首页 > 最新文献

Int. J. Intell. Def. Support Syst.最新文献

英文 中文
Deep learning-based approach for malware classification 基于深度学习的恶意软件分类方法
Pub Date : 2021-05-21 DOI: 10.1504/IJIDSS.2021.115226
Harisha Airbail, G. Mamatha, Rahul V. Hedge, P. R. Sushmika, Reshma Kumari, K. Sandeep
Any program that exhibit furtive demonstrations against the interests of the PC client can be considered as a malware. These baleful programs can play out varieties of different capacities, for example, taking, encoding, or erasing dainty information, changing or commandeering centre processing capacities, and examining clients' computer action without their consent. Today, malware is utilised by both governments and black hat hackers, to take individual, financial, or business data. In this paper, put forward a strategy for arranging malware utilising profound learning procedures. Malware binaries are pictured as greyscale pictures, with the perception that for some malware families, the pictures having a place with a similar family show up fundamentally the same as in surface and design. A standard picture highlights grouping strategy is proposed. The exploratory outcomes give 97.45% arrangement classification on a malware database of 9,339 examples with 25 diverse malware families.
任何对PC客户端的利益进行偷偷摸摸的演示的程序都可以被认为是恶意软件。这些恶意程序可以发挥各种不同的能力,例如,获取、编码或删除重要信息,改变或征用中心处理能力,以及在未经客户同意的情况下检查客户的计算机操作。如今,政府和黑帽黑客都在利用恶意软件来获取个人、金融或商业数据。本文提出了一种利用深度学习过程安排恶意软件的策略。恶意软件二进制文件被描绘成灰度图片,因为人们认为,对于一些恶意软件家族来说,具有相似家族的图片在表面和设计上基本相同。提出了一种标准的图像亮点分组策略。在一个包含25个不同恶意软件家族的9339个样本的恶意软件数据库上,探索性结果给出了97.45%的排序分类。
{"title":"Deep learning-based approach for malware classification","authors":"Harisha Airbail, G. Mamatha, Rahul V. Hedge, P. R. Sushmika, Reshma Kumari, K. Sandeep","doi":"10.1504/IJIDSS.2021.115226","DOIUrl":"https://doi.org/10.1504/IJIDSS.2021.115226","url":null,"abstract":"Any program that exhibit furtive demonstrations against the interests of the PC client can be considered as a malware. These baleful programs can play out varieties of different capacities, for example, taking, encoding, or erasing dainty information, changing or commandeering centre processing capacities, and examining clients' computer action without their consent. Today, malware is utilised by both governments and black hat hackers, to take individual, financial, or business data. In this paper, put forward a strategy for arranging malware utilising profound learning procedures. Malware binaries are pictured as greyscale pictures, with the perception that for some malware families, the pictures having a place with a similar family show up fundamentally the same as in surface and design. A standard picture highlights grouping strategy is proposed. The exploratory outcomes give 97.45% arrangement classification on a malware database of 9,339 examples with 25 diverse malware families.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127165713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Program viewer - a defence portfolio capability management system 程序查看器-一个国防组合能力管理系统
Pub Date : 2020-08-19 DOI: 10.1504/ijidss.2020.10031440
E. H. Lo, N. Tay, G. Bulluss
The recent first principles review (FPR) has clearly highlighted further need for improvements in defence capability management. Moreover, improved data management and decision support tools are essential to achieving the efficiencies and realising the opportunities presented. Program viewer is one such tool that leverages and aggregates actual stakeholder data to support force posture planning and capability acquisition prioritisation. Key contributions from this paper include: 1) fusing disparate and unexploited defence enterprise data for analysis; 2) producing a range of tailorable and informative views of cost, schedule and capability from actual defence data; 3) enabling impact analysis on what-if scenarios. Incorporating numerous stakeholder requested features, program viewer offers a new approach to aggregating and analysing defence capabilities, and has been used to support the current and previous force structure reviews (FSRs). This paper's target audience includes ADO and international military systems architects.
