Digital Object Identifier 10.32754/JMT.2020.2.10 65 1Abstract—Cloud computing is increasingly used. One main use of cloud computing is the running of a machine learning algorithm. Due to the large amount of data required for these algorithms, they can no longer be run on personal computers. Uploading personal data to the cloud automatically raises the issues of confidentiality of this data. In this paper, we show through a series of experiments that an order-preserving encryption algorithm can be applied to guarantee the confidentiality of the input of two well-known clustering algorithms: K-Means and DBSCAN. We show that K-Means can be modified to be applied over the encrypted data. We also proposed a slight improvement to an order-preserving encryption scheme to ensure that it is randomized, therefore increasing its security level. Finally, after studying the performance of clustering algorithms over encrypted data we show a practical application of this idea, namely the color reduction over an encrypted image.
{"title":"Privacy-Preserving Clustering: A New Approach Based on Invariant Order Encryption","authors":"Mihail-Iulian Plesa, Cezar Plesca","doi":"10.32754/JMT.2020.2.10","DOIUrl":"https://doi.org/10.32754/JMT.2020.2.10","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2020.2.10 65 1Abstract—Cloud computing is increasingly used. One main use of cloud computing is the running of a machine learning algorithm. Due to the large amount of data required for these algorithms, they can no longer be run on personal computers. Uploading personal data to the cloud automatically raises the issues of confidentiality of this data. In this paper, we show through a series of experiments that an order-preserving encryption algorithm can be applied to guarantee the confidentiality of the input of two well-known clustering algorithms: K-Means and DBSCAN. We show that K-Means can be modified to be applied over the encrypted data. We also proposed a slight improvement to an order-preserving encryption scheme to ensure that it is randomized, therefore increasing its security level. Finally, after studying the performance of clustering algorithms over encrypted data we show a practical application of this idea, namely the color reduction over an encrypted image.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131507708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital Object Identifier 10.32754/JMT.2019.1.10 53 1Abstract—This paper presents briefly a piece of military equipment designed to detect and destroy different targets such as missiles using a laser beam for detection and another for deactivation. The general name for this equipment is Laser Weapon System (LaWS). The LaWS is a ship-defense system that has so far publicly engaged different targets like drones, small ships or missiles. LaWS uses an infrared beam from a solid-state laser array which can be tuned to high output to destroy the target or low output to warn or cripple the sensors of a target. The low cost per shot it is an advantage, as each firing of the weapon requires only the minimal cost of generating the energetic pulse.
{"title":"High Power Lasers in Military Applications","authors":"Cătălin Dumitru Pisau","doi":"10.32754/JMT.2019.1.10","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.10","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2019.1.10 53 1Abstract—This paper presents briefly a piece of military equipment designed to detect and destroy different targets such as missiles using a laser beam for detection and another for deactivation. The general name for this equipment is Laser Weapon System (LaWS). The LaWS is a ship-defense system that has so far publicly engaged different targets like drones, small ships or missiles. LaWS uses an infrared beam from a solid-state laser array which can be tuned to high output to destroy the target or low output to warn or cripple the sensors of a target. The low cost per shot it is an advantage, as each firing of the weapon requires only the minimal cost of generating the energetic pulse.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124390527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Iulian-Leonard Cucu, City Insurance Expert, L. Barothi, I. Copae
Digital Object Identifier 10.32754/JMT.2019.1.06 31 1Abstract—This paper presents a method of simulation of vehicle dynamics or engine efficiency based on a graphical programming language used in advanced research software. The obtained data allows the development of other comparative studies with other vehicles in the same range or the determination of mathematical models of some important parameters related to the operation of the vehicle. The simulation allows highlighting other data that could not be recorded in the start-up test, such as emissions.
{"title":"Functioning Simulation of Logan Laureate Vehicle Based on Experimental Data Acquired from a Start-Up Test","authors":"Iulian-Leonard Cucu, City Insurance Expert, L. Barothi, I. Copae","doi":"10.32754/JMT.2019.1.06","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.06","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2019.1.06 31 1Abstract—This paper presents a method of simulation of vehicle dynamics or engine efficiency based on a graphical programming language used in advanced research software. The obtained data allows the development of other comparative studies with other vehicles in the same range or the determination of mathematical models of some important parameters related to the operation of the vehicle. The simulation allows highlighting other data that could not be recorded in the start-up test, such as emissions.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"23 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131456041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Molder, D. Toma, Andrei Țigău, Military Equipment
Digital Object Identifier 10.32754/JMT.2019.1.01 5 Abstract—For a robot that performs autonomously, the communication between the person and the robot is the most important factor. Significant awareness has been observed regarding the usage of such technology. This research has trivial involvement in the development of such robots. A robot that functions fully autonomously should not only complete the jobs that are desired of them but also somehow establish a connection between themselves and the person operating them. We propose a human detection method that uses only a single laser range scanner to detect the waist of the target person. The speed and acceleration of a robot are adaptive to the human-walking speed and the distance between the human and robot.
