10 results on '"Zhanwu Li"'
Search Results
2. Relationships between Perron–Frobenius eigenvalue and measurements of loops in networks
- Author
-
Yingxin Kou, An Xu, Zhanwu Li, Yizhe Chang, and Lei Chen
- Subjects
Statistics and Probability ,Random graph ,Loop (graph theory) ,Degree (graph theory) ,Monotonic function ,Complex network ,Condensed Matter Physics ,Topology ,01 natural sciences ,Shape parameter ,010305 fluids & plasmas ,0103 physical sciences ,010306 general physics ,Scale parameter ,Mathematics ,Weibull distribution - Abstract
The Perron–Frobenius eigenvalue (PFE) is widely used as measurement of the number of loops in networks, but what exactly the relationship between the PFE and the number of loops in networks is has not been researched yet, is it strictly monotonically increasing? And what are the relationships between the PFE and other measurements of loops in networks? Such as the average loop degree of nodes, and the distribution of loop ranks. We make researches on these questions based on samples of ER random network, NW small-world network and BA scale-free network, and the results confirm that, both the number of loops in network and the average loop degree of nodes of all samples do increase with the increase of the PFE in general trend, but neither of them are strictly monotonically increasing, so the PFE is capable to be used as a rough estimative measurement of the number of loops in networks and the average loop degree of nodes. Furthermore, we find that a majority of the loop ranks of all samples obey Weibull distribution, of which the scale parameter A and the shape parameter B have approximate power-law relationships with the PFE of the samples.
- Published
- 2018
- Full Text
- View/download PDF
3. Empirical research on complex networks modeling of combat SoS based on data from real war-game, Part I: Statistical characteristics
- Author
-
Cheng Wu, Lei Chen, Yingxin Kou, Zhanwu Li, and An Xu
- Subjects
Statistics and Probability ,Exponential distribution ,business.industry ,Computer science ,Quantitative Biology::Molecular Networks ,Eigenvector centrality ,Complex network ,Condensed Matter Physics ,computer.software_genre ,Degree distribution ,01 natural sciences ,Modularity ,Telecommunications network ,010305 fluids & plasmas ,Betweenness centrality ,0103 physical sciences ,Data mining ,010306 general physics ,business ,Centrality ,Subnetwork ,computer ,Computer network - Abstract
We build a complex networks model of combat System-of-Systems (SoS) based on empirical data from a real war-game, this model is a combination of command & control (C2) subnetwork, sensors subnetwork, influencers subnetwork and logistical support subnetwork, each subnetwork has idiographic components and statistical characteristics. The C2 subnetwork is the core of whole combat SoS, it has a hierarchical structure with no modularity, of which robustness is strong enough to maintain normal operation after any two nodes is destroyed; the sensors subnetwork and influencers subnetwork are like sense organ and limbs of whole combat SoS, they are both flat modular networks of which degree distribution obey GEV distribution and power-law distribution respectively. The communication network is the combination of all subnetworks, it is an assortative Small-World network with core–periphery structure, the Intelligence & Communication Stations/Command Center integrated with C2 nodes in the first three level act as the hub nodes in communication network, and all the fourth-level C2 nodes, sensors, influencers and logistical support nodes have communication capability, they act as the periphery nodes in communication network, its degree distribution obeys exponential distribution in the beginning, Gaussian distribution in the middle, and power-law distribution in the end, and its path length obeys GEV distribution. The betweenness centrality distribution, closeness centrality distribution and eigenvector centrality are also been analyzed to measure the vulnerability of nodes.