最近的第一原则审查(FPR)明确强调了进一步改进国防能力管理的需要。此外,改进数据管理和决策支持工具对于提高效率和实现所提供的机会至关重要。程序查看器就是这样一种工具,它利用和汇总实际的利益相关者数据来支持部队态势规划和能力获取优先级。本文的主要贡献包括:1)融合不同的和未开发的国防企业数据进行分析;2)根据实际防务数据,生成一系列可定制的、信息丰富的成本、进度和能力视图;3)对假设情景进行影响分析。结合众多利益相关者要求的特性,程序查看器提供了一种聚合和分析防御能力的新方法,并已用于支持当前和以前的部队结构审查(fsr)。本文的目标读者包括ADO和国际军事系统架构师。
{"title":"Program viewer - a defence portfolio capability management system","authors":"E. H. Lo, N. Tay, G. Bulluss","doi":"10.1504/ijidss.2020.10031440","DOIUrl":"https://doi.org/10.1504/ijidss.2020.10031440","url":null,"abstract":"The recent first principles review (FPR) has clearly highlighted further need for improvements in defence capability management. Moreover, improved data management and decision support tools are essential to achieving the efficiencies and realising the opportunities presented. Program viewer is one such tool that leverages and aggregates actual stakeholder data to support force posture planning and capability acquisition prioritisation. Key contributions from this paper include: 1) fusing disparate and unexploited defence enterprise data for analysis; 2) producing a range of tailorable and informative views of cost, schedule and capability from actual defence data; 3) enabling impact analysis on what-if scenarios. Incorporating numerous stakeholder requested features, program viewer offers a new approach to aggregating and analysing defence capabilities, and has been used to support the current and previous force structure reviews (FSRs). This paper's target audience includes ADO and international military systems architects.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122965445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Archival solution API to upload bulk file and managing the data in cloud storage 归档解决方案API,用于上传批量文件和管理云存储中的数据
Pub Date : 2020-08-19 DOI: 10.1504/ijidss.2020.10031443
Neelamadhab Padhy, R. Mishra, Samaresh Mishra
The application programming interface (API) as a means of communication to establish a connection with the cloud, which allows storing the vast amounts of heterogeneous data. Data has been steadily growing over the past several years. Software developers can use different data from cloud as convenient ecosystems for developing, deploying, testing and maintaining their software. API provides the archival solution and storing the data in the cloud. This platform also plays an essential role in managing them effectively with improved transfer rates. API is becoming increasingly dynamic and complex day by day. One of the significant challenges faced by us is to develop appropriate individual API and extensible mechanisms for managing and storing the data in the cloud. The objective of this paper is to utilize the storage efficiently based on API capability and analysis of (extreme amounts of) raw heterogeneous data.
