<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005">
<channel xmlns:cfi="http://www.microsoft.com/schemas/rss/core/2005/internal" cfi:lastdownloaderror="None">
<title cf:type="text"><![CDATA[Editorial department of the Journal of National University of Defense Technology -->信息与通信工程·计算机科学与技术·管理科学与工程]]></title>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Radar signal sorting algorithm for DSets-DBSCAN without parameter clustering]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204017]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[For the problem of the performance of many existing efficient sorting algorithms depends heavily on the parameters from external input, such as clustering number and clustering tolerance, the parameterless clustering algorithm DSets-DBSCAN was applied to the radar signal sorting, and a parameterless radar signal pulse clustering algorithm was presented. The proposed algorithm could automatically cluster without relying on any parameter settings. Firstly, the algorithm input was the pairwise similarity matrix processed by histogram equalization, which made the Dsets(dominant sets) algorithm independent of any parameters. Then, the input parameters of DBSCAN were given adaptively according to the obtained ultra-small cluster. Finally, the cluster was extended by DBSCAN. Simulation results show that the proposed method is effective in sorting radar pulse descriptors without parameters. And the clustering accuracy of radar signals is higher than 97.56% in the case of the false pulse ratio (false pulse/radar pulse) is lower than 80%.]]></description>
<pubDate>2022/7/20 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[LIU Lutao, WANG Lulu, LI Pin, CHEN Tao]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LIU Lutao, WANG Lulu, LI Pin, CHEN Tao</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204017]]></guid><cfi:id>16</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Dynamics characteristics of active angle deception decoys]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204018]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Aiming at the active angle deception decoys that may appear in the process of high-altitude and high-speed target detection, a comprehensive and theoretical analysis of the dynamics characteristics was presented, the dynamics equation of active decoy was derived, and the conservation of mechanical energy and moment of momentum of the decoy were analyzed. Theoretical analysis and simulation experiments show that the dynamic characteristics of the azimuth active decoy with fixed angle deception are completely consistent with the real target, and it is impossible to distinguish the true from the false in dynamics. In addition, other angle deception active false targets do not meet the elliptic orbit characteristics of high-altitude high-speed targets and the law of conservation of dynamics. This difference can be used to identify the false targets in the data processing layer.]]></description>
<pubDate>2022/7/20 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[GU Zhaoyu, RAO Bin, WANG Guoyu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>GU Zhaoyu, RAO Bin, WANG Guoyu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204018]]></guid><cfi:id>15</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Truth discovery method for multi-source text data]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204019]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to solve the problem that the traditional truth discovery algorithm cannot be applied to text data directly, a truth discovery algorithm(NN_Truth) for text data based on deep neural network was proposed. For the features of multifactorial property of text answers, the diversity of word usages, and the sparsity of the text data, the “source-answer” vector was used as the network input, and the truth vector was recognized as the network output. The relationship between answers from each source could be unsupervised learned according to general hypothesis of truth discovery, and finally obtained the truth. The experiment results show that the proposed algorithm is suitable for text data truth discovery, and it is better than the retrieval methods and traditional truth discovery algorithm.]]></description>
<pubDate>2022/7/20 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[CAO Jianjun, CHANG Chen, TAO Jiaqing, WENG Nianfeng, JIANG Guoquan]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CAO Jianjun, CHANG Chen, TAO Jiaqing, WENG Nianfeng, JIANG Guoquan</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204019]]></guid><cfi:id>14</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[High-efficiency IQ convolutional network structure for radio frequency fingerprint identification]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Existing convolutional neural networks, which are used for radio frequency fingerprints recognition, process time-sequenced IQ (in-phase and quadrature) signals as images directly, resulting in low recognition accuracy and high computation complexity. IQCNet(convolutional neural network structure based on IQ correlation features), an efficient convolutional network structure, was proposed. IQCNet firstly extracted IQ correlation features and time domain features, then obtained the average value of each channel features through adaptive average pooling, and finally used only one fully connected layer for classification. Experimental results under a variety of channel conditions show that IQCNet improves recognition accuracy greatly with lower computation complexity compared with traditional convolutional neural networks.]]></description>
<pubDate>2022/7/20 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[CUI Tianshu, HUANG Yonghui, SHEN Ming, ZHANG Ye, CUI Kai, ZHAO Wenjie, AN Junshe]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CUI Tianshu, HUANG Yonghui, SHEN Ming, ZHANG Ye, CUI Kai, ZHAO Wenjie, AN Junshe</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204020]]></guid><cfi:id>13</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Long-term coherent integration method for low-altitude small targets of LFMCW radar]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204021]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Aimed at the problem of weak radar echo of small unmanned aerial vehicle targets and difficult target detection. Long-term coherent integration method under the LFMCW(linear frequency modulation continuous wave) radar was studied. By deriving the expression of LFMCW radar echo, an Radon-Fourier transform implementation method based on Chirp-Z transform of time-domain beat signal was proposed. The computational complexity of this method was evaluated and compared with the method implemented in frequency domain. Simulation and measured data verified the effectiveness of this algorithm for the coherent integration of weak targets under LFMCW radar.]]></description>
