首页 > 最新文献

Journal of Military Technology最新文献

英文 中文
Privacy-Preserving Clustering: A New Approach Based on Invariant Order Encryption 隐私保护聚类:一种基于不变序加密的新方法
Pub Date : 2020-12-28 DOI: 10.32754/JMT.2020.2.10
Mihail-Iulian Plesa, Cezar Plesca
Digital Object Identifier 10.32754/JMT.2020.2.10 65 1Abstract—Cloud computing is increasingly used. One main use of cloud computing is the running of a machine learning algorithm. Due to the large amount of data required for these algorithms, they can no longer be run on personal computers. Uploading personal data to the cloud automatically raises the issues of confidentiality of this data. In this paper, we show through a series of experiments that an order-preserving encryption algorithm can be applied to guarantee the confidentiality of the input of two well-known clustering algorithms: K-Means and DBSCAN. We show that K-Means can be modified to be applied over the encrypted data. We also proposed a slight improvement to an order-preserving encryption scheme to ensure that it is randomized, therefore increasing its security level. Finally, after studying the performance of clustering algorithms over encrypted data we show a practical application of this idea, namely the color reduction over an encrypted image.
摘要:云计算的应用越来越广泛。云计算的一个主要用途是运行机器学习算法。由于这些算法需要大量的数据,它们不能再在个人电脑上运行。将个人数据上传到云端会自动引发这些数据的机密性问题。在本文中,我们通过一系列的实验证明了一种保序加密算法可以用于保证两种著名的聚类算法:K-Means和DBSCAN的输入机密性。我们证明K-Means可以被修改以应用于加密的数据。我们还提出了对保序加密方案的稍微改进,以确保它是随机的,从而提高其安全级别。最后,在研究了加密数据上聚类算法的性能后,我们展示了该思想的实际应用,即加密图像上的颜色还原。
{"title":"Privacy-Preserving Clustering: A New Approach Based on Invariant Order Encryption","authors":"Mihail-Iulian Plesa, Cezar Plesca","doi":"10.32754/JMT.2020.2.10","DOIUrl":"https://doi.org/10.32754/JMT.2020.2.10","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2020.2.10 65 1Abstract—Cloud computing is increasingly used. One main use of cloud computing is the running of a machine learning algorithm. Due to the large amount of data required for these algorithms, they can no longer be run on personal computers. Uploading personal data to the cloud automatically raises the issues of confidentiality of this data. In this paper, we show through a series of experiments that an order-preserving encryption algorithm can be applied to guarantee the confidentiality of the input of two well-known clustering algorithms: K-Means and DBSCAN. We show that K-Means can be modified to be applied over the encrypted data. We also proposed a slight improvement to an order-preserving encryption scheme to ensure that it is randomized, therefore increasing its security level. Finally, after studying the performance of clustering algorithms over encrypted data we show a practical application of this idea, namely the color reduction over an encrypted image.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131507708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Power Lasers in Military Applications 军事应用中的高功率激光器
Pub Date : 2019-06-28 DOI: 10.32754/JMT.2019.1.10
Cătălin Dumitru Pisau
Digital Object Identifier 10.32754/JMT.2019.1.10 53 1Abstract—This paper presents briefly a piece of military equipment designed to detect and destroy different targets such as missiles using a laser beam for detection and another for deactivation. The general name for this equipment is Laser Weapon System (LaWS). The LaWS is a ship-defense system that has so far publicly engaged different targets like drones, small ships or missiles. LaWS uses an infrared beam from a solid-state laser array which can be tuned to high output to destroy the target or low output to warn or cripple the sensors of a target. The low cost per shot it is an advantage, as each firing of the weapon requires only the minimal cost of generating the energetic pulse.