将应用程序编程接口(API)作为与云建立连接的通信手段,从而允许存储大量异构数据。在过去的几年里,数据一直在稳步增长。软件开发人员可以使用来自云的不同数据作为开发、部署、测试和维护软件的便利生态系统。API提供归档解决方案,并将数据存储在云中。该平台还在有效管理它们并提高传输速率方面发挥了重要作用。API正日益变得动态和复杂。我们面临的一个重大挑战是开发适当的单独API和可扩展机制来管理和存储云中的数据。本文的目标是基于API功能和对(极端数量的)原始异构数据的分析有效地利用存储。
{"title":"Archival solution API to upload bulk file and managing the data in cloud storage","authors":"Neelamadhab Padhy, R. Mishra, Samaresh Mishra","doi":"10.1504/ijidss.2020.10031443","DOIUrl":"https://doi.org/10.1504/ijidss.2020.10031443","url":null,"abstract":"The application programming interface (API) as a means of communication to establish a connection with the cloud, which allows storing the vast amounts of heterogeneous data. Data has been steadily growing over the past several years. Software developers can use different data from cloud as convenient ecosystems for developing, deploying, testing and maintaining their software. API provides the archival solution and storing the data in the cloud. This platform also plays an essential role in managing them effectively with improved transfer rates. API is becoming increasingly dynamic and complex day by day. One of the significant challenges faced by us is to develop appropriate individual API and extensible mechanisms for managing and storing the data in the cloud. The objective of this paper is to utilize the storage efficiently based on API capability and analysis of (extreme amounts of) raw heterogeneous data.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129512350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach to design a digital clock triggered modified pulse latch for 16-bit shift register 一种设计数字时钟触发的16位移位寄存器修改脉冲锁存器的新方法
Pub Date : 2020-08-19 DOI: 10.1504/ijidss.2020.10031441
Suraj Pattanaik
A low power area reduced clock pulse generator and a modified clock sense pulse latch is proposed for conventional shift register. The proposed clock pulse generator basically based on the inverted inverter delay circuit and a pass transistor logic AND gate circuit. This clock pulse generator and modified clock sense pulse latch consumes low power and low area than other conventional clock pulse generator. Here the clock pulse generator consist of five number of back to back cascaded clock pulse circuit. The pulse generated from the proposed clock pulse generator helps to increase the speed, reduces the area and power of conventional shift register. The clock pulse generator and the modified clock sense pulse latch is designed and tested by the Cadence Virtuoso 180 nm technology. The power consumption for 16-bit shift register is 0.705 mW at 500 MHz clock frequency and 0.395 mW at 100 MHz frequency. The proposed shift register saved 12% area and 19.50% power rather than other conventional shift register.
针对传统移位寄存器,提出了一种低功耗减面积时钟脉冲发生器和一种改进的时钟感脉冲锁存器。所提出的时钟脉冲发生器基本基于逆变延时电路和通管逻辑与门电路。该时钟脉冲发生器和改进的时钟感脉冲锁存器比其他传统时钟脉冲发生器功耗低、占地小。这里的时钟脉冲发生器由5个数字的时钟脉冲电路组成,它们是背对背级联的。所提出的时钟脉冲发生器产生的脉冲有助于提高速度,减少传统移位寄存器的面积和功率。采用Cadence Virtuoso 180 nm技术设计并测试了时钟脉冲发生器和改进的时钟感脉冲锁存器。16位移位寄存器的功耗在500 MHz时钟频率下为0.705 mW,在100 MHz频率下为0.395 mW。该移位寄存器比其它传统移位寄存器节省12%的面积和19.50%的功耗。
{"title":"A novel approach to design a digital clock triggered modified pulse latch for 16-bit shift register","authors":"Suraj Pattanaik","doi":"10.1504/ijidss.2020.10031441","DOIUrl":"https://doi.org/10.1504/ijidss.2020.10031441","url":null,"abstract":"A low power area reduced clock pulse generator and a modified clock sense pulse latch is proposed for conventional shift register. The proposed clock pulse generator basically based on the inverted inverter delay circuit and a pass transistor logic AND gate circuit. This clock pulse generator and modified clock sense pulse latch consumes low power and low area than other conventional clock pulse generator. Here the clock pulse generator consist of five number of back to back cascaded clock pulse circuit. The pulse generated from the proposed clock pulse generator helps to increase the speed, reduces the area and power of conventional shift register. The clock pulse generator and the modified clock sense pulse latch is designed and tested by the Cadence Virtuoso 180 nm technology. The power consumption for 16-bit shift register is 0.705 mW at 500 MHz clock frequency and 0.395 mW at 100 MHz frequency. The proposed shift register saved 12% area and 19.50% power rather than other conventional shift register.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114678202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face recognition under occlusion for user authentication and invigilation in remotely distributed online assessments 遮挡下的人脸识别用于远程分布式在线评估中的用户认证和监考
Pub Date : 2018-12-01 DOI: 10.1504/IJIDSS.2018.099889
Niloofar Tavakolian, A. Nazemi, Z. Azimifar, I. Murray
This study focuses on face recognition under uncontrolled conditions as a second biometric factor in order to multi factor authenticate(MFA) in online assessment. Obtained results of this project indicate reasonable accuracy to address the issue of occlusion using AR, MUCT and UMB Datasets, utilizing deep learning and the previous approach based on feature extraction (shallow method). The shallow method accuracy improvement includes HOG by 4%, in comparison to Gabor Sparse Representation based Classification (GSRC) method and by 9% using Gabor. Shallow method can handle occlusion issue in the lack of occlusion dictionaries and sufficient training sample. Modified ResNet as a deep learning method is used to be able to improve accuracy comparing the best member of the SRC family, Structured Sparse Representation based Classification(SSRC) by 3% on average.
本研究将非受控条件下的人脸识别作为第二生物特征因素,以实现在线评估中的多因素认证。本项目获得的结果表明,使用AR, MUCT和UMB数据集,利用深度学习和先前基于特征提取的方法(浅方法),可以合理地解决遮挡问题。与基于Gabor稀疏表示的分类(GSRC)方法相比,浅层方法的准确率提高了4%,使用Gabor方法的准确率提高了9%。浅层方法可以在缺乏遮挡字典和足够训练样本的情况下处理遮挡问题。使用改进的ResNet作为一种深度学习方法,与SRC家族的最佳成员——基于结构化稀疏表示的分类(SSRC)相比,能够将准确率平均提高3%。
{"title":"Face recognition under occlusion for user authentication and invigilation in remotely distributed online assessments","authors":"Niloofar Tavakolian, A. Nazemi, Z. Azimifar, I. Murray","doi":"10.1504/IJIDSS.2018.099889","DOIUrl":"https://doi.org/10.1504/IJIDSS.2018.099889","url":null,"abstract":"This study focuses on face recognition under uncontrolled conditions as a second biometric factor in order to multi factor authenticate(MFA) in online assessment. Obtained results of this project indicate reasonable accuracy to address the issue of occlusion using AR, MUCT and UMB Datasets, utilizing deep learning and the previous approach based on feature extraction (shallow method). The shallow method accuracy improvement includes HOG by 4%, in comparison to Gabor Sparse Representation based Classification (GSRC) method and by 9% using Gabor. Shallow method can handle occlusion issue in the lack of occlusion dictionaries and sufficient training sample. Modified ResNet as a deep learning method is used to be able to improve accuracy comparing the best member of the SRC family, Structured Sparse Representation based Classification(SSRC) by 3% on average.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128032438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Biological impact on military intelligence: application or metaphor? 生物学对军事情报的影响:应用还是隐喻?
Pub Date : 2014-04-04 DOI: 10.1504/IJIDSS.2015.075474
L. Ingber
Ideas by Statistical Mechanics (ISM) is a generic program to model evolution and propagation of ideas/patterns throughout populations subjected to endogenous and exogenous interactions. The program is based on the author's work in Statistical Mechanics of Neocortical Interactions (SMNI). This product can be used for decision support for projects ranging from diplomatic, information, military, and economic (DIME) factors of propagation/evolution of ideas, to commercial sales, trading indicators across sectors of financial markets, advertising and political campaigns, etc. It seems appropriate to base an approach for propagation of ideas on the only system so far demonstrated to develop and nurture ideas, i.e., the neocortical brain. The issue here is whether such biological intelligence is a valid application to military intelligence, or is it simply a metaphor?
统计力学思想(ISM)是一个通用程序,用于模拟思想/模式在受内源性和外源性相互作用影响的人群中的进化和传播。该计划是基于作者在新皮质相互作用统计力学(SMNI)方面的工作。该产品可用于各种项目的决策支持,从传播/思想演变的外交、信息、军事和经济(DIME)因素,到商业销售、金融市场跨部门交易指标、广告和政治活动等。将思想传播的方法建立在迄今为止唯一被证明能够发展和培育思想的系统上,即新皮层大脑,似乎是合适的。这里的问题是,这种生物智能是否可以有效地应用于军事情报,还是仅仅是一种隐喻?
{"title":"Biological impact on military intelligence: application or metaphor?","authors":"L. Ingber","doi":"10.1504/IJIDSS.2015.075474","DOIUrl":"https://doi.org/10.1504/IJIDSS.2015.075474","url":null,"abstract":"Ideas by Statistical Mechanics (ISM) is a generic program to model evolution and propagation of ideas/patterns throughout populations subjected to endogenous and exogenous interactions. The program is based on the author's work in Statistical Mechanics of Neocortical Interactions (SMNI). This product can be used for decision support for projects ranging from diplomatic, information, military, and economic (DIME) factors of propagation/evolution of ideas, to commercial sales, trading indicators across sectors of financial markets, advertising and political campaigns, etc. It seems appropriate to base an approach for propagation of ideas on the only system so far demonstrated to develop and nurture ideas, i.e., the neocortical brain. The issue here is whether such biological intelligence is a valid application to military intelligence, or is it simply a metaphor?","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115625700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
High fidelity simulation using the updated distributed interactive simulation standard 采用最新的分布式交互仿真标准进行高保真仿真
Pub Date : 2014-03-24 DOI: 10.1504/IJIDSS.2014.059959
P. Ryan, P. Ross, Will Oliver
Distributed interactive simulation (DIS) is a widely-used networking protocol standard that provides a method of communicating entity information among simulators and simulations to create a synthetic environment. The IEEE DIS standard is being revised with balloting expected to be completed in 2012. The proposed new standard includes an extensive revision, clearing up ambiguities present in the existing 1998 version, and adding additional capabilities that reflect changes in military equipment and doctrine, and also advances in technology such as the internet, mobile telephony, and the widespread use of the global positioning system for positional and time data. Five new protocol data units have been added to include information operations capability, enhanced warfare support, and the ability to communicate information about individual attributes for a particular entity, object, or event. In this paper we review these new capabilities in detail, and explore what this will mean for the Australian simulati...
分布式交互仿真(Distributed interactive simulation, DIS)是一种广泛使用的网络协议标准,它提供了一种在仿真器和仿真器之间传递实体信息的方法,以创建一个综合环境。IEEE DIS标准正在修订中,投票预计将于2012年完成。拟议的新标准包括一个广泛的修订,澄清现有的1998年版本中存在的歧义,并增加额外的能力,反映军事装备和学说的变化,以及诸如互联网、移动电话和广泛使用全球定位系统的位置和时间数据等技术的进步。增加了五个新的协议数据单元,包括信息作战能力,增强的战争支持,以及关于特定实体、对象或事件的单个属性的信息通信能力。在本文中,我们详细回顾了这些新功能,并探讨了这对澳大利亚模拟意味着什么。
{"title":"High fidelity simulation using the updated distributed interactive simulation standard","authors":"P. Ryan, P. Ross, Will Oliver","doi":"10.1504/IJIDSS.2014.059959","DOIUrl":"https://doi.org/10.1504/IJIDSS.2014.059959","url":null,"abstract":"Distributed interactive simulation (DIS) is a widely-used networking protocol standard that provides a method of communicating entity information among simulators and simulations to create a synthetic environment. The IEEE DIS standard is being revised with balloting expected to be completed in 2012. The proposed new standard includes an extensive revision, clearing up ambiguities present in the existing 1998 version, and adding additional capabilities that reflect changes in military equipment and doctrine, and also advances in technology such as the internet, mobile telephony, and the widespread use of the global positioning system for positional and time data. Five new protocol data units have been added to include information operations capability, enhanced warfare support, and the ability to communicate information about individual attributes for a particular entity, object, or event. In this paper we review these new capabilities in detail, and explore what this will mean for the Australian simulati...","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114958396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interception of an aerodynamically stable weaving re-entry vehicle 拦截空气动力稳定的编织再入飞行器
Pub Date : 2014-03-24 DOI: 10.1504/IJIDSS.2014.059965
A. Vermeulen, R. Savelsberg
Traditional missile guidance laws are designed against fighter aircraft, with a much lower velocity (600–800 m/s) than ballistic missiles. To see whether intercepting a theatre ballistic missile inside the atmosphere is difficult in terms of missile guidance, trajectories of two different re-entry vehicles and the terminal phase of their interception, while the interceptor is guided by its own sensors, are simulated using MATLAB/Simulink. The interception is always successful if the inherent delay of the missile guidance system is small (below 0.5 seconds). The re-entry vehicles follow weaving trajectories, but the amplitude of the weave is small and does not pose problems for the interceptor. Neither does the high velocity of the missile (2,600 m/s), provided that the interceptor is near the inverse trajectory at the start of the terminal phase. Consequently, current missile guidance technology seems to be sufficient against aerodynamically stable missiles, but early detection and tracking are essential for success.
传统的导弹制导律是针对战斗机设计的,其速度比弹道导弹低得多(600-800米/秒)。为了了解在大气层内拦截战区弹道导弹在导弹制导方面是否困难,在拦截器由其自身传感器制导的情况下,使用MATLAB/Simulink对两种不同再入飞行器的轨迹及其拦截的末段进行了仿真。如果导弹制导系统的固有延迟很小(低于0.5秒),拦截总是成功的。再入飞行器遵循编织轨迹,但编织的幅度很小,不会给拦截器带来问题。导弹的高速度(2,600米/秒)也没有,只要拦截弹在末端阶段开始时接近反弹道。因此,目前的导弹制导技术似乎足以对付空气动力稳定的导弹,但是早期探测和跟踪是成功的必要条件。
{"title":"Interception of an aerodynamically stable weaving re-entry vehicle","authors":"A. Vermeulen, R. Savelsberg","doi":"10.1504/IJIDSS.2014.059965","DOIUrl":"https://doi.org/10.1504/IJIDSS.2014.059965","url":null,"abstract":"Traditional missile guidance laws are designed against fighter aircraft, with a much lower velocity (600–800 m/s) than ballistic missiles. To see whether intercepting a theatre ballistic missile inside the atmosphere is difficult in terms of missile guidance, trajectories of two different re-entry vehicles and the terminal phase of their interception, while the interceptor is guided by its own sensors, are simulated using MATLAB/Simulink. The interception is always successful if the inherent delay of the missile guidance system is small (below 0.5 seconds). The re-entry vehicles follow weaving trajectories, but the amplitude of the weave is small and does not pose problems for the interceptor. Neither does the high velocity of the missile (2,600 m/s), provided that the interceptor is near the inverse trajectory at the start of the terminal phase. Consequently, current missile guidance technology seems to be sufficient against aerodynamically stable missiles, but early detection and tracking are essential for success.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129651610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sensor selection and fusion using subjective logic 采用主观逻辑对传感器进行选择和融合
Pub Date : 2014-03-24 DOI: 10.1504/IJIDSS.2014.059960
E. El-Mahassni
Sensor fusion is the notion of combining the data from two or more sensors in order to enhance performance compared with that of individual sensors. The most common method for fusing sensors is through Bayesian methods. However, these cannot easily take into account unknown uncertainty or imprecision. A relatively new method is subjective logic. Although similar to Dempster-Shafer theory, it is unique in that it allows us to collapse the frame of discernment into a binary frame, thereby reducing the complexity. In this paper, we show two novel methods for employing subjective logic: 1) it can be used for target identification (and we show some examples for surveillance in the airborne environment); 2) given some knowledge about the performance of a suite of sensors, we might be able to select the best sensor for a given task. This is achieved through the use of the expected decision formula.
