Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 548-552.
• Interdiscipline & Application • Previous Articles Next Articles
LU Yun-fei, LI Lin-lin, ZHANG Zhuang, HE He
CLC Number:
[1]陈黎,李芳芳,赵广彤.美陆军一体化防空反导指控系统研究及启示[J].现代防御技术,2016,44(5):82-88. [2]李向阳,潘长鹏,李伟波.基于C-AHP的指挥控制系统作战效能指标体系研究[J].舰船电子工程,2014,34(2):31-34. [3]房坚,王钺,袁坚.基于集合距离的信息优势度量方法[J].系统工程与电子技术,2017,39(1):114-119. [4]江汉,尹浩,李学军,等.C4ISR体系对抗仿真中的信息优势度量[J].系统工程与电子技术,2006,28(1):88-91. [5]QI Z F,HAN S,LI J X.Applications of Generalized Rough Set Theory in Evaluation Index System of Radar Anti-Jamming Performance[J].Journal of Shanghai Jiaotong University(Science),2016,21(2):151-158. [6]YANG J S,WANG F Y.Developing a quantitative index system for assessing sustainable forestry management in Heilongjiang Province,China:a case study[J].CrossMark,2016,27(3):611-619. [7]杜俊慧.基于灰色粗糙集的评价指标筛选方法研究[J].中北大学学报,2012,33(5):559-562. [8]陈强,陈长兴,陈婷,等.基于ADC模型的数据链系统作战效能评估[J].火力与指挥控制,2016,41(1):72-76. [9]胡涛,焦彦维,王华兵,等.基于区间云模型对信息网络的效能评估[J].系统工程理论与实践,2017,37(2):478-485. [10]孙璐璐.层次型无线传感器网络故障检测方法研究[D].沈阳:沈阳理工大学,2015. [11]蓝羽石,毛少杰,王衍.指挥信息系统结构理论与优化方法[M].北京:国防工业出版社,2015. [12]申普兵,赵占东,宫强兵.网络作战能力评估指标体系构建问题的研究[J].计算机科学,2016(S1):505-507. [13]JANA K,JAN S.Fuzzified AHP in the evaluation of scientific monographs [J].Central European Journal of Operations Research,2016,24(2):353-370. [14]XU R S,ZHANG J L,ZUO H B,et al.A novel model for cost performance evaluation of pulverized coal injected into blast furnace based on effective calorific value[J].Journal of Central South University of Technology,2015(22):3990-3998. [15]陈兆兵,郭劲,王兵,等.车载高架式光电探测系统的作战效能评估[J].光学精密工程,2013,21(1):77-86. |
[1] | DU Xiao-ming, YUAN Qing-bo, YANG Fan, YAO Yi, JIANG Xiang. Construction of Named Entity Recognition Corpus in Field of Military Command and Control Support [J]. Computer Science, 2022, 49(6A): 133-139. |
[2] | ZHANG Zhuang, LI Lin-lin, YU Hong-feng, FAN Bao-qing. Effectiveness Evaluation of Command and Control System Based on Improved Projection Pursuit and Grey Correlation Method [J]. Computer Science, 2019, 46(9): 298-302. |
[3] | CHEN Wei-peng, AO Zhi-gang, GUO Jie, YU Qin, TONG Jun. Research on Cyberspace Situation Awareness Security Assessment Based on Improved BP Neural Network [J]. Computer Science, 2018, 45(11A): 335-337. |
[4] | JIN Xiao, GE Hui, MA Rui. Construction and Effectiveness Evaluation of New Cyber Defense System [J]. Computer Science, 2018, 45(11A): 377-381. |
[5] | NAN Ming-li, LI Jian-hua, CUI Qiong, RAN Hao-dan. Flexibility Measurement Model of Command and Control Information Chain for Networked Operations [J]. Computer Science, 2018, 45(10): 306-312. |
[6] | LUO Feng-e, ZHANG Cheng-wei and LIU An. Flight Delays Early Warning Management and Analysis Based on Data Mining [J]. Computer Science, 2016, 43(Z6): 542-546. |
[7] | LI Yun-ting, XIA Zhong-ping and XIONG Jing. Study on Evaluation Method of Multi-layer Hybrid Intrusion Detection System [J]. Computer Science, 2015, 42(Z6): 425-428. |
[8] | LI Guo-hui. Evaluation Model on Competitive Power of Enterprise Based on Hopfield Neural Networks [J]. Computer Science, 2011, 38(Z10): 464-466. |
[9] | ZHENG Li-ming,ZOU Peng,ZHANG Jian-feng,JIA Yan,HAN Wei-hong. Real Time Situational Awareness Model for Large-scale Networks [J]. Computer Science, 2011, 38(Z10): 30-35. |
[10] | ZHANC Jie-yong, YAO Pei-yang,TENG Pei-jun. Research of Coordination Mechanism in Multi-platform Air Defense System [J]. Computer Science, 2011, 38(9): 91-94. |
[11] | JIA Yan,WANG Xiao-wei,HAN Wei-hong,LI Ai-ping,CHENG Wen-cong. YHSSAS: Large-scale Network Oriented Security Situational Awareness System [J]. Computer Science, 2011, 38(2): 4-8. |
[12] | . [J]. Computer Science, 2009, 36(1): 118-120. |
[13] | . [J]. Computer Science, 2006, 33(6): 73-75. |
[14] | WANG Yong-Jie, XIAN Ming ,CHEN Zhi-Jie ,WANG Guo-Yu (School of Electronic Science and Engineering , NUDT , Changsha 410073). [J]. Computer Science, 2006, 33(10): 97-100. |
|