Survivability strengthening/vulnerability reduction designs have become one of the most important design disciplines of military aircraft now. Due to progressiveness and complexity of modern combat aircraft, the exist...Survivability strengthening/vulnerability reduction designs have become one of the most important design disciplines of military aircraft now. Due to progressiveness and complexity of modern combat aircraft, the existing vulnerability modeling and computation methods cannot meet the current engineering application requirements. Therefore, a vulnerability modeling and computation method based on product structure and CATIA is proposed in sufficient consideration of the design characteristics of modern combat aircraft. This method directly constructs the aircraft vulnerability model by CATIA or the digital model database, and manages all the product components of the vulnerability model via aircraft product structure. Using CAA second development, the detailed operations and computation methods of vulnerability analysis are integrated into CATIA software environment. Comprehensive assessment data and visual kill probability Iso-contours can also be presented, which meet the vulnerability analysis requirements of modern combat aircraft effectively. The intact vulnerability model of one hypothetical aircraft is constructed, and the effects of redundant technology to the aircraft vulnerability are assessed, which validate the engineering practicality of the method.展开更多
Aircraft single-hit vulnerability/survivability is usually expressed as the probability of kill or the vulnerable area in case of being given a random threat (e.g. a fragment) hit on the aircraft. In this paper, int...Aircraft single-hit vulnerability/survivability is usually expressed as the probability of kill or the vulnerable area in case of being given a random threat (e.g. a fragment) hit on the aircraft. In this paper, introducing the "equivalent target method" in lethality field into the aircraft vulnerability assessment, a generic vulnerability calculation model is proposed. In order for a good representation of reality, the model considers the threat change of state-of-motion during the threat penetrating into the components successively. Application shows that the proposed generic model has solved the Pk/h (probability of kill given by a hit on the component) calculation problem in aircraft vulnerability assessment, and is easier to be computerized than other commonly used models.展开更多
In sub-tropical coastal waters around Hong Kong, algal blooms and red tides are usually first sighted in the Mirs Bay, in the eastern waters of Hong Kong. A calibrated three-dimensional hydrodynamic model for the Pear...In sub-tropical coastal waters around Hong Kong, algal blooms and red tides are usually first sighted in the Mirs Bay, in the eastern waters of Hong Kong. A calibrated three-dimensional hydrodynamic model for the Pearl River Estuary (Delft3D) has been applied to the study of the physical hydrography of Hong Kong waters and its relationship with algal bloom transport patterns in the dry and wet seasons. The general 3D hydrodynamic circulation and salinity structure in the partially-mixed estuary are presented. Extensive numerical surface drogue tracking experiments are performed for algal blooms that are initiated in the Mirs Bay under different seasonal, wind and tidal conditions. The probability of bloom impact on the Victoria Harbour and nearby urban coastal waters is estimated. The computations show that: i) In the wet season (May - August), algal blooms initiated in the Mirs Bay will move in a clockwise direction out of the bay, and be transported away from Hong Kong due to SW monsoon winds which drive the SW to NE coastal current; ii) In the dry season (November- April), algal blooms initiated in the northeast Mirs Bay will move in an anti-clockwise direction and be carried away into southern waters due to the NE to SW coastal current driven by the NE monsoon winds; the bloom typically flows past the east edge of the Victoria Harbeur and nearby waters. Finally, the role of hydrodynamic transport in an important episodic event -- the spring 1998 massive red tide -- is quantitatively examined. It is shown that the strong NE to E wind during late March to early April, coupled with the diurnal tide at the beginning of April, significantly increased the probability of bloom transport into the Port Shelter and East Lamma Channel, resulting in the massive fish kill. The results provide a basis for risk assessment of harmful algal bloom (HAB) impact on urban coastal waters around the Victoria Habour.展开更多
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo...As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.展开更多
A prescribed performance neural controller to guarantee tracking quality is addressed for the near space kinetic kill vehicle (NSKKV) to meet the state constraints caused by side window detection. Different from the t...A prescribed performance neural controller to guarantee tracking quality is addressed for the near space kinetic kill vehicle (NSKKV) to meet the state constraints caused by side window detection. Different from the traditional prescribed performance control in which the shape of the performance function is constant, this paper exploits new performance functions which can change the shape of their function according to different symbols of initial errors and can ensure the error convergence with a small overshoot. The neural backstepping control and the minimal learning parameters (MLP) technology are employed for exploring a prescribed performance controller (PPC) that provides robust tracking attitude reference trajectories. The highlight is that the transient performance of tracking errors is satisfactory and the computational load of neural approximation is low. The pseudo rate (PSR) modulator is used to shape the continuous control command to pulse or on-off signals to meet the requirements of the thruster. Numerical simulations show that the proposed method can achieve state constraints, pseudo-linear operation and high accuracy.展开更多
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e...The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.展开更多
In this study,relevant work on autonomy evaluation(AE)in recent years was comprehensively reviewed and classified from the perspective of task models,and a closed-loop task models based theoretical framework for AE wa...In this study,relevant work on autonomy evaluation(AE)in recent years was comprehensively reviewed and classified from the perspective of task models,and a closed-loop task models based theoretical framework for AE was developed.The main contributions of this study are as follows.1)A taxonomy for AE based on task models was introduced to classify current theories,methods and standards.2)The limitations of the current autonomous evaluation methods were addressed to provide a theoretical framework for quantitative evaluation based on task models,and evaluation metrics for each stage were proposed based on the AE theoretical framework.3)Qualitative analyses of the superiority of the proposed AE framework based on the closed-loop task models were conducted.This study attempts to provide a reference for researchers and engineers in the autonomous unmanned systems field and inspire future development of AE.展开更多
基金supported by National Natural Science Foundation of China (No. 11102159)
文摘Survivability strengthening/vulnerability reduction designs have become one of the most important design disciplines of military aircraft now. Due to progressiveness and complexity of modern combat aircraft, the existing vulnerability modeling and computation methods cannot meet the current engineering application requirements. Therefore, a vulnerability modeling and computation method based on product structure and CATIA is proposed in sufficient consideration of the design characteristics of modern combat aircraft. This method directly constructs the aircraft vulnerability model by CATIA or the digital model database, and manages all the product components of the vulnerability model via aircraft product structure. Using CAA second development, the detailed operations and computation methods of vulnerability analysis are integrated into CATIA software environment. Comprehensive assessment data and visual kill probability Iso-contours can also be presented, which meet the vulnerability analysis requirements of modern combat aircraft effectively. The intact vulnerability model of one hypothetical aircraft is constructed, and the effects of redundant technology to the aircraft vulnerability are assessed, which validate the engineering practicality of the method.