传感器融合是将来自两个或多个传感器的数据结合在一起以提高性能的概念。最常用的传感器融合方法是贝叶斯方法。然而,这些不能轻易地考虑到未知的不确定性或不精确性。一种相对较新的方法是主观逻辑。虽然与Dempster-Shafer理论相似,但它的独特之处在于它允许我们将识别框架分解为二进制框架,从而降低了复杂性。在本文中,我们展示了两种使用主观逻辑的新方法:1)它可以用于目标识别(我们展示了一些在空中环境中的监视示例);2)给定一组传感器性能的一些知识,我们可能能够为给定的任务选择最好的传感器。这是通过使用预期的决策公式实现的。
{"title":"Sensor selection and fusion using subjective logic","authors":"E. El-Mahassni","doi":"10.1504/IJIDSS.2014.059960","DOIUrl":"https://doi.org/10.1504/IJIDSS.2014.059960","url":null,"abstract":"Sensor fusion is the notion of combining the data from two or more sensors in order to enhance performance compared with that of individual sensors. The most common method for fusing sensors is through Bayesian methods. However, these cannot easily take into account unknown uncertainty or imprecision. A relatively new method is subjective logic. Although similar to Dempster-Shafer theory, it is unique in that it allows us to collapse the frame of discernment into a binary frame, thereby reducing the complexity. In this paper, we show two novel methods for employing subjective logic: 1) it can be used for target identification (and we show some examples for surveillance in the airborne environment); 2) given some knowledge about the performance of a suite of sensors, we might be able to select the best sensor for a given task. This is achieved through the use of the expected decision formula.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133272592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computational approach and cognitive assistant for evidence-based reasoning in intelligence analysis 智能分析中基于证据推理的计算方法和认知辅助
Pub Date : 2014-03-24 DOI: 10.1504/IJIDSS.2014.059976
G. Tecuci, D. Schum, Dorin Marcu, Mihai Boicu
This paper presents a computational approach to intelligence analysis and its current implementation into a cognitive assistant called Disciple-CD. Intelligence analysis is viewed as ceaseless discovery of evidence, hypotheses, and arguments in a non-stationary world, involving cooperative processes of evidence in search of hypotheses, hypotheses in search of evidence, and evidentiary tests of hypotheses. Disciple-CD helps intelligence analysts formulate hypotheses, develop arguments that reduce complex hypotheses to simpler and simpler ones, collect evidence to evaluate the simplest hypotheses, assess the relevance, believability, and inferential force of evidence, and finally the likeliness of the hypotheses.
本文提出了一种智能分析的计算方法,并将其实现为一种名为discipline - cd的认知助手。智力分析被认为是在一个非固定的世界中不断发现证据、假设和论点,包括在寻找假设的过程中寻找证据,在寻找证据的过程中假设,以及对假设的证据检验。discipline - cd帮助情报分析人员制定假设,发展论点,将复杂的假设简化为更简单的假设,收集证据来评估最简单的假设,评估证据的相关性、可信度和推断力,最后评估假设的可能性。
{"title":"Computational approach and cognitive assistant for evidence-based reasoning in intelligence analysis","authors":"G. Tecuci, D. Schum, Dorin Marcu, Mihai Boicu","doi":"10.1504/IJIDSS.2014.059976","DOIUrl":"https://doi.org/10.1504/IJIDSS.2014.059976","url":null,"abstract":"This paper presents a computational approach to intelligence analysis and its current implementation into a cognitive assistant called Disciple-CD. Intelligence analysis is viewed as ceaseless discovery of evidence, hypotheses, and arguments in a non-stationary world, involving cooperative processes of evidence in search of hypotheses, hypotheses in search of evidence, and evidentiary tests of hypotheses. Disciple-CD helps intelligence analysts formulate hypotheses, develop arguments that reduce complex hypotheses to simpler and simpler ones, collect evidence to evaluate the simplest hypotheses, assess the relevance, believability, and inferential force of evidence, and finally the likeliness of the hypotheses.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132250476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Int. J. Intell. Def. Support Syst.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1