<pubDate>2022/7/20 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[GUO Limin, MO Yuhan, LIU Lutao, GUO Xiaoran]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>GUO Limin, MO Yuhan, LIU Lutao, GUO Xiaoran</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204021]]></guid><cfi:id>12</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Energy efficiency analysis of relay-assisted CR-NOMA system using SWIPT technology]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204022]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In view of the shortcomings of limited terminal battery capacity and low energy efficiency in the existing research on CR-NOMA (cognitive radio non-orthogonal multiple access) networks, a relay was used to assist users in transmission, and a method of simultaneous transmission of wireless information and energy was introduced. Under the constraints of user service quality and minimum energy capture, the sub-user transmission energy efficiency expression was derived. The non-convex objective function was transformed into three convex single-objective problems of optimizing relay transmission power, relay power allocation and receiver power allocation by fractional programming method. Using function monotonicity, golden section algorithm, Lagrangian dual algorithm and multi-objective joint optimization algorithm for optimization, the global optimal solution was obtained to maximize the transmission energy efficiency of the secondary user system. The complexity of the adopted algorithm was analyzed.The simulation results show that compared with the traditional OMA (orthogonal multiple access) scheme, while the system spectrum utilization was improved, the sub-user transmission energy efficiency has been improved by 47%.]]></description>
<pubDate>2022/7/20 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[MIAO Fengman, ZHANG Haijun, LIN Ying, XUE Jianbin, ZHANG Yonggang]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>MIAO Fengman, ZHANG Haijun, LIN Ying, XUE Jianbin, ZHANG Yonggang</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204022]]></guid><cfi:id>11</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[AHP-Arena comprehensive evaluation method for the efficiency of allocation of UAV flight training resources]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204023]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to reduce the subjective one-sided influence of empowerment process of the traditional hierarchical analysis method, a comprehensive AHP(analytic hierarchy process) and Arena simulation modeling technology was proposed to evaluate the efficiency of the allocation of UAV(unmanned aerial vehicle) training resources. Based on flight training process analysis, the factors influencing the efficiency of training resource allocation and efficiency evaluation index were determined, a hierarchical comprehensive evaluation system was established, and the comprehensive evaluation steps of AHP-Arena were summarized. Arena modeling software was used to realize the dynamic simulation system of the training process and verify the validity, the single-variable numerical simulation method and the mean variance decision-making method were used to complete the objective empowerment of the influencing factors, and the comprehensive evaluation coefficient was obtained by linear weighting comprehensive method, so as to implement resource allocation efficiency evaluation and selection of the optimal program.The practical application shows the effectiveness of the method. Meanwhile, this method can be extended to other similar training processes, and can also provide references for other multi-factor multi-indicator evaluation decision-making processes.]]></description>
<pubDate>2022/7/20 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[ZHANG Yao, WANG Jiannan]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Yao, WANG Jiannan</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204023]]></guid><cfi:id>10</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Real-time evaluation method of the progress of social work using open-source big data]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204024]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Few quantitative models can be found amenable to the quantitative evaluation of social work, which motivates the presented work. Moreover, a few related existing works suffer from no suitable indicator system and high expenses of time and money. To overcome these limitations, a real-time quantitative evaluation model using the Internet open-source big data was developed, a target indicator system was established, the rapid computation methods of each criterion were proposed, and a prototypical software system was designed and implemented. Case studies on selected social work were conducted, and the work performance of the 14 cities belonging to a certain province in China was evaluated. Results achieved were largely consistent with the subjective feelings of many respondents and relevant official assessment, which validated the efficiency and rationality of the proposed model.]]></description>
