期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Aerial target threat assessment based on gated recurrent unit and self-attention mechanism
1
作者 CHEN Chen QUAN Wei SHAO Zhuang 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期361-373,共13页
Aerial threat assessment is a crucial link in modern air combat, whose result counts a great deal for commanders to make decisions. With the consideration that the existing threat assessment methods have difficulties ... Aerial threat assessment is a crucial link in modern air combat, whose result counts a great deal for commanders to make decisions. With the consideration that the existing threat assessment methods have difficulties in dealing with high dimensional time series target data, a threat assessment method based on self-attention mechanism and gated recurrent unit(SAGRU) is proposed. Firstly, a threat feature system including air combat situations and capability features is established. Moreover, a data augmentation process based on fractional Fourier transform(FRFT) is applied to extract more valuable information from time series situation features. Furthermore, aiming to capture key characteristics of battlefield evolution, a bidirectional GRU and SA mechanisms are designed for enhanced features.Subsequently, after the concatenation of the processed air combat situation and capability features, the target threat level will be predicted by fully connected neural layers and the softmax classifier. Finally, in order to validate this model, an air combat dataset generated by a combat simulation system is introduced for model training and testing. The comparison experiments show the proposed model has structural rationality and can perform threat assessment faster and more accurately than the other existing models based on deep learning. 展开更多
关键词 target threat assessment gated recurrent unit(GRU) self-attention(SA) fractional Fourier transform(FRFT)
下载PDF
Assessment of Meteorological Threats to the Coordinated Search and Rescue of Unmanned/Manned Aircraft
2
作者 Fei YAN Chuan LI +2 位作者 Xiaoyi FU Kefeng WU Yuying LI 《Meteorological and Environmental Research》 2024年第1期27-29,37,共4页
The architecture and working principle of coordinated search and rescue system of unmanned/manned aircraft,which is composed of manned/unmanned aircraft and manned aircraft,were first introduced,and they can cooperate... The architecture and working principle of coordinated search and rescue system of unmanned/manned aircraft,which is composed of manned/unmanned aircraft and manned aircraft,were first introduced,and they can cooperate with each other to complete a search and rescue task.Secondly,a threat assessment method based on meteorological data was proposed,and potential meteorological threats,such as storms and rainfall,can be predicted by collecting and analyzing meteorological data.Finally,an experiment was carried out to evaluate the performance of the proposed method in different scenarios.The experimental results show that the coordinated search and rescue system of unmanned/manned aircraft can be used to effectively assess meteorological threats and provide accurate search and rescue guidance. 展开更多
关键词 Unmanned/manned aircraft Coordinated search and rescue assessment of meteorological threats Meteorological data
下载PDF
A Novel IoT Architecture, Assessment of Threats and Their Classification withMachine Learning Solutions
3
作者 Oliva Debnath Saptarshi Debnath +2 位作者 Sreyashi Karmakar MD TausifMallick Himadri Nath Saha 《Journal on Internet of Things》 2023年第1期13-43,共31页
The Internet of Things(IoT)will significantly impact our social and economic lives in the near future.Many Internet of Things(IoT)applications aim to automate multiple tasks so inactive physical objects can behave ind... The Internet of Things(IoT)will significantly impact our social and economic lives in the near future.Many Internet of Things(IoT)applications aim to automate multiple tasks so inactive physical objects can behave independently of others.IoT devices,however,are also vulnerable,mostly because they lack the essential built-in security to thwart attackers.It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment.As a result,the IoT designs that are now in use do not completely support all of the advancements that have been made to include sophisticated features in IoT,such as Cloud computing,machine learning techniques,and lightweight encryption techniques.This paper presents a detailed analysis of the security requirements,attack surfaces,and security solutions available for IoT networks and suggests an innovative IoT architecture.The Seven-Layer Architecture in IoT provides decent attack detection accuracy.According to the level of risk they pose,the security threats in each of these layers have been properly categorized,and the essential evaluation criteria have been developed to evaluate the various threats.Also,Machine Learning algorithms like Random Forest and Support Vector Machines,etc.,and Deep Learning algorithms like Artificial Neural Networks,Q Learning models,etc.,are implemented to overcome the most damaging threats posing security breaches to the different IoT architecture layers. 展开更多
关键词 Internet of Things(IoT) layered architecture threat assessment security machine learning attack detection attack mitigation
下载PDF
Cooperative Threat Assessment of Multi-aircrafts Based on Synthetic Fuzzy Cognitive Map 被引量:18
4
作者 陈军 俞冠华 高晓光 《Journal of Shanghai Jiaotong university(Science)》 EI 2012年第2期228-232,共5页
Threat assessment is one of the most important parts of the tactical decisions,and it has a very important influence on task allocation.An application of fuzzy cognitive map(FCM) for target threat assessment in the ai... Threat assessment is one of the most important parts of the tactical decisions,and it has a very important influence on task allocation.An application of fuzzy cognitive map(FCM) for target threat assessment in the air combat is introduced.Considering the fact that the aircrafts participated in the cooperation may not have the same threat assessment mechanism,two different FCM models are established.Using the method of combination,the model of cooperative threat assessment in air combat of multi-aircrafts is established.Simulation results show preliminarily that the method is reasonable and effective.Using FCM for threat assessment is feasible. 展开更多
