Most cited articles

  • Display Type:
  • Text List
  • Abstract List
  • 1  Comments on Multisensor Information Fusion
    Yu Wenxian Yong Shaowei Guo Guirong
    1994, 16(3):1-11.
    [Abstract](7184) [HTML](107) [PDF 744.14 K](7156) [Cited by](69)
    Abstract:
    Multisensor information fusion (MIF) has received a widespread attention and has been applied to a lot of research fields in recent years. Its theory and methods have become an important research area of intelligent information processing. In this paper,the basic principles of MIF are discussed. The system structures of MIF are studied from the viewpoints of information manifestation levels and function differentiation respectively. Then the concrete methods adopted in MIF and their applications are introduced and analysed hierarchically. Finally the existing crucial problems are pointed out and the research trends are also emphasized.
    2  An Overview of Typical Methods for Human Reliability Analysis
    XIE Hongwei SUN Zhiqiang LI Xinxin LI Zhengyi ZHANG Ming SHI Xiujian LI Long
    2007, 29(2):101-107.
    [Abstract](7255) [HTML](88) [PDF 291.76 K](6954) [Cited by](41)
    Abstract:
    Some typical methods for human reliability analysis are surveyed. Firstly, the definition of human reliability is discussed. Secondly, several typical methods are chosen from the first generation methods for comparison and review. Their basic characters and limitations are discussed. Thirdly, two typical methods of the second generation are analyzed in detail. The comparison between the above and the preceding methods is carried out while their advantages and drawbacks are presented. Finally, further research suggestion is proposed.
    3  A New Method of Measure the Pitching and Yaw of the Axes Symmetry Object through the Optical Image
    YU Qifeng SUN Xiangyi CHEN Guojun
    2000, 22(2):15-19.
    [Abstract](7341) [HTML](86) [PDF 185.86 K](6694) [Cited by](39)
    Abstract:
    A new method for measurement of the pitching angle and yaw angle of an axes-symmetric object through the optical images is presented, and the accuracy of the method is analyzed. This method is highly accurate because a large amount of information of the object image is used. The difficulty of object matching among several images is avoided since the object's axis is measured in an indirect way.
    4  Study on SINS Alignment Algorithm with InertialFrame for Swaying Bases
    LIAN Junxiang TANG Yonggang WU Meiping HU Xiaoping
    2007, 29(5):95-99.
    [Abstract](7169) [HTML](92) [PDF 449.37 K](6587) [Cited by](34)
    Abstract:
    A novel alignment method for swaying base, such as a sailing ship, is presented with the aid of a cascade of FIR filters and a transitional inertial frame. For the method, an investigation was made about the error characteristics, which shows that the alignment accuracy mainly depends upon the equivalent biases of gyroscopes in east direction and performance of FIR filter group, the aligning time rests with the orders of the FIR filter group, and the problem of large initial misalignment is resolved in theory. Results of experiments show that the proposed method converges much faster than the traditional methods at no cost of precision and also works well under any large initial misalignment.
    5  Electromagnetic launch technology
    MA Weiming LU Junyong
    2016, 38(6):1-5. DOI: 10.11887/j.cn.201606001
    [Abstract](20191) [HTML](105) [PDF 450.33 K](16269) [Cited by](34)
    Abstract:
    Electromagnetic launch technology is an inevitable trend among methods of launch in the future. The principle and technology characteristics of electromagnetic launch is analyzed, three branches of electromagnetic launch technology development overseas in electromagnetic ejection, electromagnetic railgun and electromagnetic pushing were studied, and the key technology of electromagnetic launch was summarized. Furthermore, the development strategy and the extension application prospect of electromagnetic launch technology was proposed.
    6  A Study on the Evaluation Technology of theAttack Effect of Computer Networks
    ZHANG Yirong XIAN Ming ZHAO Zhichao XIAO Shunping WANG Guoyu
    2002, 24(5):24-28.
    [Abstract](6934) [HTML](0) [PDF 259.51 K](6748) [Cited by](32)
    Abstract:
