Open Access
Issue
Wuhan Univ. J. Nat. Sci.
Volume 28, Number 4, August 2023
Page(s) 309 - 316
DOI https://doi.org/10.1051/wujns/2023284309
Published online 06 September 2023
  1. Bouzekri E, Canny A, Martinie C, et al. Deep system knowledge required: Revisiting UCD contribution in the design of complex command and control systems[C]// 2019 International Federation for Information Processing. Washington D C: IEEE , 2019: 699-720. [Google Scholar]
  2. Armenis D. An experiment on the utility of blue force tracker: The costs and benefits of having God's eye view[J]. International Journal of Intelligent Defence Support Systems, 2010, 3(3/4): 207-224. [CrossRef] [Google Scholar]
  3. Vacca W A. The social context of technological systems: Dreadnoughts, computers, and flags[J]. Environment Systems and Decisions, 2019, 39(2): 154-162. [CrossRef] [Google Scholar]
  4. Schmidtke H R. TextMap: A general purpose visualization system[J]. Cognitive Systems Research, 2020, 59: 27-36. [CrossRef] [Google Scholar]
  5. Zhang J R, Wang G, Wang S Y. Command and control system construction in big data era[C]// 2018 International Conference on Computer Information Science and Application Technology. New York: IEEE, 2018, 2018: 1-6. [Google Scholar]
  6. Dong J, Wu G W, Yang T T, et al. Battlefield situation awareness and networking based on agent distributed computing[J]. Physical Communication, 2019, 33(c): 178-186. [CrossRef] [Google Scholar]
  7. Lin K, Xia F Z, Li C S, et al. Emotion-aware system design for the battlefield environment[J]. Information Fusion, 2019, 47: 102-110. [CrossRef] [Google Scholar]
  8. Gao Y, Ma X H, Jiang T, et al. Based on two and three dimensional technology to quickly build a virtual battlefield[J]. Energy Procedia, 2012, 17: 630-637. [CrossRef] [Google Scholar]
  9. Regragui Y, Moussa N. Agent-based system simulation of wireless battlefield networks[J]. Computers and Electrical Engineering, 2016, 56: 313-333. [CrossRef] [Google Scholar]
  10. Zong W, Chow Y W, Susilo W. Interactive three-dimensional visualization of network intrusion detection data for machine learning[J]. Future Generation Computer Systems, 2019, 102: 292-306. [Google Scholar]
  11. Fan L J, Ling Y X, Liao L C, et al. An improved evaluation method based on cloud models for situation consistency within the battlefield of joint operations[J]. Procedia Engineering, 2012, 29: 1590-1595. [CrossRef] [Google Scholar]
  12. Li J C, Ge B F, Zhao D L, et al. Meta-path-based weapon-target recommendation in heterogeneous combat network[J]. IEEE Systems Journal, 2019, 13(4): 4433-4441. [NASA ADS] [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.