摘要:本文简要介绍了一种用于探测和摧毁不同目标(如导弹)的军事设备,该设备使用激光束进行探测和另一束进行灭活。这种设备的通称是激光武器系统(LaWS)。LaWS是一种舰艇防御系统,迄今为止,它公开对付过无人机、小型船只或导弹等不同的目标。LaWS使用一束来自固态激光阵列的红外光束,它可以被调谐到高输出来摧毁目标或低输出来警告或削弱目标的传感器。每次射击的低成本是一个优势,因为武器的每次射击只需要产生能量脉冲的最小成本。
{"title":"High Power Lasers in Military Applications","authors":"Cătălin Dumitru Pisau","doi":"10.32754/JMT.2019.1.10","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.10","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2019.1.10 53 1Abstract—This paper presents briefly a piece of military equipment designed to detect and destroy different targets such as missiles using a laser beam for detection and another for deactivation. The general name for this equipment is Laser Weapon System (LaWS). The LaWS is a ship-defense system that has so far publicly engaged different targets like drones, small ships or missiles. LaWS uses an infrared beam from a solid-state laser array which can be tuned to high output to destroy the target or low output to warn or cripple the sensors of a target. The low cost per shot it is an advantage, as each firing of the weapon requires only the minimal cost of generating the energetic pulse.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124390527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functioning Simulation of Logan Laureate Vehicle Based on Experimental Data Acquired from a Start-Up Test 基于启动试验数据的罗根劳瑞德汽车功能仿真
Pub Date : 2019-06-28 DOI: 10.32754/JMT.2019.1.06
Iulian-Leonard Cucu, City Insurance Expert, L. Barothi, I. Copae
Digital Object Identifier 10.32754/JMT.2019.1.06 31 1Abstract—This paper presents a method of simulation of vehicle dynamics or engine efficiency based on a graphical programming language used in advanced research software. The obtained data allows the development of other comparative studies with other vehicles in the same range or the determination of mathematical models of some important parameters related to the operation of the vehicle. The simulation allows highlighting other data that could not be recorded in the start-up test, such as emissions.
摘要:本文提出了一种基于高级研究软件中图形化编程语言的车辆动力学或发动机效率仿真方法。所获得的数据允许与同一范围内的其他车辆进行其他比较研究,或确定与车辆运行有关的一些重要参数的数学模型。模拟可以突出显示启动测试中无法记录的其他数据,例如排放。
{"title":"Functioning Simulation of Logan Laureate Vehicle Based on Experimental Data Acquired from a Start-Up Test","authors":"Iulian-Leonard Cucu, City Insurance Expert, L. Barothi, I. Copae","doi":"10.32754/JMT.2019.1.06","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.06","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2019.1.06 31 1Abstract—This paper presents a method of simulation of vehicle dynamics or engine efficiency based on a graphical programming language used in advanced research software. The obtained data allows the development of other comparative studies with other vehicles in the same range or the determination of mathematical models of some important parameters related to the operation of the vehicle. The simulation allows highlighting other data that could not be recorded in the start-up test, such as emissions.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"23 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131456041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Navigation Algorithms with LIDAR for Mobile Robots 移动机器人激光雷达导航算法
Pub Date : 2019-06-28 DOI: 10.32754/JMT.2019.1.01
C. Molder, D. Toma, Andrei Țigău, Military Equipment
Digital Object Identifier 10.32754/JMT.2019.1.01 5 Abstract—For a robot that performs autonomously, the communication between the person and the robot is the most important factor. Significant awareness has been observed regarding the usage of such technology. This research has trivial involvement in the development of such robots. A robot that functions fully autonomously should not only complete the jobs that are desired of them but also somehow establish a connection between themselves and the person operating them. We propose a human detection method that uses only a single laser range scanner to detect the waist of the target person. The speed and acceleration of a robot are adaptive to the human-walking speed and the distance between the human and robot.