基金National Natural Science Foundation of China (10372082) Aeronautical Science Foundation of China (02B53008) and Doctorate Foundation of Northwestern Polytechnical University (CX200301)
文摘Aircraft single-hit vulnerability/survivability is usually expressed as the probability of kill or the vulnerable area in case of being given a random threat (e.g. a fragment) hit on the aircraft. In this paper, introducing the "equivalent target method" in lethality field into the aircraft vulnerability assessment, a generic vulnerability calculation model is proposed. In order for a good representation of reality, the model considers the threat change of state-of-motion during the threat penetrating into the components successively. Application shows that the proposed generic model has solved the Pk/h (probability of kill given by a hit on the component) calculation problem in aircraft vulnerability assessment, and is easier to be computerized than other commonly used models.
基金This study was supported by a Hong Kong Research Grants Council Group Research Project (RGC//HKU1/02C) ,and partially by a grantfromthe University Grants Committee of the Hong Kong Special Administrative Region,China(Project No. AoE/P-04/04 and P-04/02) tothe Area of Excellencein Marine Environment Research andInnovativeTechnology (MERIT)
文摘In sub-tropical coastal waters around Hong Kong, algal blooms and red tides are usually first sighted in the Mirs Bay, in the eastern waters of Hong Kong. A calibrated three-dimensional hydrodynamic model for the Pearl River Estuary (Delft3D) has been applied to the study of the physical hydrography of Hong Kong waters and its relationship with algal bloom transport patterns in the dry and wet seasons. The general 3D hydrodynamic circulation and salinity structure in the partially-mixed estuary are presented. Extensive numerical surface drogue tracking experiments are performed for algal blooms that are initiated in the Mirs Bay under different seasonal, wind and tidal conditions. The probability of bloom impact on the Victoria Harbour and nearby urban coastal waters is estimated. The computations show that: i) In the wet season (May - August), algal blooms initiated in the Mirs Bay will move in a clockwise direction out of the bay, and be transported away from Hong Kong due to SW monsoon winds which drive the SW to NE coastal current; ii) In the dry season (November- April), algal blooms initiated in the northeast Mirs Bay will move in an anti-clockwise direction and be carried away into southern waters due to the NE to SW coastal current driven by the NE monsoon winds; the bloom typically flows past the east edge of the Victoria Harbeur and nearby waters. Finally, the role of hydrodynamic transport in an important episodic event -- the spring 1998 massive red tide -- is quantitatively examined. It is shown that the strong NE to E wind during late March to early April, coupled with the diurnal tide at the beginning of April, significantly increased the probability of bloom transport into the Port Shelter and East Lamma Channel, resulting in the massive fish kill. The results provide a basis for risk assessment of harmful algal bloom (HAB) impact on urban coastal waters around the Victoria Habour.
文摘As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.
基金supported by the National Natural Science Foundation of China(61773398 61703421)
文摘A prescribed performance neural controller to guarantee tracking quality is addressed for the near space kinetic kill vehicle (NSKKV) to meet the state constraints caused by side window detection. Different from the traditional prescribed performance control in which the shape of the performance function is constant, this paper exploits new performance functions which can change the shape of their function according to different symbols of initial errors and can ensure the error convergence with a small overshoot. The neural backstepping control and the minimal learning parameters (MLP) technology are employed for exploring a prescribed performance controller (PPC) that provides robust tracking attitude reference trajectories. The highlight is that the transient performance of tracking errors is satisfactory and the computational load of neural approximation is low. The pseudo rate (PSR) modulator is used to shape the continuous control command to pulse or on-off signals to meet the requirements of the thruster. Numerical simulations show that the proposed method can achieve state constraints, pseudo-linear operation and high accuracy.
基金supported by the Natural Science Foundation Research Plan of Shanxi Province (2023JCQN0728)。
文摘The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
基金supported in part by the Major Project for New Generation of AI,China(No.2018AAA0100400)in part by the Natural Science Foundation of China(No.62072457).
文摘In this study,relevant work on autonomy evaluation(AE)in recent years was comprehensively reviewed and classified from the perspective of task models,and a closed-loop task models based theoretical framework for AE was developed.The main contributions of this study are as follows.1)A taxonomy for AE based on task models was introduced to classify current theories,methods and standards.2)The limitations of the current autonomous evaluation methods were addressed to provide a theoretical framework for quantitative evaluation based on task models,and evaluation metrics for each stage were proposed based on the AE theoretical framework.3)Qualitative analyses of the superiority of the proposed AE framework based on the closed-loop task models were conducted.This study attempts to provide a reference for researchers and engineers in the autonomous unmanned systems field and inspire future development of AE.