<pubDate>2022/7/20 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[ZHANG Xin, OU Wenxiao, WANG Yinsen, PAN Yan, YIN Fengjing]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Xin, OU Wenxiao, WANG Yinsen, PAN Yan, YIN Fengjing</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202204024]]></guid><cfi:id>9</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Game model for detecting cross-layer attacks in wireless ad hoc networks]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201017]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Compared with single-layer attacks, cross-layer attacks in wireless ad hoc networks can better conceal attack behavior, achieve better attack effects, or reduce the cost of attack. In order to detect cross-layer attacks in wireless ad hoc networks, a detection model based on game theory was proposed. As the attack will inevitably affect the parameters of each protocol layer, the corresponding strategy matrix and payoff matrix was built from the aspect of attack-defense game of protocol layer, and the mixed strategy Nash equilibrium solution was obtained by equilibrium analysis. Simulation experiments results show that the detection system adopting mixed strategy can achieve a better detection performance and save the energy consumption significantly, compared with the traditional detection system.]]></description>
<pubDate>2022/1/19 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[WANG Jian, LIU Xingtong, JIANG Shuai]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>WANG Jian, LIU Xingtong, JIANG Shuai</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201017]]></guid><cfi:id>8</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Cross-modality person re-identification algorithm using symmetric network]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201018]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[For the difference between modalities, a cross-modality person re-identification algorithm which based on symmetric network was proposed. The network combined the modal confusion based on probability distribution with adversarial learning, and generated modal-invariant features through symmetric network to achieve modal confusion. To deal with appearance differences and intra-modality differences, the network constructed a mixed-triplet loss using convolution features of different hidden layers, which can improve the characterization capability of the network. Numerous experimental results on the RegDB and SYSU-MM01 datasets demonstrate the effectiveness of the method.]]></description>
<pubDate>2022/1/19 9:20:44</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[ZHANG Yan, XIANG Xu, TANG Jun, WANG Nian, QU Lei]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>ZHANG Yan, XIANG Xu, TANG Jun, WANG Nian, QU Lei</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201018]]></guid><cfi:id>7</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Voronoi diagram generation algorithm and application for large-scale interactive data space partition]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201019]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[When the traditional Voronoi diagram divides a large number of point sets into Voronoi, there are too many Voronoi cells, which makes it difficult to apply to such fields as geographic information systems and biomedicine. In order to solve this problem, a Voronoi diagram based on adaptive DBSCAN (density-based spatial clustering of applications with noise) was proposed. The phenomenon of Voronoi unit merge was explained. The necessary and sufficient conditions for its occurrence were proved. The algorithm for generating the Voronoi diagram was proposed and simulated. In order to verify its effectiveness, the algorithm was applied to neutrophils under the microscope and fire point data on the surface of China. The results show that the algorithm can effectively solve the problem that Voronoi diagram is too meticulous when the point set size is large, which breaks through the single point to single point division form of the traditional Voronoi diagram. In addition,the algorithm broadens the application of Voronoi diagrams in the fields of graphic image processing,biomedicine and geographic information systems.]]></description>
<pubDate>2022/1/19 9:20:44</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[XIONG Pengwen, ZHOU Xiaoyun, XIONG Hongjin, ZHANG Tingting]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>XIONG Pengwen, ZHOU Xiaoyun, XIONG Hongjin, ZHANG Tingting</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201019]]></guid><cfi:id>6</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Inter-satellite communication routing algorithm of smart-satellites-swarm using dynamic programming]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201020]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[The network of SSS (smart-satellites-swarm) was modelled in order to transfer the ICRPS (inter-satellite communication routing problem of SSS) into the least-delay path problem. And the ICRAS was developed to solve this problem. ICRAS used dynamic programming method to program the inter-satellite communication routing between two members of a SSS in multiple phases. The smart satellite which need transmit data adopted a static programming algorithm for inter-satellite communication routing to find its successor satellite during each programming phase. ICRAS was able to cope with the problem that data had to be delivered in pieces since the propagation capability of an inter-satellite link was restricted. A large quantity of simulation experiments were designed and conducted to examine and analyze the performances of ICRAS when different SSS utilized ICRAS to program inter-satellite communication routings.]]></description>
<pubDate>2022/1/19 9:20:44</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[LUN Weicheng, LI Qun, YU Qinzhang, ZHANG Can]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LUN Weicheng, LI Qun, YU Qinzhang, ZHANG Can</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201020]]></guid><cfi:id>5</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Remote sensing multi-modal image matching algorithm based onmulti-scale PCA-HOG]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201021]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[To solve the problem of non-linear gray level distortion and strong noise interference in remote sensing multi-modal image matching, a remote sensing multi-modal image matching algorithm based on PCA (principal components analysis) and HOG (histogram of oriented gradients) was proposed. This algorithm uses HOG to extract the common features of geometric structure between images, which can effectively overcome the problem of nonlinear grayscale distortion of multi-modal images. Besides, a fast multi-scale PCA algorithm was proposed to enhance the local gradient direction in HOG, so that it can accurately extract the structural features of the image under the condition of strong noise interference. In order to improve the calculation speed of the algorithm, the integrated image method was used to reduce the computational complexity of the feature extraction process, and the fast Fourier transform was used to achieve a highly efficient matching search. The experiment used a variety of remote sensing multi-modal images (including visible light images, synthetic aperture radar images, and infrared images) to verify the matching algorithm. The results show that, compared with existing algorithms, the proposed algorithm significantly improves the matching performance.]]></description>
