2024 Vol. 50, No. 7

Display Method:
Volume 7 Issue E-journal
Volume 50 Issue72024
iconDownload (89236) 758 iconPreview
Real-time performance/security guarantee technology of vehicle control operating system
YANG Shichun, CUI Haigang, ZHOU Sida, ZHOU Xin’an, FAN Chunpeng, CAO Yaoguang
2024, 50(7): 2051-2065. doi: 10.13700/j.bh.1001-5965.2022.0594
Abstract:

Electronic control technology continues to enable the rapid development of intelligent connected vehicles, and the vehicle control operating system is the fundament of ensuring the safe, efficient, and real-time operation of the electronic control software of automobiles. As intelligent connected ve...

ARAIM-related fault subset optimization algorithm based on sparrow search algorithm
WANG Ershen, WANG Huan, LEI Hong, ZENG Hongzheng, QU Pingping, PANG Tao
2024, 50(7): 2066-2073. doi: 10.13700/j.bh.1001-5965.2022.0596
Abstract:

The multiple hypothesis solution separation (MHSS) test is affected by the increase in the number of satellites and the potential fault probability. This results in a sharp increase in the number of subsets to be monitored and brings more computational burdens. In order to solve the above problems, ...

Target person analysis based on critical node recognition algorithm
HAN Yi, SUN Baibing, WANG Junguo, DU Yanhui
2024, 50(7): 2074-2082. doi: 10.13700/j.bh.1001-5965.2022.0588
Abstract:

The critical node recognition algorithm is an important branch in the field of social network research. However, most of the existing research results highly depend on the diversity, integrity, and availability of data. Therefore, they are less applied in the scene of target person analysis by publi...

Study of corrosion and hydrogen evolution risk of waded lithium ion-battery
ZHANG Qingsong, LI Dongqi, LIAN Xiaoxue
2024, 50(7): 2083-2092. doi: 10.13700/j.bh.1001-5965.2022.0617
Abstract:

Lithium-ion battery wading events occur frequently, especially, often suffering high salinity wading events in coastal areas and maritime operations. In this paper, 18650 model batteries were used as samples to carry out experiments on the risk of corrosion and hydrogen evolution of waded lithium-io...

A large-capacity zero-watermarking algorithm for color images based on combined transform domain
HAN Shaocheng, LIU Huan
2024, 50(7): 2093-2103. doi: 10.13700/j.bh.1001-5965.2023.0009
Abstract:

In view of the small watermark embedding capacity and poor robustness against geometric attacks in most of the existing zero-watermarking schemes for color images, a robust zero-watermarking algorithm with a large capacity based on combined transform domain and bit-plane decomposition was proposed. ...

A system group maintenance scheduling method based on iteratively dynamic information
YANG Li, CHEN Yi, GAO Kaiye, MA Xiaobing, ZHAO Yu
2024, 50(7): 2104-2112. doi: 10.13700/j.bh.1001-5965.2022.0578
Abstract:

Availability is an important index to measure the service efficiency of equipment system. At present, most of the group maintenance frameworks for system availability optimization are static, which cannot make full use of health status information to effectively adjust real-time maintenance plans. T...

Numerical simulation of separation characteristics for internally buried weapon at high Mach number
CHEN Bing, LUO Lei, JIANG Anlin, WU Xiaojun, ZHANG Peihong, JIA Hongyin
2024, 50(7): 2113-2122. doi: 10.13700/j.bh.1001-5965.2022.0627
Abstract:

The internal weapon may exhibit distinct separation characteristics due to the greater shear layer and shock wave of the high Mach number (Ma > 2) weapon bay, as well as distinct flow characteristics compared to the subsonic, transonic, and supersonic weapon bays. In this paper, using the unstruc...

Sensitivity encoding reconstruction algorithm based on multi-category dictionary learning
DUAN Jizhong, WANG Chengju
2024, 50(7): 2123-2132. doi: 10.13700/j.bh.1001-5965.2022.0571
Abstract:

The sensitivity encoding (SENSE) method explicitly utilizes sensitivity information from multiple receiving coils to reduce scan time. The images reconstructed using the SENSE model have a portion of blurring artifacts that are not conducive to medical diagnosis. We propose a sensitivity coding reco...