- Published
- 2018
- Full Text
- View/download PDF
4. Safety, Survival, and Efficacy of Preserving Left Colonic Artery in Rectal Cancer Surgery: A Meta-Analysis and Review
- Author
-
WenJun Wang, Zhanwu Li, ShaoMing Sun, and YongHe Cui
- Subjects
medicine.medical_specialty ,Colon ,Operative Time ,Blood Loss, Surgical ,Anastomotic Leak ,03 medical and health sciences ,0302 clinical medicine ,medicine ,Humans ,Survival rate ,Urinary retention ,business.industry ,Rectal Neoplasms ,Incidence (epidemiology) ,Significant difference ,Arteries ,Urinary Retention ,Surgery ,Survival Rate ,medicine.anatomical_structure ,030220 oncology & carcinogenesis ,Meta-analysis ,Lymphatic Metastasis ,Rectal cancer surgery ,030211 gastroenterology & hepatology ,Lymph ,Lymph Nodes ,medicine.symptom ,Neoplasm Recurrence, Local ,business ,Artery - Abstract
Purpose: This study analyzes the effect, long-term survival rate, and complications about preserving the left colonic artery (LCAP) in rectal cancer surgery. Methods: Relevant articles were systematically retrieved from multiple electronic databases, for example, EMBASE, BioMed Central, PubMed, Web of Science, and Cochrane. The time for retrieving was from the establishment of the database to December 31, 2018. Evaluated endpoints were effect of LCAP on the curative effect of rectal neoplasms, such as operation time, the amount of bleeding during the operation, root lymph nodes positive number, and the related complications (anastomotic leakage, etc.), postoperative urinary retention, 5-year survival rate, and recurrence differences in rates. Results: Totally 12 studies were included in this review. The meta-analysis showed that LCAP has less operation time and lower anastomotic leakage incidence. Intraoperative bleeding, root lymph nodes, and other complications did not show any significant difference. Conclusions: LCAP in radical rectal cancer surgery ensures both the radical resection of the tumor and the safety of the operation. So it can provide a new approach to the management of blood vessels and lymph nodes.
- Published
- 2019
5. Unmanned Aerial Vehicle Formation Consensus Algorithm Based on Virtual Relative Position Errors
- Author
-
Wei Huang, Yi Lu, Zhanwu Li, and Wenliang Dong
- Subjects
Equilibrium point ,Consensus algorithm ,0209 industrial biotechnology ,Ideal (set theory) ,Computer science ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,02 engineering and technology ,Algorithm convergence ,Computer Science::Robotics ,Algebraic graph theory ,020901 industrial engineering & automation ,Computer Science::Systems and Control ,Position (vector) ,Algorithm - Abstract
To solve the problem of existing consensus algorithms converging to the same equilibrium point, a new consensus algorithm for unmanned aerial vehicle formation is proposed. By constructing virtual relative position errors, this algorithm's equilibrium point isn't determined by initial states and it can make all members approaching to ideal positions as well as consistent velocity. Based on algebraic graph theory, the topological conditions and parameter conditions required by algorithm convergence are derived. Simulation results verify the validity of this algorithm which is suitable for general design of unmanned aerial vehicle formation system.
- Published
- 2019
- Full Text
- View/download PDF
6. A Modified Pareto Ant Colony Optimization Approach to Solve Biobjective Weapon-Target Assignment Problem
- Author
-
You Li, Yingxin Kou, Zhanwu Li, Yizhe Chang, and An Xu
- Subjects
0209 industrial biotechnology ,Mathematical optimization ,Article Subject ,Heuristic (computer science) ,lcsh:Motor vehicles. Aeronautics. Astronautics ,Ant colony optimization algorithms ,Pareto principle ,Aerospace Engineering ,Boundary (topology) ,02 engineering and technology ,Multi-objective optimization ,Field (computer science) ,Set (abstract data type) ,020901 industrial engineering & automation ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,lcsh:TL1-4050 ,Weapon target assignment problem ,Mathematics - Abstract
The weapon-target assignment (WTA) problem, known as an NP-complete problem, aims at seeking a proper assignment of weapons to targets. The biobjective WTA (BOWTA) optimization model which maximizes the expected damage of the enemy and minimizes the cost of missiles is designed in this paper. A modified Pareto ant colony optimization (MPACO) algorithm is used to solve the BOWTA problem. In order to avoid defects in traditional optimization algorithms and obtain a set of Pareto solutions efficiently, MPACO algorithm based on new designed operators is proposed, including a dynamic heuristic information calculation approach, an improved movement probability rule, a dynamic evaporation rate strategy, a global updating rule of pheromone, and a boundary symmetric mutation strategy. In order to simulate real air combat, the pilot operation factor is introduced into the BOWTA model. Finally, we apply the MPACO algorithm and other algorithms to the model and compare the data. Simulation results show that the proposed algorithm is successfully applied in the field of WTA which improves the performance of the traditional P-ACO algorithm effectively and produces better solutions than the two well-known multiobjective optimization algorithms NSGA-II and SPEA-II.
