mechanism and fault mechanism, and provide theoretical basis and data support for the development of a helicopter transmission system health and usage monitoring system.]]></description>
<pubDate>2025/10/8 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[ZHANG Lun, HU Jiao, YANG Yi]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Lun, HU Jiao, YANG Yi</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250524]]></guid><cfi:id>3</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Intelligent solution method integrating diverse physics loss functions for solving partial differential equations]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250525]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Building upon the traditional PINN(physics-informed neural network), two improved methods for solving partial differential equations, EmPINN(expanding physics-informed neural network with modified multi-layer perceptron) and DL-PINN(diverse loss function physics-informed neural network), were presented by incorporating dimension expansion and diverse physics loss functions. EmPINN innovatively introduced a neural network structure with residual connections and a dimension-expanding mechanism. DL-PINN, based on EmPINN, combined the dimension-expanding mechanism with gradient enhancement and variational physical information to incorporate multiple physical information more effectively and improved the fitting capability of the neural network. Experimental results demonstrate that the proposed methods outperform traditional PINN method, improve solution accuracy by up to two orders of magnitude on different partial differential equation cases.]]></description>
<pubDate>2025/10/8 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[REN Ruixuan, LI Tiejun, JIN Changsong, CHEN Xinhai]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>REN Ruixuan, LI Tiejun, JIN Changsong, CHEN Xinhai</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250525]]></guid><cfi:id>2</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Combinatorial optimization methods for emergency material scheduling considering disruption risk]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250526]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Aiming at the problem that the supply of emergency material distribution depots might be disrupted after a disaster, the post-disaster emergency material supply considering the disruption risk of distribution depots was studied. In pursuit of globally optimal solutions, decisions including location selection of distribution depots, the assignments of material demands to distribution depots, and the supply sequencing at each distribution depot were integrated into a combinatorial scheduling-location problem. A scenario-based mixed-integer linear programming model was formulated with the objective function of minimizing the expected makespan of the supply task. A matheuristic algorithm based on predetermined ordering and kernel search was proposed to solve the problem efficiently. A numerical experiment is conducted and the result shows that the proposed algorithm is significantly effective and can provide precise, quantitative, and globally optimal scheduling plans for a task with up to 200 disaster-affected areas and 5 distribution depots within reasonable computation time.]]></description>
<pubDate>2025/10/8 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术]]></category>
<author><![CDATA[ZHANG Chuang, LI Yantong, YAN Qian, GENG Jingyi, LIANG Jingrui]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Chuang, LI Yantong, YAN Qian, GENG Jingyi, LIANG Jingrui</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/20250526]]></guid><cfi:id>1</cfi:id><cfi:read>true</cfi:read></item>
</channel>
</rss>