摘要:对于自主执行任务的机器人来说,人与机器人之间的通信是最重要的因素。人们对这种技术的使用已经有了很大的认识。这项研究与这种机器人的开发无关。一个完全自主运作的机器人不仅应该完成要求它们完成的工作,还应该以某种方式在它们自己和操作它们的人之间建立联系。我们提出了一种人体检测方法,只使用一个激光测距扫描仪来检测目标人的腰部。机器人的速度和加速度与人的步行速度和人与机器人之间的距离相适应。
{"title":"Navigation Algorithms with LIDAR for Mobile Robots","authors":"C. Molder, D. Toma, Andrei Țigău, Military Equipment","doi":"10.32754/JMT.2019.1.01","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.01","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2019.1.01 5 Abstract—For a robot that performs autonomously, the communication between the person and the robot is the most important factor. Significant awareness has been observed regarding the usage of such technology. This research has trivial involvement in the development of such robots. A robot that functions fully autonomously should not only complete the jobs that are desired of them but also somehow establish a connection between themselves and the person operating them. We propose a human detection method that uses only a single laser range scanner to detect the waist of the target person. The speed and acceleration of a robot are adaptive to the human-walking speed and the distance between the human and robot.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"37 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131224095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Flight Control Systems for Launching Vehicles 运载火箭飞行控制系统的比较分析
Pub Date : 2019-06-28 DOI: 10.32754/JMT.2019.1.08
Carmen-Ioana Bogliș, Anca Belega, Andra Negru
{"title":"Comparative Analysis of Flight Control Systems for Launching Vehicles","authors":"Carmen-Ioana Bogliș, Anca Belega, Andra Negru","doi":"10.32754/JMT.2019.1.08","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.08","url":null,"abstract":"","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"39 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124259074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Influence of Functional Factors on the Performances of Motor Vehicles 功能因素对机动车辆性能的影响
Pub Date : 2019-06-28 DOI: 10.32754/JMT.2019.1.04
Cătălin-Dumitru Darie, City Insurance Expert, D. Sava, L. Barothi, I. Copae
Digital Object Identifier 10.32754/JMT.2019.1.04 23 1Abstract—The paper highlights the main possibilities of studying the influence of the functional parameters on the vehicle’s efficiency and its dynamic behavior. Mathematical algorithms are applied, which allow us to study these issues based on experimental data gathered throughout specific tests carried out on certain vehicles. These algorithms are applied on vehicles which have electronic control for various automotive systems, thus the data was gathered from the vehicles’ built in CPUs. To this purpose we will show how to use sensitivity analysis, dispersion analysis, correlation analysis and information theory in automotive engineering.
摘要:本文重点介绍了研究功能参数对车辆效率和动态行为影响的主要可能性。应用数学算法,使我们能够根据在某些车辆上进行的特定测试中收集的实验数据来研究这些问题。这些算法应用于各种汽车系统的电子控制车辆,因此数据是从车辆内置的cpu中收集的。为此,我们将展示如何在汽车工程中使用灵敏度分析、色散分析、相关分析和信息论。
{"title":"The Influence of Functional Factors on the Performances of Motor Vehicles","authors":"Cătălin-Dumitru Darie, City Insurance Expert, D. Sava, L. Barothi, I. Copae","doi":"10.32754/JMT.2019.1.04","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.04","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2019.1.04 23 1Abstract—The paper highlights the main possibilities of studying the influence of the functional parameters on the vehicle’s efficiency and its dynamic behavior. Mathematical algorithms are applied, which allow us to study these issues based on experimental data gathered throughout specific tests carried out on certain vehicles. These algorithms are applied on vehicles which have electronic control for various automotive systems, thus the data was gathered from the vehicles’ built in CPUs. To this purpose we will show how to use sensitivity analysis, dispersion analysis, correlation analysis and information theory in automotive engineering.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132472169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS Prioritization Behavior in an Broadband Hybrid Network 宽带混合网络中的QoS优先级行为
Pub Date : 2019-06-28 DOI: 10.32754/JMT.2019.1.07
V. Nicolae, Petrica Ciotirnae
Digital Object Identifier 10.32754/JMT.2019.1.07 35 Abstract—A broadband network must have the ability to transport a large amount of information in an efficient way, regardless of the type of service (voice, data, and video). A very good solution for safe and lossless transmission of data from IP access networks was the use of ATM at the core level, packing IP into ATM cells. Nowadays, most ISPs use IP over MPLS, because it allows, through the use of traffic engineering, interconnection with other sections using different switching technologies, and easy application of QoS policies and prioritization.