- Published
- 2017
- Full Text
- View/download PDF
7. An Improved Nondominated Sorting Genetic Algorithm III Method for Solving Multiobjective Weapon-Target Assignment Part I: The Value of Fighter Combat
- Author
-
You Li, Yingxin Kou, and Zhanwu Li
- Subjects
Mathematical optimization ,education.field_of_study ,021103 operations research ,Sorting algorithm ,Article Subject ,Computer science ,lcsh:Motor vehicles. Aeronautics. Astronautics ,Population ,0211 other engineering and technologies ,Sorting ,Aerospace Engineering ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,02 engineering and technology ,Multi-objective optimization ,Operator (computer programming) ,Genetic algorithm ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,lcsh:TL1-4050 ,education ,Assignment problem ,Selection (genetic algorithm) - Abstract
Multiobjective weapon-target assignment is a type of NP-complete problem, and the reasonable assignment of weapons is beneficial to attack and defense. In order to simulate a real battlefield environment, we introduce a new objective—the value of fighter combat on the basis of the original two-objective model. The new three-objective model includes maximizing the expected damage of the enemy, minimizing the cost of missiles, and maximizing the value of fighter combat. To solve the problem with complex constraints, an improved nondominated sorting algorithm III is proposed in this paper. In the proposed algorithm, a series of reference points with good performances in convergence and distribution are continuously generated according to the current population to guide the evolution; otherwise, useless reference points are eliminated. Moreover, an online operator selection mechanism is incorporated into the NSGA-III framework to autonomously select the most suitable operator while solving the problem. Finally, the proposed algorithm is applied to a typical instance and compared with other algorithms to verify its feasibility and effectiveness. Simulation results show that the proposed algorithm is successfully applied to the multiobjective weapon-target assignment problem, which effectively improves the performance of the traditional NSGA-III and can produce better solutions than the two multiobjective optimization algorithms NSGA-II and MPACO.
- Published
- 2018
- Full Text
- View/download PDF
8. Method for air combat formation optimization with uncertain information
- Author
-
Xiaozhe Zhao, Yizhe Chang, Linyuan Gui, Hai-yan Yang, Deyun Zhou, and Zhanwu Li
- Subjects
060201 languages & linguistics ,Basis (linear algebra) ,Operations research ,Computer science ,business.industry ,Usability ,06 humanities and the arts ,Fuzzy logic ,Power (physics) ,Level set ,Prospect theory ,0602 languages and literature ,Probability distribution ,Set (psychology) ,business - Abstract
For solving the problem of difficulty to select formation with uncertain information of target equipment in air combat condition, a method for formation optimization based on commanders' subjective recognition is proposed. First, combat power of lighter is calculated, which is the basis of evaluation for combat power of target via commanders' subjective recognition. Then the air combat formation is optimized by employing prospect theory and comprehensive fuzzy evaluation. Finally, an application example is set to illustrate the validity and usability of the method proposed.
- Published
- 2017
- Full Text
- View/download PDF
9. Infrared point target detection based on multiscale homogeneous feature fusion
- Author
-
Zhanwu Li, Tian Kou, Haiyan Wang, and Fang Wang
- Subjects
Feature fusion ,Brightness ,Infrared ,Computer science ,business.industry ,Multispectral image fusion ,Pattern recognition ,02 engineering and technology ,021001 nanoscience & nanotechnology ,Condensed Matter Physics ,01 natural sciences ,Local structure ,Atomic and Molecular Physics, and Optics ,Electronic, Optical and Magnetic Materials ,010309 optics ,Homogeneous ,Robustness (computer science) ,0103 physical sciences ,Artificial intelligence ,0210 nano-technology ,Point target ,business - Abstract
In view of the difficult detection of infrared dim point target from complex backgrounds, a multiscale homogeneous feature (MHF) based multispectral image fusion detection method is proposed in this paper. Inspired by the local contrast measure (LCM), we extract two local statistical features from the perspective of the homogeneity of gray difference distribution to characterize local structure of the infrared point target. Based on these two local features, we obtain the MHF map that can effectively highlight the potential point targets and suppress the backgrounds simultaneously. For the pixel-size electronic noise (PSEN) and some similar local structures to the point target, the multispectral image fusion detection is a positive way to alleviate these interferences and promote the robustness of the dim point target detection. Experimental results on six real scenarios and synthetic scenarios demonstrate that the proposed method not only works more stably for different target sizes and brightness, but also can achieve superior detection performance compared with the state-of-art detection methods.
- Published
- 2019
- Full Text
- View/download PDF
10. Approach to WTA in air combat using IAFSA-IHS algorithm
- Author
-
An Xu, You Li, Zhanwu Li, Yizhe Chang, Yingxin Kou, and Haiyan Yang
- Subjects
Computer science ,010401 analytical chemistry ,Real-time computing ,0202 electrical engineering, electronic engineering, information engineering ,Air combat ,020201 artificial intelligence & image processing ,02 engineering and technology ,01 natural sciences ,0104 chemical sciences - Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.