关键词 threat assessment synthetic fuzzy cognitive map(FCM) multi-aircrafts cooperative air combat
原文传递
Blockchain Security Threats and Collaborative Defense:A Literature Review 被引量:1
5
作者 Xiulai Li Jieren Cheng +5 位作者 Zhaoxin Shi Jingxin Liu Bin Zhang Xinbing Xu Xiangyan Tang Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第9期2597-2629,共33页
As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless natu... As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless nature of blockchain,the security defense of the blockchain system has become one of the most important measures.This paper comprehensively reviews the research progress of blockchain security threats and collaborative defense,and we first introduce the overview,classification,and threat assessment process of blockchain security threats.Then,we investigate the research status of single-node defense technology and multi-node collaborative defense technology and summarize the blockchain security evaluation indicators and evaluation methods.Finally,we discuss the challenges of blockchain security and future research directions,such as parallel detection and federated learning.This paper aims to stimulate further research and discussion on blockchain security,providing more reliable security guarantees for the use and development of blockchain technology to face changing threats and challenges through continuous updating and improvement of defense technologies. 展开更多
关键词 Blockchain threat assessment collaborative defense security evaluation
下载PDF
UAV Online Path Planning Algorithm in a Low Altitude Dangerous Environment 被引量:15
6
作者 Naifeng Wen Lingling Zhao +1 位作者 Xiaohong Su Peijun Ma 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第2期173-185,共13页
UAV online path-planning in a low altitude dangerous environment with dense obstacles, static threats(STs)and dynamic threats(DTs), is a complicated, dynamic, uncertain and real-time problem. We propose a novel method... UAV online path-planning in a low altitude dangerous environment with dense obstacles, static threats(STs)and dynamic threats(DTs), is a complicated, dynamic, uncertain and real-time problem. We propose a novel method to solve the problem to get a feasible and safe path. Firstly STs are modeled based on intuitionistic fuzzy set(IFS) to express the uncertainties in STs. The methods for ST assessment and synthesizing are presented. A reachability set(RS) estimator of DT is developed based on rapidly-exploring random tree(RRT) to predict the threat of DT. Secondly a subgoal selector is proposed and integrated into the planning system to decrease the cost of planning, accelerate the path searching and reduce threats on a path. Receding horizon(RH) is introduced to solve the online path planning problem in a dynamic and partially unknown environment. A local path planner is constructed by improving dynamic domain rapidly-exploring random tree(DDRRT) to deal with complex obstacles. RRT* is embedded into the planner to optimize paths. The results of Monte Carlo simulation comparing the traditional methods prove that our algorithm behaves well on online path planning with high successful penetration probability. 展开更多
关键词 Online UAV Path planning threat assessment IFS rapidly-exploring random tree(RRT) DDRRT
下载PDF
An adaptive dwell time scheduling model for phased array radar based on three-way decision 被引量:3
7
作者 LI Bo TIAN Linyu +1 位作者 CHEN Daqing LIANG Shiyang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第3期500-509,共10页
Real-time resource allocation is crucial for phased array radar to undertake multi-task with limited resources,such as the situation of multi-target tracking,in which targets need to be prioritized so that resources c... Real-time resource allocation is crucial for phased array radar to undertake multi-task with limited resources,such as the situation of multi-target tracking,in which targets need to be prioritized so that resources can be allocated accordingly and effectively.A three-way decision-based model is proposed for adaptive scheduling of phased radar dwell time.Using the model,the threat posed by a target is measured by an evaluation function,and therefore,a target is assigned to one of the three possible decision regions,i.e.,positive region,negative region,and boundary region.A different region has a various priority in terms of resource demand,and as such,a different radar resource allocation decision is applied to each region to satisfy different tracking accuracies of multi-target.In addition,the dwell time scheduling model can be further optimized by implementing a strategy for determining a proper threshold of three-way decision making to optimize the thresholds adaptively in real-time.The advantages and the performance of the proposed model have been verified by experimental simulations with comparison to the traditional twoway decision model and the three-way decision model without threshold optimization.The experiential results demonstrate that the performance of the proposed model has a certain advantage in detecting high threat targets. 展开更多
关键词 phased array radar resource scheduling three-way decision threat assessment
下载PDF
Game Theory Based Sensor Management in Reducing Target Threat Level Assessment Risk
8
作者 庞策 单甘霖 《Journal of Shanghai Jiaotong university(Science)》 EI 2022年第5期649-659,共11页
Sensor management schemes are calculated to reduce target threat level assessment risk in this paper.Hidden Markov model and risk theory are combined to build the target threat level model firstly.Then the target thre... Sensor management schemes are calculated to reduce target threat level assessment risk in this paper.Hidden Markov model and risk theory are combined to build the target threat level model firstly.Then the target threat level estimation risk is defined.And the sensor management schemes are optimized with the smallest target threat level assessment risk.What’s more,the game theory is applied to calculate the optimal sensor management scheme.Some simulations are conducted to prove that the proposed sensor management method is effective. 展开更多
关键词 target threat level assessment sensor management hidden Markov model risk theory game theory
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部