Parameter identification of solar cell model based on RCJAYA algorithm
OUYANG Chengtian, HUANG Zuwei, LIU Yujia, ZHANG Lin, ZHU Donglin, ZHOU Changjun
2024, 50(7): 2133-2140. doi: 10.13700/j.bh.1001-5965.2022.0576
Abstract:

A JAYA algorithm based on the ranking probability quantization mechanism and chaotic perturbation (RCJAYA) is proposed as a discrimination approach to increase the precision and accuracy of the intelligent optimization algorithm to detect solar cell parameters.The RCJAYA algorithm selects different ...

Small target detection algorithm based on improved Double-Head RCNN for UAV aerial images
WANG Dianwei, HU Lichen, FANG Jie, XU Zhijie
2024, 50(7): 2141-2149. doi: 10.13700/j.bh.1001-5965.2022.0591
Abstract:

The feature information of small targets in unmanned aerial vehicle aerial images is small and easily interfered with by noise, which leads to the high missed detection and false detection rates of existing algorithms. To address these issues, a small target detection algorithm based on an improved ...

Lane line detection incorporating CBAM mechanism and deformable convolutional network
HU Dandan, ZHANG Zhongting, NIU Guochen
2024, 50(7): 2150-2160. doi: 10.13700/j.bh.1001-5965.2022.0601
Abstract:

In order to meet the accuracy and real-time requirements of autonomous driving and advanced driver assistance systems (ADAS) for lane line detection, a CADCN lane line detection method incorporating convolutional block attention module (CBAM) mechanism and deformable convolutional network (DCN) was ...

Insulator self-explosion detection in transmission line based on CenterNet fusing lightweight features
GOU Junnian, DU Susu, WANG Shiduo, ZHANG Xinyue
2024, 50(7): 2161-2171. doi: 10.13700/j.bh.1001-5965.2022.0602
Abstract:

Intelligent inspection of transmission lines is an inevitable requirement for the construction of a new generation of power systems. At present, the detection model based on deep learning has too many parameters, which makes it difficult to deploy unmanned aerial vehicles (UAVs) at the edge. In orde...

Tensile properties of rapid repaired CCF300/QY8911 laminates with broken hole damage
HOU Rili, WANG Chunyu, ZHOU Ping
2024, 50(7): 2172-2183. doi: 10.13700/j.bh.1001-5965.2023.0485
Abstract:

The tensile strength of the CCF300/QY8911 composite laminate after hole damage repair was evaluated using a set of rules and characterization methods. To obtain the necessary data, tensile tests were conducted on standard specimens made from the original material, damaged specimens without repair, a...

Runway temperature data mechanism joint prediction based on LSTM under ice and snow
CHEN Bin, LIU Yue, YIN Kailang, FANG Xun
2024, 50(7): 2184-2194. doi: 10.13700/j.bh.1001-5965.2022.0579
Abstract:

Runway temperature is an important factor in runway icing. Fully considering the transient characteristics of the temperature mechanism model and the time sequence of temperature multivariate time series data, the paper has developed a joint model based on the long short term memory (LSTM) neural ne...

An automatic and real-time detection method of IoT in-the-wild vulnerability attack
HE Qinglin, WANG Lihong, CHEN Yanjiao, WANG Xing
2024, 50(7): 2195-2205. doi: 10.13700/j.bh.1001-5965.2022.0592
Abstract:

The vast number of Internet-connected internet of things (IoT) devices are susceptible to hacking and exploitation, which can lead to the paralysis of critical IoT applications. Vulnerability exploitation is a common method of attack on IoT devices; however, due to the diverse, mutable, and highly d...