<pubDate>2022/1/19 9:20:44</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[HAN Songlai, WANG Yujie, WANG Xing, LUO Shibin, DONG Jing]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>HAN Songlai, WANG Yujie, WANG Xing, LUO Shibin, DONG Jing</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201021]]></guid><cfi:id>4</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Failure-Oblivious routing strategy in airborne network for aeronautic swarm]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201022]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[Airborne network for aeronautic swarm is the information interaction bond between swarm members, whose routing strategy directly affects the real-time performance and reliability of information transmission, and then affects the combat effectiveness of networked swarm. Considering that there are many uncertainties in airborne network for aeronautic swarm, in response to the risk of route failure and avoid routing updates, a Failure-Oblivious routing method from the perspective of routing algorithm was proposed under software-defined network architecture. Unlike traditional routing strategies, this method can deal with routing failure problem without the burden of predicting routing failure by using random multipath routing algorithms. Theoretical derivation and simulation verification show that this routing method can reduce the risk of route failure in airborne network for aeronautic swarm, thus guaranteeing that communication delay cost is under control.]]></description>
<pubDate>2022/1/19 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[LYU Na, PAN Ying, ZHU Mengyuan, CHEN Kun, FANG Yu]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>LYU Na, PAN Ying, ZHU Mengyuan, CHEN Kun, FANG Yu</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201022]]></guid><cfi:id>3</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Text feature extraction based on sparse balanced variational autoencoder]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201023]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to solve the problems of low feature differentiation of high-dimensional data in text feature extraction, poor self-learning performance of rule-based representation learning, and excessive pruning of variational autoencoder, a text feature extraction model based on SBVAE (sparse balanced variational autoencoder) was proposed. In order to eliminate noise interference and improve robustness of the text feature extraction model, a bidirectional noise reduction mechanism was designed for variational autoencoder in the input layer of the text feature extraction. A sparse balance method combined with simulated annealing algorithm of weights of KL (Kullback-Leibler) terms was proposed to alleviate the effect of excessive pruning caused by KL divergence, and forced decoders to make full use of the latent variables. The model improves the discrimination of high-dimensional data features. Experiments were carried out in several aspects, including comparative analysis of text feature extraction model, sparse performance and influence of sparse balance on the lower bound of variation in hidden space. The results show that the proposed model has good performance. The highest accuracy of the proposed model of Fudan and Reuters datasets is increased by 12.36% and 8.06% in comparison with that of PCA, respectively.]]></description>
<pubDate>2022/1/19 0:00:00</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[CHE Lei]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>CHE Lei</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201023]]></guid><cfi:id>2</cfi:id><cfi:read>true</cfi:read></item>
<item>
<title xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="text"><![CDATA[Airspace configuration of cooperative detection of multiple early warning aircraft in air defense operations of key targets]]></title>
<link><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201024]]></link>
<description xmlns:cf="http://www.microsoft.com/schemas/rss/core/2005" cf:type="html"><![CDATA[In order to solve the problem of early warning aircraft′s airspace configuration in key target air defense operations, a model of multiple early warning aircraft′s array selection and optimal configuration of aircraft number is constructed. The specific tasks of the early warning aircraft′s air defense operations were determined by analyzing the division of early warning lines for the key targets, and the quantitative model of array selection was constructed. A quantitative model of airspace configuration for parallel and tandem routes of multiple early warning aircraft was proposed on the premise of ensuring its own safety and giving full play to the inherent detection power of early warning aircraft. The example operation results show that the model can compare and analyze the effects of key parameters from the cooperative detection of multiple early warning aircraft in airspace configuration, deployment forces and route pattern selection,which can provide theoretical basis for mission planning of early warning aircraft′s combat troops.]]></description>
<pubDate>2022/1/19 9:20:45</pubDate>
<category><![CDATA[信息与通信工程·计算机科学与技术·管理科学与工程]]></category>
<author><![CDATA[QI Wei, JIANG Wei, WU Wen, CHENG Dongsheng]]></author>
<atom:author xmlns:atom="http://www.w3.org/2005/Atom">
<atom:name>QI Wei, JIANG Wei, WU Wen, CHENG Dongsheng</atom:name>
</atom:author>
<guid><![CDATA[http://journal.nudt.edu.cn/gfkjdxxben/article/abstract/202201024]]></guid><cfi:id>1</cfi:id><cfi:read>true</cfi:read></item>
</channel>
</rss>