{"title":"Navigation Algorithms with LIDAR for Mobile Robots","authors":"C. Molder, D. Toma, Andrei Țigău, Military Equipment","doi":"10.32754/JMT.2019.1.01","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.01","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2019.1.01 5 Abstract—For a robot that performs autonomously, the communication between the person and the robot is the most important factor. Significant awareness has been observed regarding the usage of such technology. This research has trivial involvement in the development of such robots. A robot that functions fully autonomously should not only complete the jobs that are desired of them but also somehow establish a connection between themselves and the person operating them. We propose a human detection method that uses only a single laser range scanner to detect the waist of the target person. The speed and acceleration of a robot are adaptive to the human-walking speed and the distance between the human and robot.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"37 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131224095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of Flight Control Systems for Launching Vehicles","authors":"Carmen-Ioana Bogliș, Anca Belega, Andra Negru","doi":"10.32754/JMT.2019.1.08","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.08","url":null,"abstract":"","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"39 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124259074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cătălin-Dumitru Darie, City Insurance Expert, D. Sava, L. Barothi, I. Copae
Digital Object Identifier 10.32754/JMT.2019.1.04 23 1Abstract—The paper highlights the main possibilities of studying the influence of the functional parameters on the vehicle’s efficiency and its dynamic behavior. Mathematical algorithms are applied, which allow us to study these issues based on experimental data gathered throughout specific tests carried out on certain vehicles. These algorithms are applied on vehicles which have electronic control for various automotive systems, thus the data was gathered from the vehicles’ built in CPUs. To this purpose we will show how to use sensitivity analysis, dispersion analysis, correlation analysis and information theory in automotive engineering.
{"title":"The Influence of Functional Factors on the Performances of Motor Vehicles","authors":"Cătălin-Dumitru Darie, City Insurance Expert, D. Sava, L. Barothi, I. Copae","doi":"10.32754/JMT.2019.1.04","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.04","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2019.1.04 23 1Abstract—The paper highlights the main possibilities of studying the influence of the functional parameters on the vehicle’s efficiency and its dynamic behavior. Mathematical algorithms are applied, which allow us to study these issues based on experimental data gathered throughout specific tests carried out on certain vehicles. These algorithms are applied on vehicles which have electronic control for various automotive systems, thus the data was gathered from the vehicles’ built in CPUs. To this purpose we will show how to use sensitivity analysis, dispersion analysis, correlation analysis and information theory in automotive engineering.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132472169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital Object Identifier 10.32754/JMT.2019.1.07 35 Abstract—A broadband network must have the ability to transport a large amount of information in an efficient way, regardless of the type of service (voice, data, and video). A very good solution for safe and lossless transmission of data from IP access networks was the use of ATM at the core level, packing IP into ATM cells. Nowadays, most ISPs use IP over MPLS, because it allows, through the use of traffic engineering, interconnection with other sections using different switching technologies, and easy application of QoS policies and prioritization.
摘要-宽带网络必须具有高效传输大量信息的能力,无论业务类型(语音、数据和视频)如何。从IP接入网安全无损地传输数据的一个非常好的解决方案是在核心层使用ATM,将IP打包到ATM单元中。如今,大多数isp使用IP over MPLS,因为它允许通过使用流量工程,与使用不同交换技术的其他部分进行互连,并且易于应用QoS策略和优先级。
{"title":"QoS Prioritization Behavior in an Broadband Hybrid Network","authors":"V. Nicolae, Petrica Ciotirnae","doi":"10.32754/JMT.2019.1.07","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.07","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2019.1.07 35 Abstract—A broadband network must have the ability to transport a large amount of information in an efficient way, regardless of the type of service (voice, data, and video). A very good solution for safe and lossless transmission of data from IP access networks was the use of ATM at the core level, packing IP into ATM cells. Nowadays, most ISPs use IP over MPLS, because it allows, through the use of traffic engineering, interconnection with other sections using different switching technologies, and easy application of QoS policies and prioritization.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127132578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniela Pulpea, M. Bunea, T. Rotariu, R. Ginghină, Gabriela Toader
The contamination consists in any form of undesirable toxic material that is accumulated, retained or deposited on surfaces, equipment, structures, large areas, and even on living beings, therefore it is limiting the personnel activities and usage of surfaces. After the contamination occurs, the surfaces of the materials and equipments become inoperative and the humans may exhibit health problems. There are certain measures to be taken when a contamination may occur: 1. if possible, avoiding the contaminated area; 2. performing immediate or operational decontamination; 3. disposing of the materials used for decontamination. Contamination control is defined as the action taken to avoid, reduce, remove the hazardous materials from contaminated surface or to turn them into harmless substances. [1] Globally there are conventions, regulations and standards prohibiting the use, research and development of toxic warfare, such as: Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or other Gases, and of Bacteriological Methods of Warfare, usually called the Geneva Protocol [2] Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on their Destruction (the Chemical Weapons Convention or CWC); [3] Convention on Physical Protection for Nuclear
{"title":"Review of Materials and Technologies Used for Chemical and Radiological Decontamination","authors":"Daniela Pulpea, M. Bunea, T. Rotariu, R. Ginghină, Gabriela Toader","doi":"10.32754/JMT.2019.1.09","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.09","url":null,"abstract":"The contamination consists in any form of undesirable toxic material that is accumulated, retained or deposited on surfaces, equipment, structures, large areas, and even on living beings, therefore it is limiting the personnel activities and usage of surfaces. After the contamination occurs, the surfaces of the materials and equipments become inoperative and the humans may exhibit health problems. There are certain measures to be taken when a contamination may occur: 1. if possible, avoiding the contaminated area; 2. performing immediate or operational decontamination; 3. disposing of the materials used for decontamination. Contamination control is defined as the action taken to avoid, reduce, remove the hazardous materials from contaminated surface or to turn them into harmless substances. [1] Globally there are conventions, regulations and standards prohibiting the use, research and development of toxic warfare, such as: Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or other Gases, and of Bacteriological Methods of Warfare, usually called the Geneva Protocol [2] Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on their Destruction (the Chemical Weapons Convention or CWC); [3] Convention on Physical Protection for Nuclear","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125574209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Digital Object Identifier 10.32754/JMT.2019.1.05 27 1Abstract—In the information and automation era, the activities of today’s society are based on communications media with fast and secure transmission of information. Because of the information dependency, today’s networking solutions must transport more data traffic and deliver it in a fast and efficient way. It is useless to assign an appropriate epithet to the degree of importance that efficient and accurate design and the use of a management mechanism appropriate to the necessity, have in the context of the current society. The usage of programming via Python for increasing management capabilities is required in order to do high performance management of a network. One of the most important aspects of managing a large scale network that uses various platforms bought from different vendors is how to manage all these systems using a unique management platform. The current paper is concerned with Python capabilities put to good use, to develop an Integrated Management platform that performs the management of the devices that form or are part of the telecommunications network. The topologies and the script programming were done in GNS3 using Ubuntu Docker Containers with Python installed, to remotely configure CISCO IOS MultyLayer Switches and Routers.
{"title":"Integrated Management of Transport and Commutation Resources over the Network Layer","authors":"Marius-Ioan Candrea-Bogza, Petrica Ciotirnae","doi":"10.32754/JMT.2019.1.05","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.05","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2019.1.05 27 1Abstract—In the information and automation era, the activities of today’s society are based on communications media with fast and secure transmission of information. Because of the information dependency, today’s networking solutions must transport more data traffic and deliver it in a fast and efficient way. It is useless to assign an appropriate epithet to the degree of importance that efficient and accurate design and the use of a management mechanism appropriate to the necessity, have in the context of the current society. The usage of programming via Python for increasing management capabilities is required in order to do high performance management of a network. One of the most important aspects of managing a large scale network that uses various platforms bought from different vendors is how to manage all these systems using a unique management platform. The current paper is concerned with Python capabilities put to good use, to develop an Integrated Management platform that performs the management of the devices that form or are part of the telecommunications network. The topologies and the script programming were done in GNS3 using Ubuntu Docker Containers with Python installed, to remotely configure CISCO IOS MultyLayer Switches and Routers.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131332561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Constantin, Andrei Țigău, D. Toma, Dragoș Dogaru, Military Equipment
{"title":"Human Capabilities Projection: Haptic Device for EOD Robot Control","authors":"D. Constantin, Andrei Țigău, D. Toma, Dragoș Dogaru, Military Equipment","doi":"10.32754/JMT.2019.1.02","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.02","url":null,"abstract":"","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123697732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}