Currently, most of the detection methods for hypersonic moving targets in space and near space at home and abroad are based on space-based detection systems and ground-based detection systems, etc. ...for the detection of hypersonic moving targets. The space-based detection system consists mainly of space-based infra-red and space-based radar detection systems, which capture and track and intercept the flight and climb segments of targets via medium and high orbiting satellites. Ground-based detection systems are mainly used to detect airborne targets by means of long-range early warning phased array radars, ground-based multifunctional radars, gaze radars and electromagnetic fences in conjunction with ground-based infrared detection systems. Instead, we use the all-weather, real-time global coverage of satellite signals as a source of radiation to detect hypersonic targets in space and near space. Calculating the power loss of the satellite transmitting electromagnetic wave signals and subsequently receiving the return signals of its detection of space and near-space targets, based on the transmitting and receiving power of the satellite transmitting and receiving antennas, amplification, electromagnetic wave frequency and the propagation distance from the satellite to space and near-space moving targets, to obtain the minimum power value required to ensure that a single satellite can properly transmit and receive its detection of electromagnetic wave signals of space and near-space targets and their return signals. The satellite ephemeris and other data parameters of the world's currently launched satellites in low, medium and high orbits, as well as satellites in synchronous orbits, were obtained and combined with the satellite simulation software STK to build a simulation model describing the distribution and operation of the space satellite constellation. Effective detection of hypersonic targets is achieved through computational analysis of their coverage by a constellation of space satellites.
Underground Tunnel Detection in Mountainous Environment Wang, Kechao; Liu, Xiaotai; Deng, Wenbing ...
2022 International Conference on Artificial Intelligence and Computer Information Technology (AICIT),
2022-Sept.-16
Conference Proceeding
At present, most of the research on detection methods of strip-shaped underground tunnels in mountainous areas using infrared imaging technology at home and abroad adopts the method of analyzing the ...time-varying law of target signals based on multi-temporal infrared images. And establish a mathematical model to calculate and solve the tunnel position. Or use the microwave infrared enhancement technology to enhance the infrared image according to the mathematical model of microwave power transmission to highlight the contrast of target/background signal strength, so as to realize the detection of the location of the belt-shaped underground tunnel in the mountains. We use the heat between the mountain and the air layer. The radiation model combines the DEM data to calculate the solar radiation energy, and iteratively filters out the background heat flow field energy of the mountain. Combined with hyperspectral data, the background heat propagation energy of the mountain is calculated; the infrared remote sensing image is filtered out using the underground target inversion model. The optimal altitude and disturbance signal distribution map of the belt-shaped underground tunnel in the mountain are obtained from the background heat flow field energy of each layer of the mountain
Negotiation is the effective way of solving dispute in e-commerce. Every side of the negotiation has to make a compromise to achieve a successful trade. This paper establishes a new mathematic model ...for automatic negotiation based on agents and presents genetic algorithm to solve the multi-objective negotiation problem. The Experiments shows that both sides of the negotiation can get the satisfactory plan by GA method.
Traditional methods for solving multi-class problems, well-known as multi-SVMs, always combine certain decomposed binary-SVMs' results to formulate the final decision function. The prevalent methods ...are `one vs. one' and `one vs. all', which are based on a voting scheme among the binary classifiers to derive the winning class. However, they do not scale well with the data size and class number. Core Vector Machine (CVM) is a promising technique for scaling up a binary-SVM to handle large data sets with the greedy-expansion strategy, where the kernels are required to be normalized to ensure the equivalence between the kernel-induced spaces of SVM and Minimum Enclosing Ball (MEB). The idea proposed by CVM can also be utilized to formulate multi-SVM to MEB, by which we propose an approximate MEB algorithm with smaller core sets to handle multi-SVM. The experimental results on synthetic and benchmark data sets demonstrate the competitive performances of the method we proposed both on training time and training accuracy.
A new system of polarographic adsorptive wave for determining trace scandium was proposed. In 0.2 mol/L NH
4
OAc, the Sc(III)- ACBK 1,8- dihydroxy- 2- (2- hydroxy- 5- sulfo- 1- phenylazo)- 3,6- ...disulfo- naphthalene, called acid chrome blue K complex emerged a sensitive adsorptive complex wave(Ep′ = -0.67V). The molar ratio of Sc(III) to ACBK in the complex was established as 1: 2 and the apparent stability constant β
2
= 2.7 × 10
15
. But for Y(III), the molar ratio was 1: 1 and β = 1.5 × 10
5
. Because of the particularity of Sc complex, the sensitivity and the selectivity of determination Sc are much better than that of other rare earth ions. The detection limit is 1.1 × 10
−7
mol/L for oscillopolarography and 2.0 × 10
−8
mol/L for adsorptive stripping voltammetry.