Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yajie Dou is active.

Publication


Featured researches published by Yajie Dou.


IEEE Systems Journal | 2017

An Approach for Weapon System-of-Systems Scheme Generation Based on a Supernetwork Granular Analysis

Qingsong Zhao; Shanfei Li; Yajie Dou; Xiaopan Wang; Kewei Yang

A weapon system of systems (WSoS) is a collection of interdependent systems providing multiple interdependent capabilities to support multiple tasks. In this paper, we propose a WSoS scheme generation method based on a granular analysis of a WSoS supernetwork. More precisely, we establish a WSoS supernetwork model based on a “network-centered” combat mode. Next, based on the theory of quotient space, a granular analysis is presented to reduce the complexity of the WSoS scheme generation. Then, the WSoS supernetwork is converted into a directed weighted network with multiple granularities, and an algorithm for the WSoS scheme generation based on the directed weighted network is presented. Consequently, each WSoS scheme corresponds to a path in the directed weighted network, and the capability of supporting the realization of a task by a WSoS can be analyzed based on the schemes. Finally, the feasibility of the proposed approach is demonstrated using an illustrative example.


Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture | 2015

An integrated technology pushing and requirement pulling model for weapon system portfolio selection in defence acquisition and manufacturing

Yajie Dou; Pengle Zhang; Bingfeng Ge; Jiang Jiang; Yingwu Chen

An integrated technology pushing and requirement pulling model is presented to address the problem of selecting a suitable portfolio from several candidate multi-function weapon systems in the defence acquisition and manufacturing process. The optimal weapon system portfolios both satisfy the technical effects and compound capability requirements with relative acquisition and manufacturing constraints. In the first stage, multiple criteria analysis is employed to build a portfolio value hierarchal structure from two main perspectives: a five-level set of technology pushing measures and a two-level set of requirement pulling measures. The developmental maturity level of a technology, its functionality, systems, capability, and portfolio are all captured by technology pushing measures, based on an additive multiple criteria model. The requirement satisfaction level of a system or portfolio is obtained by requirement pulling measures based on linear programming optimization and the first-ignorance model, which is founded on expert opinion, using pairwise comparisons. In the second stage, by means of manufacturing cost consumption and capability requirement constraint assumptions, the dominance structure of the portfolios is designed and all the technology and requirement portfolios are generated as a set of Pareto-optimal solutions, through multi-objective integer programming. An illustrative case study is presented to validate the efficiency of the proposed model, and the computational results are further analysed and discussed.


international conference on system of systems engineering | 2012

Executable System-of-Systems architecting based on DoDAF meta-model

Long Li; Yajie Dou; Bingfeng Ge; Kewei Yang; Yingwu Chen

Methods used to gain executable architecture are all based on transforming view models to executable models, which can not take the advantage of “data-centric” approach adopted by DoDAF2.0. A novel executable architecting approach transforming DoDAF Meta-model (DM2) to executable model directly is proposed, which can overcame the limitation of traditional approaches that information consistency and data completeness may be damaged. An example to analyze Command and Control (C2) capability in Air Defense System-of-Systems (ADSoS) is provided in detail to illustrate the process to transform DM2 to Coloured Petri Net (CPN). Besides, the input and output data is also given in detail along with the process illustration.


IEEE Conference Anthology | 2013

Capability requirement analysis of airdrop assault system-of-systems based on UML/MM integrated modeling and simulation

Yajie Dou; Long Li; Zhiwei Yang; Yingwu Chen

Large-scale helicopter group is an important part of the Airdrop Assault System of Systems (AASoS). How to plan the scale of helicopter group and achieve the best operational effectiveness is a focus of the AASoS capability requirement analysis. Based on the macro-micro characteristic of the system of systems and the individual system, airdrop assault combat models are divided into three types separately in macro and micro perspective. A UML/MM modeling method for airdrop assault combat is proposed and the models are built in UML and mathematic method (MM) respectively. In addition, an airdrop assault combat simulation system is developed and thirteen simulation plans of different scale values are designed as the inputs of the system. The optimal scale value of helicopter group under the certain scenario is gained through the analysis of the effectiveness based on the simulation results. In this scale condition, the AASoS achieves its optimal survival and time effectiveness.