Investigation on aerodynamics of a helicopter approaching an active control deck
TAN Jianfeng, XING Xiaobing, CUI Zhao, WU Jie, ZHANG Weiguo
2024, 50(7): 2206-2217. doi: 10.13700/j.bh.1001-5965.2022.0615
Abstract:

Passive and active flow controls were used to reduce the turbulence intensity of ship airwake, but there was a recirculation zone on the deck resulting in intensively unsteady airloads of a helicopter. Thus, a novel active control deck (ACD) which can be automatically lifted up and descended is firs...

Taxi-in time prediction of arrival flight
TANG Xiaowei, DING Ye, ZHANG Shengrun, REN Siyu, WU Jiaqi
2024, 50(7): 2218-2224. doi: 10.13700/j.bh.1001-5965.2022.0625
Abstract:

Accurate prediction of flight taxi-in time has a significant meaning in allocating aircraft support resources reasonably and improving airport surface movement efficiency. Therefore, a method of taxi-in time prediction based on machine learning model is proposed. It can effectively overcome the defi...

Research on multi-layer heterogeneous chain sequence risk propagation model in airport movement area
WU Wei, WU Zexuan, WANG Xinglong
2024, 50(7): 2225-2236. doi: 10.13700/j.bh.1001-5965.2023.0203
Abstract:

A multi-layer heterogeneous network risk propagation model was built using complex network theory and the causal chain relationship between risk factors in order to better characterize the characteristics of operational risks' propagation in flight areas and improve the safety management capabilitie...

Software robot-based application behavior simulation for cyber security range in industrial control field
LIU Zhiyao, ZHANG Ge, LIU Hongri, ZHANG Xu, CHEN Yilu, WANG Bailing
2024, 50(7): 2237-2244. doi: 10.13700/j.bh.1001-5965.2022.0597
Abstract:

The cyber security range in the industrial control field provides important support for studies on industrial control system (ICS) security. The application behavior simulation is a crucial task for the cyber security range in the industrial control field. Therefore, a software robot method was prop...

Design and analysis of ground test control circuit on liquid rocket engine
XU Yong, GUO Hongjie, CHAO Lide, HUANG Junjie, LIANG Guozhu
2024, 50(7): 2245-2255. doi: 10.13700/j.bh.1001-5965.2022.0614
Abstract:

Aiming at the problems that the liquid rocket engine ground test control system must suppress the pulse noise at the input end of the control circuit, the peak inverse voltage at the output end and the low measurement accuracy of the control current, a control drive and control current measurement c...

A varying coefficient geographically weighted spatial lag model for compositional data
Huang Tingting
2024, 50(7): 2256-2264. doi: 10.13700/j.bh.1001-5965.2023.0347
Abstract:

When it comes to area data with compositional factors, existing regression models seldom ever take spatial heterogeneity into account. To solve the problem, a compositional spatial autoregressive model with varying coefficients is proposed. By assuming that the spatial lag parameter, the composition...

Multiple high-speed maneuvering target detection method based on improved orthogonal matching pursuit algorithm
WANG Yang, ZHANG Xiaokuan, MA Qiankuo, ZHENG Shuyu, ZONG Binfeng, XU Jiahua
2024, 50(7): 2265-2271. doi: 10.13700/j.bh.1001-5965.2022.0580
Abstract:

An improved orthogonal matching pursuit (OMP) algorithm is proposed for the detection of multiple high-speed maneuvering targets. Based on the maneuvering characteristics of a high-speed target, a signal model is established at first. Then, an improved OMP algorithm is used to estimate motion parame...

Strong tracking CKF adaptive interactive multiple model tracking algorithm based on hypersonic target
LUO Yalun, LIAO Yurong, LI Zhaoming, NI Shuyan
2024, 50(7): 2272-2283. doi: 10.13700/j.bh.1001-5965.2022.0587
Abstract:

Hypersonic targets have complex motion states and high maneuverability. The conventional interactive multiple model (IMM) technique converges slowly and tracks poorly. Based on numerous fading variables, an adaptive interactive multiple model (AIMM) algorithm with strong tracking for cubature Kalman...

