Novel IMM Target State Predictor for Radar-Guided Missiles in the Blind Zone

2021 ◽  
pp. 3721-3733
Author(s):  
Xiaoju Yong ◽  
Tao Zhang ◽  
Ming Hao ◽  
Xiangyan Luo
Keyword(s):  
Author(s):  
M. M. Sabitova ◽  
Z. M. Berkheeva

An assessment was made of the possibility of using the principles of lean production in the occupational pathology service, which made it possible to identify solutions and develop a step-by-step plan for implementing the necessary actions for the transition to the target state.


Author(s):  
Ramon Das

This chapter argues that the philosophical debate around humanitarian intervention would be improved if it were less ‘ideal-theoretic’. It identifies two ideal-theoretic assumptions. One, in target states where humanitarian intervention is being considered, there are two distinct and easily identified groups: ‘bad guys’ committing serious human rights abuses, and innocent civilians against whom the abuses are being committed. Two, external to the target state in question, there are suitably qualified ‘good guys’—prospective interveners who possess both the requisite military power and moral integrity. If the assumptions hold, the prospects for successful humanitarian intervention are much greater. As a contrast, some possible non-ideal assumptions are that (i) there are many bad guys in a civil war, and (ii) the good guy intervener is itself supporting some of the bad guys. If these non-ideal assumptions hold, prospects for successful humanitarian intervention are small.


Author(s):  
Petar Radanliev ◽  
David De Roure ◽  
Pete Burnap ◽  
Omar Santos

AbstractThe Internet-of-Things (IoT) triggers data protection questions and new types of cyber risks. Cyber risk regulations for the IoT, however, are still in their infancy. This is concerning, because companies integrating IoT devices and services need to perform a self-assessment of its IoT cyber security posture. At present, there are no self-assessment methods for quantifying IoT cyber risk posture. It is considered that IoT represent a complex system with too many uncontrollable risk states for quantitative risk assessment. To enable quantitative risk assessment of uncontrollable risk states in complex and coupled IoT systems, a new epistemological equation is designed and tested though comparative and empirical analysis. The comparative analysis is conducted on national digital strategies, followed by an empirical analysis of cyber risk assessment approaches. The results from the analysis present the current and a target state for IoT systems, followed by a transformation roadmap, describing how IoT systems can achieve the target state with a new epistemological analysis model. The new epistemological analysis approach enables the assessment of uncontrollable risk states in complex IoT systems—which begin to resemble artificial intelligence—and can be used for a quantitative self-assessment of IoT cyber risk posture.


Author(s):  
Zhenxing Li ◽  
Jialing Wan ◽  
Pengfei Wang ◽  
Hanli Weng ◽  
Zhenhua Li

AbstractFault section location of a single-phase grounding fault is affected by the neutral grounding mode of the system, transition resistance, and the blind zone. A fault section locating method based on an amplitude feature and an intelligent distance algorithm is proposed to eliminate the influence of the above factors. By analyzing and comparing the amplitude characteristics of the zero-sequence current transient components at both ends of the healthy section and the faulty section, a distance algorithm with strong abnormal data immune capability is introduced in this paper. The matching degree of the amplitude characteristics at both ends of the feeder section are used as the criterion and by comparing with the set threshold, the faulty section is effectively determined. Finally, simulations using Matlab/Simulink and PSCAD/EMTDC show that the proposed section locating method can locate the faulty section accurately, and is not affected by grounding mode, grounding resistance, or the blind zone.


2021 ◽  
Vol 539 ◽  
pp. 148057
Author(s):  
Shuowen Zhang ◽  
Qingyu Yan ◽  
Jian Lin ◽  
Qunli Zhang ◽  
Yongfeng Lu ◽  
...  

Author(s):  
Axel Dahlberg ◽  
Stephanie Wehner

Stabilizer states form an important class of states in quantum information, and are of central importance in quantum error correction. Here, we provide an algorithm for deciding whether one stabilizer (target) state can be obtained from another stabilizer (source) state by single-qubit Clifford operations (LC), single-qubit Pauli measurements (LPM) and classical communication (CC) between sites holding the individual qubits. What is more, we provide a recipe to obtain the sequence of LC+LPM+CC operations which prepare the desired target state from the source state, and show how these operations can be applied in parallel to reach the target state in constant time. Our algorithm has applications in quantum networks, quantum computing, and can also serve as a design tool—for example, to find transformations between quantum error correcting codes. We provide a software implementation of our algorithm that makes this tool easier to apply. A key insight leading to our algorithm is to show that the problem is equivalent to one in graph theory, which is to decide whether some graph G ′ is a vertex-minor of another graph G . The vertex-minor problem is, in general, -Complete, but can be solved efficiently on graphs which are not too complex. A measure of the complexity of a graph is the rank-width which equals the Schmidt-rank width of a subclass of stabilizer states called graph states, and thus intuitively is a measure of entanglement. Here, we show that the vertex-minor problem can be solved in time O (| G | 3 ), where | G | is the size of the graph G , whenever the rank-width of G and the size of G ′ are bounded. Our algorithm is based on techniques by Courcelle for solving fixed parameter tractable problems, where here the relevant fixed parameter is the rank width. The second half of this paper serves as an accessible but far from exhausting introduction to these concepts, that could be useful for many other problems in quantum information. This article is part of a discussion meeting issue ‘Foundations of quantum mechanics and their impact on contemporary society’.


2014 ◽  
Vol 904 ◽  
pp. 325-329
Author(s):  
Hong Wei Quan ◽  
Lin Chen ◽  
Dong Liang Peng

This paper addresses the problem of the joint target tracking and classification based on data fusion. In traditional methods, a separate suite of sensors and system models are used, target tracking and target classification are usually treated as separate problems. In our JTC framework, the link between target state and class is considered and the feasibility of JTC techniques is discussed. The tracking accuracy and classification probability are improved to some extent with the more accurate classification results from classifier based on data fusion feedback to state filter.


Sign in / Sign up

Export Citation Format

Share Document