skip to main content
10.1145/3627341.3630384acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccvitConference Proceedingsconference-collections
research-article

Abnormal monitoring Method of Radar Operation and Maintenance Information Based On Risk Extraction

Published: 15 December 2023 Publication History

Abstract

Accelerating the integrated development of mechanization, informatization and intelligence in weapons and equipment is the only way for the armed forces to realize the modernization of weapons and equipment. However, due to reasons such as network security, data security, technical reliability and so on, the intelligent progress of military units themselves is very slow. In the field of integrated radar system support, the operation and maintenance information of the radar system is usually sent by each component device to the operation and maintenance software in the integrated electronic chassis, and the operation and maintenance data is displayed by the display and control software. The effective method of automatic monitoring of operation and maintenance information is lacking through the observation of abnormal situations by the on-duty personnel, and professional operation and maintenance personnel are lacking when anomalies occur. It is difficult to locate the fault and requires remote technical personnel to locate the problem, which is time-consuming and labor-intensive. In this paper, aiming at this problem, we developed an anomaly monitoring method for radar system operation and maintenance information that can perform anomaly prediction and anomaly factor analysis, describes the event extraction and anomaly prediction methods in detail, and verified the feasibility of the anomaly prediction method through comparative experiments.

References

[1]
Lyu Y,Pang Z,Zhou C, Prognostics and health management technology for radar system[J]. MATEC Web of Conferences,2020,309.
[2]
José Paulo G. de Oliveira, Bastos-Filho C J A, Oliveira S C .Non-invasive embedded system hardware/firmware anomaly detection based on the electric current signature[J].Advanced Engineering Informatics, 2022, 51:101519-.
[3]
B. Cantrell, Development of a Digital Array Radar (DAR). IEEE Aerospace and Electronic Systems Magazine 17.3(2002).
[4]
SHAO Chunsheng. Study Status and Development Trend of Phased Array Radar[J]. Modern Radar, 2016, 38(06): 1-4+ 12. 16592/ j. cnki. 1004-7859. 2016. 06. 001.
[5]
Zheng Yuanzhu,Yang De, A Study on Condition-based Maintenance Technology of Phased Array Radars[J].Modern Radar,2020,42(10):12-17+21.
[6]
Chen Jing, Zheng Chuiding, Li Guimin, Jiang Hao, Liao Xiren. Research on power consumption anomaly identification of industrial users considering industry relevance[J]. Chinese Journal of Scienific Instrument, 2023, 44(04): 72-81. j. cnki. cjsi.J2210627.
[7]
Moizuddin M D, Jose M V. A bio-inspired hybrid deep learning model for network intrusion detection[J].Knowledge-based systems, 2022(Feb.28):238.
[8]
Omar Yamila M,and Plapper Peter."A Survey of Information Entropy Metrics for Complex Networks." Entropy (Basel, Switzerland) 22.12(2020).
[9]
Zhang J, Huang W, Ji D, Globally normalized neural model for joint entity and event extraction[J]. Information Processing & Management, 2021, 58(5): 102636. 1016/ j.ipm.2021.102636.
[10]
Tee P, Parisis G, Wakeman I. Vertex entropy as a critical node measure in network monitoring[J]. IEEE Transactions on Network and Service Management, 2017, 14(3): 646-660.
[11]
Hochreiter S, Schmidhuber J. Long Short-Term Memory[J]. Neural Computation, 1997, 9(8):1735-1780.
[12]
Gf A, Schmidhuber J, F Cummins. Learning to Forget: Continual Prediction with LSTM[M]. Istituto Dalle Molle Di Studi Sull Intelligenza Artificiale, 1999.
[13]
Zhou Xinpeng. Research on problem classification based on deep learning [D]. Harbin Institute of Technology, 2016.
[14]
Cheng Ziheng, Recurrent Neural Networks for Snapshot Compressive Imaging. IEEE transactions on pattern analysis and machine intelligence PP.(2022).

Index Terms

  1. Abnormal monitoring Method of Radar Operation and Maintenance Information Based On Risk Extraction
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICCVIT '23: Proceedings of the 2023 International Conference on Computer, Vision and Intelligent Technology
        August 2023
        378 pages
        ISBN:9798400708701
        DOI:10.1145/3627341
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 15 December 2023

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Anomaly monitoring
        2. Attention mechanism
        3. Knowledge extraction

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        ICCVIT 2023

        Acceptance Rates

        ICCVIT '23 Paper Acceptance Rate 54 of 142 submissions, 38%;
        Overall Acceptance Rate 54 of 142 submissions, 38%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 13
          Total Downloads
        • Downloads (Last 12 months)9
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 28 Feb 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media