[1] 崇元, 李加祥. 对空防御态势分析中敌平台战术任务识别方法[J]. 指挥控制与仿真, 2015, 37(2): 6-12. (Chong Yuan, Li Jiaxiang.Tactical Task of Operation Platform Recognition in Situation Assessment for Antiaircraft Defending[J]. Command Control & Simulation, 2015, 37(2): 6-12.) [2] 朱波, 方立恭, 张小东. 基于贝叶斯网络的空中目标意图识别方法[J]. 现代防御技术, 2012, 40(2): 109-113. (Zhu Bo, Fang Ligong, Zhang Xiaodong.Intention Assessment to Aerial Target Based on Bayesian Network[J]. Modern Defence Technology, 2012, 40(2): 109-113.) [3] 葛顺, 夏学知. 用于战术意图识别的动态序列贝叶斯网络[J]. 系统工程与电子技术, 2014, 36(1): 76-81. (Ge Shun, Xia Xuezhi.DSBN Used for Recognition of Tactical Intenrion[J]. Systems Engineering and Electronics, 2014, 36(1): 76-81.) [4] 王昊冉, 老松杨, 白亮, 等. 基于MEBN的战术级空中目标意图识别[J]. 火力与指挥控制, 2012, 37(10): 133-138. (Wang Haoran, Lao Songyang, Bai Liang, et al.Tactical Air Target Intention Recognition Based on Multi-Entities Bayesian Network[J]. Fire Control & Command Control, 2012, 37(10): 133-138.) [5] 许友国, 林平. 战术计划识别技术在海战中的应用研究[J]. 军事运筹与系统工程, 2009, 23(1): 53-57. (Xu Youguo, Lin Ping.Research on the Application of Tactical Planning Recognition Technology in Naval Battle[J]. Military Operations Research and Systems Engineering, 2009, 23(1): 53-57.) [6] 张亮, 黄曙光, 石昭祥, 等. 基于LSTM型RNN的CAPTCHA识别方法[J]. 模式识别与人工智能, 2011, 24(1): 40-47. (Zhang Liang, Huang Shuguang, Shi Zhaoxiang, et al.CAPTCHA Recognition Method Based on RNN of LSTM[J]. PR & AI, 2011, 24(1): 40-47.) [7] 谢立东, 潘伟, 唐超, 一种基于深度学习的人体行为识别框架[J]. 模式识别与控制, 2014, 21(2): 139-146. (Xie Lidong, Pan Wei, Tang Chao.A Pyramidal Deep Learning Architecture for Human Action Recognition[J]. Int J. Modelling Identification and Control, 2014, 21(2): 139-146.) [8] Ruiz-Garcia A, Elshaw M, Altahhan A, et al.Deep Learning for Emotion Recognition in Faces [M]// Artificial Neural Networks and Machine Learning- ICANN 2016. Germany: Springer International Publishing, 2016. [9] 欧微, 柳少军, 贺筱媛, 等. 基于目标时序特征编码的战术意图识别算法[J]. 指挥控制与仿真, 2016, 38(6): 36-41. (Ou Wei, Liu Shaojun, He Xiaoyuan, et al.Algorithm for Tactical Intention Recognition Based on Target Temporal features Encoding[J]. Command Control & Simulation, 2016, 38(6): 36-41.) |