Fine-grained image classification method with noisy labels based on retrieval augmentation
BAO Heng, DENG Lirui, ZHANG Liang, CHEN Xunxun
2024, 50(7): 2284-2292. doi: 10.13700/j.bh.1001-5965.2022.0589
Abstract:

In the application of Internet audio and video content analysis, it is of great significance to establish a fast fine-grained image classification method with lowlabeling costs. Due to the more similar appearance features between categories and the existence of interference factors such as illuminat...

Threat intelligence attribution method based on graph attention mechanism
WANG Ting, YAN Hanbing, LANG Bo
2024, 50(7): 2293-2303. doi: 10.13700/j.bh.1001-5965.2022.0590
Abstract:

Threat intelligence correlation analysis has become an effective way to trace the source of cyber attacks. The threat intelligence analysis reports of different advanced persistent threat (APT) organizations were crawled from the public threat intelligence sources, and a threat intelligence report c...

Mining traffic detection based on automated private protocol identification
TONG Ruiqian, HU Xianan, LIU Youran, QIN Yan, ZHANG Ning, WANG Qiang
2024, 50(7): 2304-2313. doi: 10.13700/j.bh.1001-5965.2022.0598
Abstract:

To meet the demand for private protocol traffic detection and identification during cryptocurrency mining, an automated communication protocol traffic identification method for unknown mining behaviors was proposed. The N-gram message format segmentation algorithm and regular expression generation a...

Effect of small inclination angle on heat transfer performance of Ω-shaped bending heat pipe
WANG Zhuo, PAN Yuhui, ZHAO Rui, NIAN Yongle, CHENG Wenlong
2024, 50(7): 2314-2321. doi: 10.13700/j.bh.1001-5965.2022.0603
Abstract:

An experimental platform for studying the heat transfer performance of heat pipes was set up to investigate the effect of a small inclination angle on the heat transfer performance of Ω-shaped bending heat pipes. The temperature distribution, total thermal resistance, thermal conductivity, and maxim...

Design of suspension weight-support rehabilitation system adapted to fluctuation of human center of gravity
WANG Chuang, CHEN Wenjie, CHEN Weihai, SUN Xiantao, LIN Yan
2024, 50(7): 2322-2330. doi: 10.13700/j.bh.1001-5965.2022.0605
Abstract:

The training that patients undergoing lower limb rehabilitation receive in walking is significantly impacted by the body weight support system. Most of the existing lower limb rehabilitation exoskeleton weight support devices only consider how to reduce the percentage of the patient's body weight an...

Tracking control of unmanned aerial vehicle swarms with leader-following double formation
ZHANG Qingchuan, WANG Le, XI Jianxiang, WANG Cheng
2024, 50(7): 2331-2342. doi: 10.13700/j.bh.1001-5965.2022.0607
Abstract:

In this paper, for a quadrotor unmanned aerial vehicle swarm with multiple leaders, a time-varying formation tracking control analysis and design method is proposed to realize the leader-following double formation structure. First, time-varying formation tracking protocols are constructed based on t...

Model correction method for CFD numerical simulation under mixed aleatory and epistemic uncertainty
LI Zexian, MA Mengying, WU Jianhui, XIONG Fenfen, WANG Bomin
2024, 50(7): 2343-2353. doi: 10.13700/j.bh.1001-5965.2022.0624
Abstract:

A type of model updating framework is proposed, aiming at the challenge of CFD model updating under mixed aleatory and epistemic uncertainty. The framework integrates mixed uncertainty quantification, global sensitivity analysis and parameter updating strategy. The method of mixed uncertainty quanti...

Station keeping control for aerostat in wind fields based on deep reinforcement learning
BAI Fangchao, YANG Xixiang, DENG Xiaolong, HOU Zhongxi
2024, 50(7): 2354-2366. doi: 10.13700/j.bh.1001-5965.2022.0629
Abstract:

In this paper, a stratospheric aerostat station keeping model is established. Based on Markov decision process, Double Deep Q-learning with prioritized experience replay is applied to stratospheric aerostat station keeping control under dynamic and non-dynamic conditions. Ultimately, metrics like th...