Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Artificial Intelligence and Robotics

PDF

China Simulation Federation

Complex networks

Publication Year

Articles 1 - 8 of 8

Full-Text Articles in Engineering

Research On Generation Technology Of Computer Generated Force In Lvc Training System, Gao Ang, Zhiming Dong, Guohui Zhang, Liang Tao, Qisheng Guo Mar 2021

Research On Generation Technology Of Computer Generated Force In Lvc Training System, Gao Ang, Zhiming Dong, Guohui Zhang, Liang Tao, Qisheng Guo

Journal of System Simulation

Abstract: LVC training system of the combat equipment under the condition of confrontation is an effective means of training, aiming at the problem that in LVC training system, computer generated forces are difficult to meet the demand of training problems. The concept of LVC training and LVC training system is clarified, according to the relationship between model and system structure, the corresponding modeling technology requirements of three different hierarchical models, namely logical range entity configuration, command entity and combat entity, are expounded. According to the specific requirements, four computer-generated force generation methods are proposed, namely, logical target range virtual and …


Modeling And Analyzing Of Battlefield Information Sharing Effectiveness Based On Complex Networks, Zhang Qiang, Jianhua Li, Shen Di Aug 2020

Modeling And Analyzing Of Battlefield Information Sharing Effectiveness Based On Complex Networks, Zhang Qiang, Jianhua Li, Shen Di

Journal of System Simulation

Abstract: Battlefield information sharing is the basis of acquiring information superiority to get decision and action superiority in information war。Aiming at the influence of information sharing on operational effectiveness, internal essence of the information sharing activity in information warfare was qualitatively descripted. By using operational network model which clearly reflects node's function and edge's type, the operational network with different information sharing degree was constructed, and the characteristic which depicts information sharing effectiveness was defined, and the influence law of information sharing degree on sharing effectiveness measurement indexes of operational network with simulation was analyzed. The simulation result validates that …


Pinning Control For Synchronization Of Hr Biological Neural Networks:Linear Active Disturbance Rejection Approach, Wei Wei, Wen Jiao Jul 2020

Pinning Control For Synchronization Of Hr Biological Neural Networks:Linear Active Disturbance Rejection Approach, Wei Wei, Wen Jiao

Journal of System Simulation

Abstract: Synchronization of a complex network whose nodes are Hindmarsh-Rose biological neurons was considered. Coupling strengths of the whole network were always taken as the tuning variables. However, coupling strengths may not be changeable. In addition, synchronization was affected by different disturbances. In view of above factors, pinning control was utilized and linear active disturbance rejection control (LADRC) was designed. By this approach, synchronization was achieved in according to synchronization errors of the controlled nodes and the couplings among nodes. In the simulations, coupling strength was fixed at a relative small value, and no external disturbance case …


Modeling And Simulation On Influence Of Complex Network Nodes Based On Data Field In, Chenxi Shao, Xiaoqi Chen, Xingfu Wang, Fuyou Miao Jul 2020

Modeling And Simulation On Influence Of Complex Network Nodes Based On Data Field In, Chenxi Shao, Xiaoqi Chen, Xingfu Wang, Fuyou Miao

Journal of System Simulation

Abstract: Research on the influence of complex network nodes is an important part of data mining. Mining the influential nodes in complex networks not only has important academic significance, but also helps to suppress the outbreak of epidemics, control the spread of rumors, and promote e-commercial products and so on. By selecting the Mixed Degree Decomposition (MDD) value of each node as its mass, the complex network is abstracted into a data field, the influential nodes are identified by combining the data field model, and some well-known centralities are compares with. The classical Susceptible-Infected-Recovered (SIR) epidemic model is …


Complex Network Modeling And Visualization Analysis For Ocean Observation Data, Sun Xin, Zhenhua Li, Junyu Dong, Xinyan Luo, Yuting Yang Jan 2019

Complex Network Modeling And Visualization Analysis For Ocean Observation Data, Sun Xin, Zhenhua Li, Junyu Dong, Xinyan Luo, Yuting Yang

Journal of System Simulation

Abstract: Ocean data analysis is one of the important foundations in marine science research. Analysis on the sea surface temperature based on complex network theory helps explore the marine dynamics in a new perspective. The ocean is divided into grids, and the annual average of the sea surface temperature is calculated to reflect the properties of the corresponding grid area. The mutual information and the Pearson correlation coefficient are used to measure the similarity between different areas. The nonlinear and linear complex network models which reflect the station of the global marine climate can be built. Finally some popular measures …


Modeling And Simulation On Entities’ Belief In Cyberspace, Jiuyang Tao, Wu Lin, Xiaoyuan He, Rong Ming Jan 2019

Modeling And Simulation On Entities’ Belief In Cyberspace, Jiuyang Tao, Wu Lin, Xiaoyuan He, Rong Ming

Journal of System Simulation

Abstract: Of all cyber-attacks, 'fabrication' which is aimed at impacting one’s awareness is becoming the common means, so it is of great importance to explore ways so as to defend such attacks. An attack can success or not always rely on the entities’ belief of certain events. In this paper, two different ways of 'fabrication' attack are put forward, and three essential conditions for 'fabrication' attack are analyzed. Second, a cyberspace belief model in terms of the Dempster-Shafer framework based on situation awareness theory is built to study the evolution of the cyber entities’ belief under the 'fabrication' attack. In …


Simulation Of Two Stages-Variant Growth Evolution Model Of High-Speed Railway And Civil Aviation Compound Network, Xu Feng, Jinfu Zhu, Jianjun Miao, Rongrong Ding Jan 2019

Simulation Of Two Stages-Variant Growth Evolution Model Of High-Speed Railway And Civil Aviation Compound Network, Xu Feng, Jinfu Zhu, Jianjun Miao, Rongrong Ding

Journal of System Simulation

Abstract: Combining the special evolving characteristics of the high-speed railway and civil aviation compound network, an evolution model which has two stages with variant growth mechanism and variable parameters is constructed, and the rationality of the model is verified through mathematical simulation. The model divides the evolutionary process into two stages: the stage of single-point growth pattern, and the stage of variant and alternant growth pattern. The probability of two sub-networks’ random and commutative growth could be controlled by changing the parameters’ values, and then the evolving rhythm and scale of the compound network could be adjusted. The simulation results …


Group Consensus Of Multi-Agent Networks With Multiple Time Delays, Lianghao Ji, Xinyue Zhao Jan 2019

Group Consensus Of Multi-Agent Networks With Multiple Time Delays, Lianghao Ji, Xinyue Zhao

Journal of System Simulation

Abstract: The group consensus problems for first-order and second-order multi-agent networks with multiple time delays are investigated respectively. Based on the theory of frequency-domain, some algebraic criteria are analytically proposed, which can guarantee the achievement of group consensus. The results show that the input time delays, the coupling weights and the coupling strengths between the agents play key roles in reaching group consensus, whereas communication time delays can only affect the convergence rate of the systems. The validity of the results is verified by several simulated examples.