摘要-宽带网络必须具有高效传输大量信息的能力,无论业务类型(语音、数据和视频)如何。从IP接入网安全无损地传输数据的一个非常好的解决方案是在核心层使用ATM,将IP打包到ATM单元中。如今,大多数isp使用IP over MPLS,因为它允许通过使用流量工程,与使用不同交换技术的其他部分进行互连,并且易于应用QoS策略和优先级。
{"title":"QoS Prioritization Behavior in an Broadband Hybrid Network","authors":"V. Nicolae, Petrica Ciotirnae","doi":"10.32754/JMT.2019.1.07","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.07","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2019.1.07 35 Abstract—A broadband network must have the ability to transport a large amount of information in an efficient way, regardless of the type of service (voice, data, and video). A very good solution for safe and lossless transmission of data from IP access networks was the use of ATM at the core level, packing IP into ATM cells. Nowadays, most ISPs use IP over MPLS, because it allows, through the use of traffic engineering, interconnection with other sections using different switching technologies, and easy application of QoS policies and prioritization.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127132578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Materials and Technologies Used for Chemical and Radiological Decontamination 化学和放射性去污材料和技术综述
Pub Date : 2019-06-28 DOI: 10.32754/JMT.2019.1.09
Daniela Pulpea, M. Bunea, T. Rotariu, R. Ginghină, Gabriela Toader
The contamination consists in any form of undesirable toxic material that is accumulated, retained or deposited on surfaces, equipment, structures, large areas, and even on living beings, therefore it is limiting the personnel activities and usage of surfaces. After the contamination occurs, the surfaces of the materials and equipments become inoperative and the humans may exhibit health problems. There are certain measures to be taken when a contamination may occur: 1. if possible, avoiding the contaminated area; 2. performing immediate or operational decontamination; 3. disposing of the materials used for decontamination. Contamination control is defined as the action taken to avoid, reduce, remove the hazardous materials from contaminated surface or to turn them into harmless substances. [1] Globally there are conventions, regulations and standards prohibiting the use, research and development of toxic warfare, such as: Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or other Gases, and of Bacteriological Methods of Warfare, usually called the Geneva Protocol [2] Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on their Destruction (the Chemical Weapons Convention or CWC); [3] Convention on Physical Protection for Nuclear
污染包括积聚、保留或沉积在表面、设备、结构、大面积甚至生物上的任何形式的不良有毒物质,因此它限制了人员的活动和对表面的使用。污染发生后,材料和设备的表面失效,人类可能会出现健康问题。当可能发生污染时,应采取以下措施:如果可能的话,避开污染区域;2. 进行即时或可操作的净化;3.处理用于净化的材料。污染控制是指为避免、减少、清除污染表面的有害物质或将其转化为无害物质而采取的行动。[1]全球有禁止使用、研究和发展有毒战争的公约、条例和标准,例如:《禁止在战争中使用窒息性、有毒或其他气体和细菌作战方法议定书》,通常称为《日内瓦议定书》[2]《禁止发展、生产、储存和使用化学武器及销毁此种武器公约》(《禁止化学武器公约》或《化学武器公约》);[3]《核实物保护公约》
{"title":"Review of Materials and Technologies Used for Chemical and Radiological Decontamination","authors":"Daniela Pulpea, M. Bunea, T. Rotariu, R. Ginghină, Gabriela Toader","doi":"10.32754/JMT.2019.1.09","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.09","url":null,"abstract":"The contamination consists in any form of undesirable toxic material that is accumulated, retained or deposited on surfaces, equipment, structures, large areas, and even on living beings, therefore it is limiting the personnel activities and usage of surfaces. After the contamination occurs, the surfaces of the materials and equipments become inoperative and the humans may exhibit health problems. There are certain measures to be taken when a contamination may occur: 1. if possible, avoiding the contaminated area; 2. performing immediate or operational decontamination; 3. disposing of the materials used for decontamination. Contamination control is defined as the action taken to avoid, reduce, remove the hazardous materials from contaminated surface or to turn them into harmless substances. [1] Globally there are conventions, regulations and standards prohibiting the use, research and development of toxic warfare, such as: Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or other Gases, and of Bacteriological Methods of Warfare, usually called the Geneva Protocol [2] Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on their Destruction (the Chemical Weapons Convention or CWC); [3] Convention on Physical Protection for Nuclear","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125574209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Integrated Management of Transport and Commutation Resources over the Network Layer 网络层传输和交换资源的集成管理