Knowledge and Information Systems | 2018

Similarity measures for time series data classification using grid representation and matrix distance

Yanqing Ye; Jiang Jiang; Bingfeng Ge; Yajie Dou; Kewei Yang

Two similarity measures are proposed that can successfully capture both the numerical and point distribution characteristics of time series. More specifically, a novel grid representation for time series is first presented, with which a time series is segmented and compiled into a matrix format. Based on the proposed grid representation, two matrix matching algorithms, matrix-based Euclidean distance (GMED) and matrix-based dynamic time warping (GMDTW), are adapted to measure the similarity of matrix-like time series. Last, to assess the effectiveness of the proposed similarity measures, 1NN classification and K-means experiments are conducted using 22 online datasets from the UCR time series datasets Web site. In general, the results indicate that GMDTW measure is apparently superior to most current measures in accuracy, while the GMED can achieve much higher efficiency than dynamic time warping algorithm with equivalent performance. Furthermore, effects of the parameters in the proposed measures are analyzed and a way to determine the values of the parameters has been given.


2017 Annual IEEE International Systems Conference (SysCon) | 2017

Robust system portfolio selection with multi-function requirements and system instability

Boyuan Xia; Yajie Dou; Qingsong Zhao; Bingfeng Ge; Yang Zhang

System Portfolio Selection (SPS) problem is equivalent to multi-objective optimization problem, with multi-function requirements incommensurable. In the paper, the SPS problem is re-specified with a more practical formulation, comparing to general portfolio problem. Then, both feasible and non-inferior solution is re-defined considering characteristics of SPS problem, specifically, four rules of system function combinations are proposed according to practical cases. Then, the instability of system performance is involved in SPS problem, and the robust theory is employed to solving the uncertainty of system function values with definition of robust non-inferior solution. Next, the paper proposes an immediately updating algorithm to solve the problem of solution space exponentially growing. Finally, a case study is used to demonstrate the usefulness and effectiveness of the proposed approaches. It shows that the approach can provide an efficient guidance for decision-makers in the process of making a SPS.


IEEE Conference Anthology | 2013

Capability requirement planning of Weapon System-of-systems based on Interval Weighted Constraint Network

Yajie Dou; Long Li; Yingwu Chen; Kewei Yang

Capability-Based requirements management and planning thoughts and methods have gone increasingly deep into the development of Weapon System-of-Systems (WSoS). In the traditional top-to-bottom capability requirement planning (CRP) methods, the constraints among different capabilities indexes acquired from the tasks decomposition are neglected, which leads to the irrationalities and conflicts between different WSoS capability requirement indexes. Based on the analysis and description of capability requirements planning problem, the constraints are divided into five types and extracted from WSoS according multiple views thoughts. In addition, Interval Weighted Constraint Network (IWCN) is introduced and a consistency detection algorithm and a conflicts elimination strategy are proposed to achieve a capabilities requirement plan satisfying the tasks requirements and the capabilities indexes constraints. Finally, the practical applicability within a Joint Operations System of Systems (JOSoS) based on the space force capability requirement scheme planning is demonstrated, which proves the validation of the method built in this study.


Applied Mathematics & Information Sciences | 2014

MCDM based on Reciprocal Judgment Matrix: a Comparative Study of E-VIKOR and E-TOPSIS Algorithmic Methods with Interval Numbers

Yajie Dou; Pengle Zhang; Jiang Jiang; Kewei Yang; Yingwu Chen


Applied Mathematics & Information Sciences | 2014

Comparisons of Hybrid Multi-Objective Programming Algorithms with Grey Target and PCA for Weapon System Portfolio Selection

Yajie Dou; Pengle Zhang; Jiang Jiang; Kewei Yang; Yingwu Chen


2015 International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) | 2015

Evaluation Method of Weapons Developing program based on Program-ability satisfied degree

Xiaopan Wang; Yajie Dou; Qingsong Zhao; Sheng-ping Ji

Collaboration


Dive into the Yajie Dou's collaboration.

Top Co-Authors

Avatar

Kewei Yang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Yingwu Chen

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Bingfeng Ge

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Jiang Jiang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Long Li

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Pengle Zhang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Qingsong Zhao

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Xiaopan Wang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Boyuan Xia

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Shanfei Li

National University of Defense Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge