首页 > 最新文献

2021 International Conference on Military Communication and Information Systems (ICMCIS)最新文献

英文 中文
Aspect Detection Enhancement for Aspect Based Sentiment Analysis 基于方面的情感分析的方面检测增强
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486404
Adelica Ndoni, Ivana Ilic Mestric, Michael Street
This paper proposes a new approach to aspect-based sentiment analysis to provide a more accurate insight about sentiment towards certain aspects relevant for the military environment. The goal of this paper is to obtain an assessment of different approaches to aspect detection applicable to NATO specific corpora.
本文提出了一种新的基于方面的情感分析方法,以提供更准确的洞察对军事环境相关的某些方面的情感。本文的目的是获得适用于北约特定语料库的不同方面检测方法的评估。
{"title":"Aspect Detection Enhancement for Aspect Based Sentiment Analysis","authors":"Adelica Ndoni, Ivana Ilic Mestric, Michael Street","doi":"10.1109/ICMCIS52405.2021.9486404","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486404","url":null,"abstract":"This paper proposes a new approach to aspect-based sentiment analysis to provide a more accurate insight about sentiment towards certain aspects relevant for the military environment. The goal of this paper is to obtain an assessment of different approaches to aspect detection applicable to NATO specific corpora.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128434065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NATO Core Services profiling for Hybrid Tactical Networks — Results and Recommendations 北约混合战术网络核心服务概要-结果和建议
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486415
N. Jansen, M. Manso, Andrew Toth, Kevin S. Chan, T. H. Bloebaum, F. T. Johnsen
The NATO Research Task Group IST-150 "NATO Core Services profiling for Hybrid Tactical Networks" had Federated Mission Networking (FMN) as the main context and motivation for its work. IST-150 intended to investigate Core Services at the tactical level, and provide recommendations for future spirals of FMN targeting the tactical level. Specifically the Message-Oriented Middleware (MOM) Core Service was investigated through an experimental approach. Our work should be taken both as input to future FMN spirals as well as continuing IST research task groups where MOM services play a role.This paper summarizes our findings on publish/subscribe, introduces new recommendations for the use of request/response, and discusses the potential impact these findings have on the future development of FMN. We recommend the following for tactical federated systems: Using the industry standard MQTT for publish/subscribe, and replacing HTTP/TCP in REST-based services with CoAP for request/response services. This paper summarizes the highlights of our work exploring these facets of MOM.
北约研究任务小组IST-150“北约混合战术网络核心服务概要”将联邦任务网络(FMN)作为其工作的主要背景和动机。IST-150旨在调查战术层面的核心服务,并为未来针对战术层面的FMN螺旋提供建议。具体地说,通过实验方法研究了面向消息的中间件(MOM)核心服务。我们的工作既可以作为未来FMN螺旋的输入,也可以作为MOM服务发挥作用的IST继续研究任务小组的输入。本文总结了我们在发布/订阅方面的发现,介绍了使用请求/响应的新建议,并讨论了这些发现对FMN未来发展的潜在影响。对于战术联邦系统,我们的建议如下:使用行业标准MQTT进行发布/订阅,用CoAP替换基于rest的服务中的HTTP/TCP进行请求/响应服务。本文总结了我们在MOM这些方面的研究成果。
{"title":"NATO Core Services profiling for Hybrid Tactical Networks — Results and Recommendations","authors":"N. Jansen, M. Manso, Andrew Toth, Kevin S. Chan, T. H. Bloebaum, F. T. Johnsen","doi":"10.1109/ICMCIS52405.2021.9486415","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486415","url":null,"abstract":"The NATO Research Task Group IST-150 \"NATO Core Services profiling for Hybrid Tactical Networks\" had Federated Mission Networking (FMN) as the main context and motivation for its work. IST-150 intended to investigate Core Services at the tactical level, and provide recommendations for future spirals of FMN targeting the tactical level. Specifically the Message-Oriented Middleware (MOM) Core Service was investigated through an experimental approach. Our work should be taken both as input to future FMN spirals as well as continuing IST research task groups where MOM services play a role.This paper summarizes our findings on publish/subscribe, introduces new recommendations for the use of request/response, and discusses the potential impact these findings have on the future development of FMN. We recommend the following for tactical federated systems: Using the industry standard MQTT for publish/subscribe, and replacing HTTP/TCP in REST-based services with CoAP for request/response services. This paper summarizes the highlights of our work exploring these facets of MOM.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"26 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121009958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of Image Captioning and Retrieval to Support Military Decision Making 图像标注与检索在军事决策支持中的应用
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486395
D. Ghataoura, S. Ogbonnaya
Image data forms an important percentage in the makeup for providing common operational pictures (COPs) required in military decision making and tactical planning, upon which critical decisions and actions are then taken. However, the considerable volume and velocity of this data places a need to process it in a timely manner with suitable meta-data (features) extracted to support information retrieval and decision making processes. In this paper we apply and explore the benefits of using image captioning whose main task is to create machine generated sentences that can describe an image appropriately. In this way user queries can be expressed using natural language sentences (scene descriptions), in order to frame and subsequently improve the efficiency with which relevant images are retrieved
在提供军事决策和战术规划所需的共同作战图片(cop)的构成中,图像数据占重要的比例,然后在此基础上采取关键决策和行动。然而,由于数据量大、速度快,需要及时地对其进行处理,并提取合适的元数据(特征),以支持信息检索和决策过程。在本文中,我们应用并探索使用图像字幕的好处,其主要任务是创建可以适当描述图像的机器生成句子。通过这种方式,用户查询可以使用自然语言句子(场景描述)来表达,以便构建并随后提高检索相关图像的效率
{"title":"Application of Image Captioning and Retrieval to Support Military Decision Making","authors":"D. Ghataoura, S. Ogbonnaya","doi":"10.1109/ICMCIS52405.2021.9486395","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486395","url":null,"abstract":"Image data forms an important percentage in the makeup for providing common operational pictures (COPs) required in military decision making and tactical planning, upon which critical decisions and actions are then taken. However, the considerable volume and velocity of this data places a need to process it in a timely manner with suitable meta-data (features) extracted to support information retrieval and decision making processes. In this paper we apply and explore the benefits of using image captioning whose main task is to create machine generated sentences that can describe an image appropriately. In this way user queries can be expressed using natural language sentences (scene descriptions), in order to frame and subsequently improve the efficiency with which relevant images are retrieved","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126320846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cyber Security in Virtualized Communication Networks: Open Challenges for NATO 虚拟化通信网络中的网络安全:北约面临的公开挑战
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486421
R. Lopes, Caroline Bildsten, K. Wrona, Simo Huopio, Daniel Eidenskog, O. Worthington
Modern multi-nation military communication and information systems demand rapid deployment and reconfiguration to enable secure information exchange between domains belonging to different nations. In order to support such a multi-nation mission scenarios NATO has been developing the concept of a federated mission network (FMN). These networks are leveraging the advantages of software-defined networking (SDN) and network function virtualization (NFV) to adapt to a wide range of security requirements using network security functions (NSF). The investigation reported in this paper discusses two use cases, namely how to automate security policy evaluation, and how to deploy a security guard (Information Exchange Function) between network segments with different classification. Both cases use network scenarios from protected core network (PCN) because the goal is to compile open challenges to automate the deployment and management of secure coalition networks.
现代多国军事通信和信息系统需要快速部署和重构,以实现不同国家域之间的安全信息交换。为了支持这种多国任务场景,北约一直在发展联邦任务网络(FMN)的概念。这些网络利用软件定义网络(SDN)和网络功能虚拟化(NFV)的优势,利用网络安全功能(NSF)来适应广泛的安全需求。本文报告的调查讨论了两个用例,即如何自动化安全策略评估,以及如何在不同分类的网段之间部署安全防护(信息交换功能)。这两种情况都使用受保护核心网(PCN)的网络场景,因为目标是编译开放挑战,以自动部署和管理安全联盟网络。
{"title":"Cyber Security in Virtualized Communication Networks: Open Challenges for NATO","authors":"R. Lopes, Caroline Bildsten, K. Wrona, Simo Huopio, Daniel Eidenskog, O. Worthington","doi":"10.1109/ICMCIS52405.2021.9486421","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486421","url":null,"abstract":"Modern multi-nation military communication and information systems demand rapid deployment and reconfiguration to enable secure information exchange between domains belonging to different nations. In order to support such a multi-nation mission scenarios NATO has been developing the concept of a federated mission network (FMN). These networks are leveraging the advantages of software-defined networking (SDN) and network function virtualization (NFV) to adapt to a wide range of security requirements using network security functions (NSF). The investigation reported in this paper discusses two use cases, namely how to automate security policy evaluation, and how to deploy a security guard (Information Exchange Function) between network segments with different classification. Both cases use network scenarios from protected core network (PCN) because the goal is to compile open challenges to automate the deployment and management of secure coalition networks.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"417 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116525979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adapting BERT Embeddings for Text Correlation of Military Domain Specific Content 将BERT嵌入用于军事领域特定内容的文本关联
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486408
Arvid Kok, Giavid Valiyev, Michael Street
This paper addresses the problem of how to achieve similarity search for text sequence correlation with a proper semantic foundation. Natural Language Processing (NLP) is fundamental for answering Community of Interest (COI) associated questions and this paper presents and compares three methods for similarity search. The methods are using Google introduced transformer models, BERT being the most well known. Combining techniques for pre-processing data, enhancing BERT and post-BERT adjustments are tested in an experimental setting and results are presented in this paper.
本文研究了如何在适当的语义基础上实现文本序列关联的相似度搜索。自然语言处理(NLP)是回答感兴趣社区(COI)相关问题的基础,本文提出并比较了三种相似度搜索方法。这些方法使用谷歌引入的变压器模型,BERT是最著名的。结合预处理数据技术,增强BERT和后BERT调整在实验环境中进行了测试,并在本文中给出了结果。
{"title":"Adapting BERT Embeddings for Text Correlation of Military Domain Specific Content","authors":"Arvid Kok, Giavid Valiyev, Michael Street","doi":"10.1109/ICMCIS52405.2021.9486408","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486408","url":null,"abstract":"This paper addresses the problem of how to achieve similarity search for text sequence correlation with a proper semantic foundation. Natural Language Processing (NLP) is fundamental for answering Community of Interest (COI) associated questions and this paper presents and compares three methods for similarity search. The methods are using Google introduced transformer models, BERT being the most well known. Combining techniques for pre-processing data, enhancing BERT and post-BERT adjustments are tested in an experimental setting and results are presented in this paper.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133195486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fountain Coding for Information Protection in Tactical Networks 战术网络中信息保护的喷泉编码
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486393
Vignesh Sridharan, M. Motani, Brian Jalaian, Niranjan Suri
Tactical edge networks are operated in harsh conditions where ensuring information protection is a challenging issue. An insider threat is one of the major issues that arises in such scenarios. For instance, an attacker can compromise one of the nodes and intercept information that is being relayed to other nodes. In this paper, we propose Fountain Coding for Information Protection (FCIP) to mitigate this threat. The source node encodes information from k source symbols into m messages before sending them over the network and the receiver must recover at least k messages to decipher the information. To mitigate the insider threat, we route the encoded packets along disjoint paths. However, this incurs a trade-off with information availability as the encoded packets are routed along sub-optimal paths. It is also necessary to determine the portion of traffic to encode as encoding all the traffic is resource intensive. We formulate a multi-objective optimization problem that takes into account information protection while trading-off with information availability and considers bandwidth, energy and availability constraints. We model a risk metric to determine the cost of information protection that is provided and a cost metric to quantify the cost of information availability. We demonstrate the benefit of FCIP in our performance study by comparing it against a shortest path routing solution and provide optimal results for FCIP. We analyze the trade-off between information protection and availability and provide insight on the performance and benefits of FCIP for different operational scenarios.
战术边缘网络在恶劣条件下运行,确保信息保护是一个具有挑战性的问题。内部威胁是在这种情况下出现的主要问题之一。例如,攻击者可以破坏其中一个节点并拦截正在转发给其他节点的信息。本文提出了基于信息保护的喷泉编码(FCIP)来缓解这种威胁。源节点将来自k个源符号的信息编码为m条消息,然后通过网络发送,接收方必须恢复至少k条消息才能破译信息。为了减轻内部威胁,我们将编码的数据包沿着不相交的路径路由。然而,当编码的数据包沿着次优路径路由时,这会导致信息可用性的权衡。还需要确定要编码的流量部分,因为编码所有的流量是资源密集型的。本文提出了一个考虑信息保护与信息可用性权衡的多目标优化问题,并考虑了带宽、能量和可用性约束。我们建立了一个风险度量来确定所提供的信息保护的成本,并建立了一个成本度量来量化信息可用性的成本。在我们的性能研究中,我们通过将其与最短路径路由解决方案进行比较,证明了FCIP的优点,并提供了FCIP的最佳结果。我们分析了信息保护和可用性之间的权衡,并提供了关于FCIP在不同操作场景中的性能和优势的见解。
{"title":"Fountain Coding for Information Protection in Tactical Networks","authors":"Vignesh Sridharan, M. Motani, Brian Jalaian, Niranjan Suri","doi":"10.1109/ICMCIS52405.2021.9486393","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486393","url":null,"abstract":"Tactical edge networks are operated in harsh conditions where ensuring information protection is a challenging issue. An insider threat is one of the major issues that arises in such scenarios. For instance, an attacker can compromise one of the nodes and intercept information that is being relayed to other nodes. In this paper, we propose Fountain Coding for Information Protection (FCIP) to mitigate this threat. The source node encodes information from k source symbols into m messages before sending them over the network and the receiver must recover at least k messages to decipher the information. To mitigate the insider threat, we route the encoded packets along disjoint paths. However, this incurs a trade-off with information availability as the encoded packets are routed along sub-optimal paths. It is also necessary to determine the portion of traffic to encode as encoding all the traffic is resource intensive. We formulate a multi-objective optimization problem that takes into account information protection while trading-off with information availability and considers bandwidth, energy and availability constraints. We model a risk metric to determine the cost of information protection that is provided and a cost metric to quantify the cost of information availability. We demonstrate the benefit of FCIP in our performance study by comparing it against a shortest path routing solution and provide optimal results for FCIP. We analyze the trade-off between information protection and availability and provide insight on the performance and benefits of FCIP for different operational scenarios.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128876189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software-Defined Networking Applied in Tactical Networks: Problems, Solutions and Open Issues 软件定义网络在战术网络中的应用:问题、解决方案和有待解决的问题
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486399
Merlin von Rechenberg, Paulo H. L. Rettore, R. Lopes, P. Sevenich
Robust and secure communication systems are essential for military operations but the ever-changing scenarios, heterogeneous devices and dense environment of Tactical Networks (TN) make it challenging to fulfill the requirements. Currently, the literature has shown that Software-defined Networking (SDN) has the potential to improve network management and control, helping to overcome some of these issues. But the application of SDN in TNs is not trivial. Therefore, in order to understand the current problems faced in Software-defined Tactical Networks (SDTN), we conducted a literature review focused on the current problems and solutions, aiming to identify open issues in SDTN. Therefore, we created four main problem categories (i.e. performance, availability, security, and robustness), describing the proposed solutions to handle these issues as well as discussing the approaches, test environments, and the reproducibility of these solutions.
强大和安全的通信系统对于军事行动至关重要,但战术网络(TN)不断变化的场景、异构设备和密集环境使其难以满足要求。目前,文献已经表明,软件定义网络(SDN)具有改善网络管理和控制的潜力,有助于克服其中的一些问题。但是SDN在TNs中的应用并不是微不足道的。因此,为了了解软件定义战术网络(SDTN)当前面临的问题,我们对当前问题和解决方案进行了文献综述,旨在找出SDTN中存在的问题。因此,我们创建了四个主要问题类别(即性能、可用性、安全性和健壮性),描述了处理这些问题的建议解决方案,并讨论了方法、测试环境和这些解决方案的可再现性。
{"title":"Software-Defined Networking Applied in Tactical Networks: Problems, Solutions and Open Issues","authors":"Merlin von Rechenberg, Paulo H. L. Rettore, R. Lopes, P. Sevenich","doi":"10.1109/ICMCIS52405.2021.9486399","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486399","url":null,"abstract":"Robust and secure communication systems are essential for military operations but the ever-changing scenarios, heterogeneous devices and dense environment of Tactical Networks (TN) make it challenging to fulfill the requirements. Currently, the literature has shown that Software-defined Networking (SDN) has the potential to improve network management and control, helping to overcome some of these issues. But the application of SDN in TNs is not trivial. Therefore, in order to understand the current problems faced in Software-defined Tactical Networks (SDTN), we conducted a literature review focused on the current problems and solutions, aiming to identify open issues in SDTN. Therefore, we created four main problem categories (i.e. performance, availability, security, and robustness), describing the proposed solutions to handle these issues as well as discussing the approaches, test environments, and the reproducibility of these solutions.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130106186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Self-interference Cancelation Performance in Full-Duplex Jamming and Spectrum Monitoring 全双工干扰和频谱监测中的自干扰消除性能
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486389
Jaakko Marin, Matias Turunen, Micael Bernhardt, T. Riihonen
The use of drones in illegal activities has increased in recent years. One method for countering their operation in restricted areas is by transmitting a high-powered jamming signal over the frequencies used by the target drone. To improve the performance of jammers, full-duplex is introduced. In full-duplex systems, the transceiver is able to transmit and receive using the same time-frequency resources, which allows a device to conduct spectrum monitoring while preventing drone operations by transmitting jamming. In this study, the self-interference cancelation of typical jamming waveforms is experimentally measured and signal detection is performed over samples with imperfect self-interference cancelation.
近年来,无人机在非法活动中的使用有所增加。对付它们在限制区域行动的一种方法是在目标无人机使用的频率上发射高功率干扰信号。为了提高干扰器的性能,引入了全双工干扰器。在全双工系统中,收发器能够使用相同的时间-频率资源进行发送和接收,这允许设备进行频谱监测,同时通过传输干扰防止无人机操作。在本研究中,实验测量了典型干扰波形的自干扰消除,并对不完全自干扰消除的样本进行了信号检测。
{"title":"Self-interference Cancelation Performance in Full-Duplex Jamming and Spectrum Monitoring","authors":"Jaakko Marin, Matias Turunen, Micael Bernhardt, T. Riihonen","doi":"10.1109/ICMCIS52405.2021.9486389","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486389","url":null,"abstract":"The use of drones in illegal activities has increased in recent years. One method for countering their operation in restricted areas is by transmitting a high-powered jamming signal over the frequencies used by the target drone. To improve the performance of jammers, full-duplex is introduced. In full-duplex systems, the transceiver is able to transmit and receive using the same time-frequency resources, which allows a device to conduct spectrum monitoring while preventing drone operations by transmitting jamming. In this study, the self-interference cancelation of typical jamming waveforms is experimentally measured and signal detection is performed over samples with imperfect self-interference cancelation.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128192893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application of Gaze-Based Adaptive Notifications to Support Image Analysts 基于注视的自适应通知在图像分析中的应用
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486410
Maykel Van Miltenburg, Ghanshaam Sewnath
An application that emulates the working environment of an image analyst has been developed. An eye-tracker is used to observe the viewing behavior and based on this viewing behavior and image analyst’s computer keyboard interaction, the application tries to optimize the presentation of notifications (namely, adaptive notifications). Within the study, three notification modes were explored: adaptive notifications, non-adaptive notifications and no notifications. The goal of the study was to explore whether adaptive notifications result in higher task performance, situational awareness, and sense of trust, and a lower sense of irritation. A total of fifteen participants participated. They observed two simultaneous video streams and reported mission-relevant information. Each participant performed three scenarios with a different notification mode in each scenario. Task performance was logged in the background by the application. Results indicate that task performance was higher when using the adaptive notification mode compared to the other modes. More specifically, the mode with adapted notifications resulted in fewer false alarms and more correct rejections compared to other modes. There were no significant differences in situational awareness, trust and irritation between the different notification modes. Adaptive notifications based on gaze input can increase the image analyst’s task performance.
开发了一个模拟图像分析人员工作环境的应用程序。使用眼动仪观察观看行为,并基于这种观看行为和图像分析人员的计算机键盘交互,应用程序尝试优化通知的呈现(即自适应通知)。在研究中,我们探索了三种通知模式:自适应通知、非自适应通知和不通知。该研究的目的是探索适应性通知是否会提高任务绩效、情境意识、信任感和降低烦躁感。共有15名参与者参与。他们同时观察两个视频流并报告与任务有关的资料。每个参与者在每个场景中使用不同的通知模式执行三个场景。任务执行情况由应用程序在后台记录。结果表明,与其他模式相比,使用自适应通知模式的任务性能更高。更具体地说,与其他模式相比,具有适应通知的模式导致更少的假警报和更多的正确拒绝。不同通知方式在情境感知、信任和恼怒方面无显著差异。基于注视输入的自适应通知可以提高图像分析人员的任务性能。
{"title":"Application of Gaze-Based Adaptive Notifications to Support Image Analysts","authors":"Maykel Van Miltenburg, Ghanshaam Sewnath","doi":"10.1109/ICMCIS52405.2021.9486410","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486410","url":null,"abstract":"An application that emulates the working environment of an image analyst has been developed. An eye-tracker is used to observe the viewing behavior and based on this viewing behavior and image analyst’s computer keyboard interaction, the application tries to optimize the presentation of notifications (namely, adaptive notifications). Within the study, three notification modes were explored: adaptive notifications, non-adaptive notifications and no notifications. The goal of the study was to explore whether adaptive notifications result in higher task performance, situational awareness, and sense of trust, and a lower sense of irritation. A total of fifteen participants participated. They observed two simultaneous video streams and reported mission-relevant information. Each participant performed three scenarios with a different notification mode in each scenario. Task performance was logged in the background by the application. Results indicate that task performance was higher when using the adaptive notification mode compared to the other modes. More specifically, the mode with adapted notifications resulted in fewer false alarms and more correct rejections compared to other modes. There were no significant differences in situational awareness, trust and irritation between the different notification modes. Adaptive notifications based on gaze input can increase the image analyst’s task performance.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128155303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Value Based Collection in Intelligence Analysis 情报分析中基于价值的收集
Pub Date : 2021-05-04 DOI: 10.1109/ICMCIS52405.2021.9486414
Todd C. Robinson, Liam Pardoe
Intelligence analysis is not a passive process, but proactive and reactive. Analysts have the opportunity to request collection of further intelligence to improve the analysis. The identification and selection of collection opportunities is a human led process requiring an understanding of the value of a collection to be balanced against the cost and risks of making the collection. Argumentation frameworks are a mathematical formalization to describe arguments and conflicts between such arguments. Argumentation frameworks can be used to represent intelligence analyses, with observations, hypotheses and assumptions represented as arguments and conflicts between these represented by attacks. A value of information can be defined over an argumentation framework based on the change in the result of evaluation of the framework, according to argumentation semantics, when arguments are added or removed. When accompanied by a representation of collection opportunities, the value of information can be used to assess which collection opportunity is most beneficial. In this paper we define a framework for calculating the net benefit over a closed set of potential collection opportunities. This framework is demonstrated against an example intelligence analysis on maritime situational awareness scenario.
情报分析不是一个被动的过程,而是一个主动和被动的过程。分析人员有机会要求收集进一步的情报来改进分析。识别和选择收集机会是一个由人主导的过程,需要了解收集的价值与收集的成本和风险之间的平衡。论证框架是描述论证和这些论证之间冲突的数学形式化。论证框架可用于表示情报分析,将观察、假设和假设表示为论证,并将它们之间的冲突表示为攻击。当添加或删除参数时,根据参数语义,基于框架评估结果的变化,可以在参数框架上定义信息值。当有收集机会的表示时,信息的价值可以用来评估哪个收集机会是最有益的。在本文中,我们定义了一个框架,用于计算一组封闭的潜在收集机会的净效益。通过对海上态势感知场景的情报分析,对该框架进行了验证。
{"title":"Value Based Collection in Intelligence Analysis","authors":"Todd C. Robinson, Liam Pardoe","doi":"10.1109/ICMCIS52405.2021.9486414","DOIUrl":"https://doi.org/10.1109/ICMCIS52405.2021.9486414","url":null,"abstract":"Intelligence analysis is not a passive process, but proactive and reactive. Analysts have the opportunity to request collection of further intelligence to improve the analysis. The identification and selection of collection opportunities is a human led process requiring an understanding of the value of a collection to be balanced against the cost and risks of making the collection. Argumentation frameworks are a mathematical formalization to describe arguments and conflicts between such arguments. Argumentation frameworks can be used to represent intelligence analyses, with observations, hypotheses and assumptions represented as arguments and conflicts between these represented by attacks. A value of information can be defined over an argumentation framework based on the change in the result of evaluation of the framework, according to argumentation semantics, when arguments are added or removed. When accompanied by a representation of collection opportunities, the value of information can be used to assess which collection opportunity is most beneficial. In this paper we define a framework for calculating the net benefit over a closed set of potential collection opportunities. This framework is demonstrated against an example intelligence analysis on maritime situational awareness scenario.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133655545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 International Conference on Military Communication and Information Systems (ICMCIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1