- Electromagnetic Launch and Propulsion Technology
- Advanced Measurement and Detection Methods
- Metaheuristic Optimization Algorithms Research
- Advanced Sensor and Control Systems
- Robotic Path Planning Algorithms
- Fluid Dynamics and Heat Transfer
- Fluid Dynamics Simulations and Interactions
- Laser Material Processing Techniques
- Hydraulic and Pneumatic Systems
- Industrial Technology and Control Systems
- Advanced Algorithms and Applications
- High-Velocity Impact and Material Behavior
- UAV Applications and Optimization
- Combustion and flame dynamics
- Erosion and Abrasive Machining
- Advanced Steganography and Watermarking Techniques
- Advanced Decision-Making Techniques
- Distributed Control Multi-Agent Systems
- Chaos-based Image/Signal Encryption
- Flow Measurement and Analysis
- Aerospace Engineering and Control Systems
- Dynamics and Control of Mechanical Systems
- Rocket and propulsion systems research
- Particle accelerators and beam dynamics
- Laser and Thermal Forming Techniques
Chinese People's Armed Police Force Engineering University
2013-2024
Chinese People's Armed Police Force
2013-2018
Xi’an University
2017
Air Force Engineering University
2017
Xi'an University of Finance and Economics
2009-2011
The Alberta Paraplegic Foundation
2011
The main purpose of this article is to enhance the systematicness, comprehensiveness, and profundity counter-unmanned aerial system (C-UAS) theoretical system, laying a foundation for development C-UAS technologies weapons, thereby further improving ability deal with air threats such as unmanned vehicles in future. In discussion process, it mines information, reveals inherent laws, puts forward concept "active defense technology" mission. Simultaneously, carries out comprehensive summary...
Cooperative search-attack is an important application of unmanned aerial vehicle (UAV) swarm in military field. The coupling between path planning and task allocation, the heterogeneity UAVs, dynamic nature environment greatly increase complexity difficulty UAV cooperative mission problem. Inspired by collaborative hunting behavior wolf pack, a distributed self-organizing method for proposed. First, to solve multi-target search problem unknown environments, scouting behavior-inspired...
UAV path planning, as a key technology in the field of automatic control and intelligent systems, has demonstrated significant potential various applications, including logistics distribution, environmental monitoring, emergency rescue. A comprehensive reassessment existing representative literature reveals that most reviews this focus on specific aspects are largely confined to methodological investigations, primarily qualitative analyses lack empirical data support their conclusions. To...
This paper mainly focuses on the evolution mechanism of node importance based information about cascading failures. Firstly, a novel indicator is proposed according to load turbulence each in redistribution range tunable model. The has two characteristics: one that failure consequence considered can be clearly pointed out by its value, and other analyzed with factors rule, capacity, structural characteristics network. Then, an evaluation algorithm presented. analytic formulas Erdös-Rényi...
Swarm intelligence optimization algorithms have been widely used in the fields of machine learning, process control and engineering prediction, among which common include ant colony algorithm (ACO), artificial bee (ABC) particle swarm (PSO). Wolf pack (WPA) as a newer has many similarities with ABC. In this paper, basic principles, implementation processes, related improvement strategies these two were described detail; A comparative analysis their performance solving different feature-based...
To effectively avoid the bottleneck of optical collimation system distortion in use tactical high-energy laser weapons (THELWs), this paper proposes and realizes an optical–multiphysics–finite-element coupling analysis method. Combined with dynamic physical parameters, we construct verify a structure–thermal–optical-performance (STOP) model accurately restore multiphysics phenomenon THELW lens. Finally, conclude that limiting output power assembled doublet lens is 1155.6 W. Then, draw series...
In order to maximize the lethality and reversibility of non-lethal laser weapons (NLLW) at same time thus provide a theoretical basis for R&D in future, this paper accurately analyzed limiting biological dose irreversible damage human skin caused by NLLW. Firstly, based on burn theory medicine actual tactical background, redefines evaluation criteria NLLW body. Secondly, anatomical knowledge, 5-layer finite element model (FEM) superficial is proposed, constructed verified, which can describe...
In the process of accelerating a certain UAV to take off, elevation angle launcher needs be adjusted according aerodynamic characteristics UAV. The affect kinetic analysis launching process, and in order ensure that can off smoothly at predetermined speed, it is necessary find optimal provide data support for simulation. this paper, simple estimation carried out based on CFD software, amount calculation reduced by simplifying model performance parameters are finally obtained through
To tackle the challenges of path planning for unmanned aerial vehicle (UAV) in complex environments, a global–local balanced whale optimization algorithm (GLBWOA) has been developed. Initially, to prevent population from prematurely converging, bubble net attack enhancement strategy is incorporated, and mutation operations are introduced at different stages mitigate early convergence. Additionally, failure parameter test mechanism integrated, along with predefined termination rule avoid...
Tensor data is common in real-world applications, such as recommendation system and air quality monitoring. But often sparse, noisy, fast produced. CANDECOMP/PARAFAC (CP) a popular tensor decomposition model, which both theoretically advantageous numerically stable. However, learning the CP model Bayesian framework, though promising to handle sparsity noise, computationally challenging, especially with produced streams. The fundamental problem addressed by paper mainly tackles efficient...
Interference fit is widely uesd in the high-speed coupling of micro gas turbine since it can transfer large torque, are easy to produce and offer significant cost advantages. In this paper, a interference model was developed analyse contection strength shaft for turbine. Then using elastic theory, radial stress, tangential stress displacement derived with taking account contact pressure, angular velocity thickness coupling. Finally 100kW as an example, above solutions were calculated by...
Interference fit is widely used in the high-speed coupling of micro gas turbine, so its load capacities concerning maximum torque and limit angular velocity must be analyzed accurately. In this paper, a model interference established to calculate normal stresses shear stress contact area by using elastic theory. Then solution are derived. Finally, taking 100-kW turbine as an example, studied numerical results show that static friction coefficient inner surface structural characteristics...
Sun, Y.; Wu, H., and Zhan, R., 2019. Optimal scheduling method of marine transportation resources based on wolf swarm algorithm. In: Guido-Aldana, P.A. Mulahasan, S. (eds.), Advances in Water Resources Exploration. Journal Coastal Research, Special Issue No. 93, pp. 646–651. Coconut Creek (Florida), ISSN 0749-0208.In order to effectively reduce the cost completion time resource scheduling, an optimal for optimization is proposed. In expand theoretical system practical application...
Views Icon Article contents Figures & tables Video Audio Supplementary Data Peer Review Share Twitter Facebook Reddit LinkedIn Tools Reprints and Permissions Cite Search Site Citation Zhao Fa-dong, Zhuang Hong-wei, Zhan Ren-jun; Research on droplet size measurement of impulse antiriots water cannon based sheet laser. AIP Conference Proceedings 11 April 2014; 1592 (1): 268–276. https://doi.org/10.1063/1.4872114 Download citation file: Ris (Zotero) Reference Manager EasyBib Bookends Mendeley...
This paper proposes a watermark algorithm for image content authentication and correcting errors in terms of pixels. There are two characteristics: first, aiming at defects poor safety the complicated calculation which exiting encryption based on chaotic sequences, new sampling without replacement is put forward. Second, application combination mapping technique supplies gap watermark. Using authentication, digital can be corrected pixels, with minimum embedded capacity maximum SNR. The...