Pub Date : 2019-06-28 DOI: 10.32754/JMT.2019.1.05
Marius-Ioan Candrea-Bogza, Petrica Ciotirnae
Digital Object Identifier 10.32754/JMT.2019.1.05 27 1Abstract—In the information and automation era, the activities of today’s society are based on communications media with fast and secure transmission of information. Because of the information dependency, today’s networking solutions must transport more data traffic and deliver it in a fast and efficient way. It is useless to assign an appropriate epithet to the degree of importance that efficient and accurate design and the use of a management mechanism appropriate to the necessity, have in the context of the current society. The usage of programming via Python for increasing management capabilities is required in order to do high performance management of a network. One of the most important aspects of managing a large scale network that uses various platforms bought from different vendors is how to manage all these systems using a unique management platform. The current paper is concerned with Python capabilities put to good use, to develop an Integrated Management platform that performs the management of the devices that form or are part of the telecommunications network. The topologies and the script programming were done in GNS3 using Ubuntu Docker Containers with Python installed, to remotely configure CISCO IOS MultyLayer Switches and Routers.
摘要:在信息化和自动化时代,当今社会的活动是以信息快速、安全传输的通信媒介为基础的。由于信息依赖性,当今的网络解决方案必须传输更多的数据流量,并以快速有效的方式交付。在当前社会的背景下,有效和准确地设计和使用一种与必要性相适应的管理机制的重要性是没有必要的。为了对网络进行高性能管理,需要使用Python编程来增加管理功能。管理使用从不同供应商购买的各种平台的大型网络的最重要方面之一是如何使用一个独特的管理平台来管理所有这些系统。本文关注的是如何充分利用Python的功能来开发一个集成管理平台,该平台可以对构成或属于电信网络的设备进行管理。拓扑和脚本编程是在GNS3中使用安装了Python的Ubuntu Docker容器完成的,用于远程配置CISCO IOS多层交换机和路由器。
{"title":"Integrated Management of Transport and Commutation Resources over the Network Layer","authors":"Marius-Ioan Candrea-Bogza, Petrica Ciotirnae","doi":"10.32754/JMT.2019.1.05","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.05","url":null,"abstract":"Digital Object Identifier 10.32754/JMT.2019.1.05 27 1Abstract—In the information and automation era, the activities of today’s society are based on communications media with fast and secure transmission of information. Because of the information dependency, today’s networking solutions must transport more data traffic and deliver it in a fast and efficient way. It is useless to assign an appropriate epithet to the degree of importance that efficient and accurate design and the use of a management mechanism appropriate to the necessity, have in the context of the current society. The usage of programming via Python for increasing management capabilities is required in order to do high performance management of a network. One of the most important aspects of managing a large scale network that uses various platforms bought from different vendors is how to manage all these systems using a unique management platform. The current paper is concerned with Python capabilities put to good use, to develop an Integrated Management platform that performs the management of the devices that form or are part of the telecommunications network. The topologies and the script programming were done in GNS3 using Ubuntu Docker Containers with Python installed, to remotely configure CISCO IOS MultyLayer Switches and Routers.","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131332561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Human Capabilities Projection: Haptic Device for EOD Robot Control 人类能力投射:用于排爆机器人控制的触觉装置
Pub Date : 2019-06-28 DOI: 10.32754/JMT.2019.1.02
D. Constantin, Andrei Țigău, D. Toma, Dragoș Dogaru, Military Equipment
{"title":"Human Capabilities Projection: Haptic Device for EOD Robot Control","authors":"D. Constantin, Andrei Țigău, D. Toma, Dragoș Dogaru, Military Equipment","doi":"10.32754/JMT.2019.1.02","DOIUrl":"https://doi.org/10.32754/JMT.2019.1.02","url":null,"abstract":"","PeriodicalId":315050,"journal":{"name":"Journal of Military Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123697732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Military Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1