    The evaluation technology of the Attack Effect of computer networks is an important and challenging subject of security evaluation in information systems. Nowadays, corresponding theory is not mature and correlative research reports are few. In this paper several currently primary evaluation techniques of information security are concisely analyzed. Then three evaluation models, i.e., the evaluation technique based on network information entropy, the security evaluation framework based on analytical hierarchy and the synthetical evaluation technique based on analytical indexes, are presented in order to conveniently measure and estimate the attack effect. Finally, some problems which must be paid attention to in practice are pointed out.
    7  An Improved Fitting Algorithm Design of BroadcastEphemeris for GEO Satellite
    GAO Yudong XI Xiaoning WANG Wei
    2007, 29(5):18-22.
    [Abstract](7428) [HTML](89) [PDF 1.13 M](5583) [Cited by](31)
    Abstract:
    An improved fitting algorithm of Broadcast Ephemeris for GEO satellite with near-zero-inclination is introduced in the paper. The main idea of the algorithm requires the appropriate rotation of the coordinate reference plane to the position observations based on the general algorithm. Within the algorithm, in particularly, the corresponding coordinate transformation to the fitting initial value is proposed. According to the method, fitting problem in the correlation of orbital parameters can be resolved, and the convergence of iterations is quickly achieved. Meanwhile, the computation for the user receiver is simplified. The simulation results show that the Root-Mean-Square error reaches centimeter level and the fitting accuracy can be guaranteed, indicating the effectiveness of the method.
    8  Towards Technology of Virtual Prototyping in Weapon Systems
    Zhao Wen Wang Weiping Zhu Yifan Hu Xiaofeng
    1999, 21(1):58-61 ,57.
    [Abstract](6770) [HTML](83) [PDF 175.98 K](5867) [Cited by](29)
    Abstract:
    Virtual prototyping is a new kind of technology in products design, development, and assessment, which is based on lntegrated Products and Process Development. In this paper, the concept of virtual prototyping in weapon system is introduced, and the relationship between virtual prototyping and weapon equipment evaluation. Emphases are put on the main research contents and several critical techniques used in virtual prototyping environment. Finally, the perspective of virtual prototyping is given.
    9  OLDA-based method for online topic evolution  in network public opinion analysis
    HU Yanli BAI Liang ZHANG Weiming
    2012, 34(1):150-154.
    [Abstract](7460) [HTML](0) [PDF 424.20 K](6656) [Cited by](29)
    Abstract:
    The topic evolution was investigated for network public opinion analysis. The properties of network public opinion information were analyzed firstly. Based on the properties, the latent semantics of textual data for network public opinion was described by using the topic model, and the text streams are modeled with a consideration of time for online analysis. Furthermore, a topic evolution method based on OLDA was proposed by incorporating the correlation of topics among time slices. The proposed method was experimentally verified to be efficient for detecting topic evolution of network public opinion. 
    10  The Study of the Methods of the Linear Combination Weighting forMultiple Attribute Decision-making
    LIU Jingxu TAN Yuejin CAI Huaiping
    2005, 27(4):121-124.
    [Abstract](6453) [HTML](91) [PDF 419.87 K](6194) [Cited by](28)
    Abstract:
    The determination of weight vectors is the key problem for multiple attribute decision making. The linear combination weighting is an effective way to do it. The general description of the linear combination weighting problem is provided. Based on the information used to solve the problem, the solution methods are classified as four different classes. The fundamental idea for each class is demonstrated. The characteristics of each class are analyzed. This is useful to understand the different methods, and can provide references to the practical use of the methods.
    11  The IR Radiation Characteristic of Exhaust Plumeof the Liquid Rocket Engine
    NIE Wansheng YANG Junhui HE Haobo FENG Songjiang ZHUANG Fengchen
    2005, 27(5):91-94.
    [Abstract](7078) [HTML](85) [PDF 214.18 K](5998) [Cited by](28)
    Abstract:
    The IR radiation characteristic of exhaust plume of the liquid rocket is numerically calculated. Based on the established HITRAN database and the numerical simulation results of the exhaust plume field, the radiation transmission equation is numerically solved. The absorption and radiation of the atmosphere are considered. The calculation results indicate that the transmission conditions, height and angle, exert important influence on the distribution of spectrum intensity. The spectral irradiances achieved by solving the RTE are compared with the test data, which show that the calculation method is feasible and the solution is proper.
    12  Advance in Digital Array Radar and Its Key Technologies
    CHEN Zengping ZHANG Yue BAO Qinglong
    2010, 32(6):1-7.
    [Abstract](8461) [HTML](97) [PDF 381.78 K](7317) [Cited by](28)
    Abstract:
    With the development of high speed ADC and general processor with high performance, the digitalization degree of radar has reached a level much higher than before. Firstly, this paper analyzed the advantages of Digital Array Radar (DAR). Secondly, it introduced several typical DAR systems and summarized the typical architecture of DAR. Finally it introduced the development of RF direct sampling all-digital receiver, all-digital quadrature demodulation, wideband channel equalization, and the wideband signal digital beamforming technology. With the development of relevant technology, the array radar will surely develop to be digital, software defined and multifunctional.
    13  Dynamic Model and Simulation of Orbital NetCasting and Ground Test
    CHEN Qing YANG Leping ZHANG Qingbin
    2009, 31(3):16-19.
    [Abstract](7440) [HTML](92) [PDF 247.99 K](5497) [Cited by](26)
    Abstract:
    Orbital net capture is an innovative mission concept, and has special potential on space debris disposal and OOS (on-orbit service). Dynamics of orbital net casting is a key technique of the orbital net capture system design and application, for which two major feasible investigation means have been suggested: dynamic modeling, simulation and ground test. Based on dumped-mass model, a model of the system dynamics was derived, and a ground test device was designed to verify the simulation result. The comparison of several ground tests and simulations shows that the model can be used to design orbital net capture systems. Relevant pictures of ground test and simulation were presented.
    14  A New Algorism of Matching Line Segments
    FU Dan WANG Chao XU Yidan ZHOU Jian YU Qifeng
    2008, 30(1):115-119.
    [Abstract](7585) [HTML](92) [PDF 554.21 K](6077) [Cited by](25)
    Abstract:
    Line segments are ordinary in man-made targets and matching line segments is the first step in a lot of fields, such as 3D reconstruction. Because of occlusion, the question of matching individual line segments is difficult to figure out with the traditional methods, and a novel approach based on epipolar-line constraint and the RANSAC algorithm is presented. Firstly, the points on line segments between image pairs are matched by epipolar-line constraint;Secondly, the RANSAC algorithm is used to estimate a straight line model fit to a set of 2D points, so the line segments of occlusion is matched availably. The result of the synthetic and real images is accurate and reliable.
    15  Approach to Product Modular Design Based on FPBS
    LI Guoxi WU Jianzhong ZHANG Meng GONG Jingzhong CHANG Pinyao
    2009, 31(5):75-80.
    [Abstract](7144) [HTML](100) [PDF 681.66 K](6138) [Cited by](24)
    Abstract:
    By combining decomposition topology model of iterative design for mechanical products with modularization, a modular design method for mechanism based on function-principle-behavior-structure is put forward. Product iterative design decomposition principle based on function-principle-behavior-structure is mainly discussed. Portrait iterative process of function(principle(behavior(structure(function evolvement during design decomposition is analyzed. Transverse dynamic modeling means of product design decomposition is clarrified. Basic modular design method for complicated mechanism based on FPBS is established by introducing modulization into the product iterative design composition process.
    16  Research on open identity authentication model for PKI
    ZHOU Xiaobin XU Yong ZHANG Ling
    2013, 35(1):169-174.
    [Abstract](8213) [HTML](0) [PDF 962.49 K](6772) [Cited by](23)
    Abstract:
    Some problems about the traditional identity authentication model for PKI(Public Key Infrastructure) were analyzed. For example, because certificate status verification service and key verification service depend on different service providers who have not enough trust degree in open network environment, the trust degree of the traditional model decreases and its risk increases. Additionally, there are other problems about cross-CAs and incomplete authentication service in the traditional model. Thus a new open identity authentication model was put forward for PKI, which can solve the above problems. In this model, the above two verification services were both provided by CA, and the service result was applied by providing identity certification file instead of OCSP answer. The trust degree of the traditional model and our model by using the cloud trust model presented by other researchers was calculated. The result of the calculating test shows that our model can improve the trust degree obviously. Finally, the prototype system of our model was completed, and especially the performance of the model was optimized. The test shows that the model has good practical value.
    17  TDOA Passive Location and Accuracy Analysis
    Yang lin Zhou Yiyu Sun Zhongkang
    1998, 20(2):49-53.
    [Abstract](6670) [HTML](93) [PDF 208.68 K](6814) [Cited by](22)
    Abstract:
    A new exact, explicit, uniterative, and computationally effcient solution of nonlinear equation set for estimation of emitter position based on the time differences of arrival (TDOA) measured by multi-stations is proposed in this paper. The accuracy analysis of the location method is also presented. Finally performance evaluation results of emitter location by using TDOA information are illustrated by some graphs of Geometrical Dilution of Precision (GDOP) under various conditions in the specific surveillance region.
    18  Application of IDEF0 Method in Analysis and Design of Military Integreted Information Systems
    LUO Xueshan ZHU Decheng SHEN Xueshi
    2001, 23(3):88-92.
    [Abstract](6923) [HTML](0) [PDF 217.34 K](6886) [Cited by](22)
    Abstract:
    The applications of IDEF0 method in military integreted information systems analysis, design, updating, integration, and simulation are discussed in detail. For IDEF0 model is simple but comprehensive, and with powerful ability in system description, it is widely applied in various fields, especially in manufacturing. Military integreted information systems, based on information and supported by activity, are large and complex systems. With IDEF0 model, the common understanding of the systems both for the military commander and the technical engineers can be deepened. So it can improve the effectiveness and practicability of development of the military integreted information systems.
    19  An Application of Otsu Algorithm on Canny Operator
    LIANG Guangming SUN Jixiang MA Qi YAO Chunguang
    2003, 25(5):36-39.
    [Abstract](7358) [HTML](89) [PDF 180.22 K](5983) [Cited by](22)
    Abstract:
    Canny algorithm is used in the segmentation of the cell image and it can obtain better effect of segmentation by setting the appropriate parameters.After the histogram of cell image is analyzed,the Ostu algorithm can implement the two threshold's adaptive setting in Canny algorithm. From the test's result, it can be seen that the Otsu algorithm can solve the threshold's setting in Canny algorithm and it can improve the the effect of cell image's segmentation and the adaptive ability of Canny algorithm.
    20  A Review on Scientific Workflows
    ZHANG Weimin LIU Cancan LUO Zhigang
    2011, 33(3):56-65.
    [Abstract](8217) [HTML](0) [PDF 380.80 K](7439) [Cited by](22)
    Abstract:
    Scientific Workflow Management Systems (SWfMS) has become an effective platform for representing and managing large-scale complex scientific computing processes, which glue together a large number of complex applications for data management, analysis, simulation, and visualization, and then assist the scientists for scientific discovery. In this paper, the current studies of Scientific Workflow (SWF) are reviewed firstly, including SWF models, presentations, languages, composition, validation, scheduling and provenance, as well as fault tolerance and system security. Then, the latest studies in recent years are also discussed. Based on the analysis of the key technologies and the latest development, the drawbacks in this domain are pointed out and some suggestions towards the future development are made. Finally, the recent research status quo in China is presented and some suggestions are given.

    Current Issue


    Volume , No.

    Table of Contents

    Archive

    Volume

    Issue

    Most Read

    Most Cited

    Most Downloaded