首页 > 最新文献

Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS最新文献

英文 中文
Aggregated space combat modeling 聚合空间作战建模
IF 0.8 Q3 Engineering Pub Date : 2021-12-02 DOI: 10.1177/15485129211063369
D. Hayhurst, J. Colombi, David W. Meyer
The use of aggregated combat modeling in the cislunar environment has been demonstrated to inform acquisition decisions for the United States Space Force (USSF). First, the cislunar space is hypothesized as a future strategic conflict environment. As such, Lanchester, Lotka–Volterra, and Brackney models could be appropriate to describe such conflict. All models encompass a system of differential equations which parametrically capture the dynamics between friendly and hostile forces. While the Brackney model was constructed to explain two-dimensional land battle, this article adapts it for the respective three-dimensional space domain and applies it to strategic procurement. The analysis demonstrates the pre-eminence of Space Domain Awareness (SDA) in certain contexts while recognizing conditions in which spacecraft survivability holds greater importance.
在地月环境中使用聚合作战建模已被证明可以为美国太空部队(USSF)的采买决策提供信息。首先,假定地月空间是未来的战略冲突环境。因此,Lanchester、Lotka-Volterra和Brackney模型可以很好地描述这种冲突。所有模型都包含一个微分方程系统,该系统参数化地捕捉友军和敌军之间的动态。Brackney模型的构建是为了解释二维的陆战,而本文将其应用于各自的三维空间领域,并将其应用于战略采购。分析表明,在某些情况下,空间域感知(SDA)的优势,同时认识到航天器生存能力更重要的条件。
{"title":"Aggregated space combat modeling","authors":"D. Hayhurst, J. Colombi, David W. Meyer","doi":"10.1177/15485129211063369","DOIUrl":"https://doi.org/10.1177/15485129211063369","url":null,"abstract":"The use of aggregated combat modeling in the cislunar environment has been demonstrated to inform acquisition decisions for the United States Space Force (USSF). First, the cislunar space is hypothesized as a future strategic conflict environment. As such, Lanchester, Lotka–Volterra, and Brackney models could be appropriate to describe such conflict. All models encompass a system of differential equations which parametrically capture the dynamics between friendly and hostile forces. While the Brackney model was constructed to explain two-dimensional land battle, this article adapts it for the respective three-dimensional space domain and applies it to strategic procurement. The analysis demonstrates the pre-eminence of Space Domain Awareness (SDA) in certain contexts while recognizing conditions in which spacecraft survivability holds greater importance.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80088603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Linear Implicit Quantized State System method for analyzing mission performance of power systems 电力系统任务性能分析的线性隐式量化状态系统评价方法
IF 0.8 Q3 Engineering Pub Date : 2021-11-25 DOI: 10.1177/15485129211061702
N. Gholizadeh, Joseph M. Hood, R. Dougal
The Linear Implicit Quantized State System (LIQSS) method has been evaluated for suitability in modeling and simulation of long duration mission profiles of Naval power systems which are typically characterized by stiff, non-linear, differential algebraic equations. A reference electromechanical system consists of an electric machine connected to a torque source on the shaft end and to an electric grid at its electrical terminals. The system is highly non-linear and has widely varying rate constants; at a typical steady state operating point, the electrical and electromechanical time constants differ by three orders of magnitude—being 3.2 ms and 2.7 s respectively. Two important characteristics of the simulation—accuracy and computational intensity—both depend on quantization size of the system state variables. At a quantization size of about 1% of a variable’s maximum value, results from the LIQSS1 method differed by less than 1% from results computed by well-known continuous-system state-space methods. The computational efficiency of the LIQSS1 method increased logarithmically with increasing quantization size, without significant loss of accuracy, up to some particular quantization size, beyond which the error increased rapidly. For the particular system under study, a “sweet spot” was found at a particular quantum size that yielded both high computational efficiency and good accuracy.
线性隐式量化状态系统(LIQSS)方法在海军动力系统长时间任务剖面建模和仿真中的适用性进行了评估,这些任务剖面通常具有刚性、非线性、微分代数方程的特征。参考机电系统由一台电机组成,该电机连接到轴端上的扭矩源,并在其电气端子上连接到电网。该系统是高度非线性的,速率常数变化很大;在一个典型的稳态工作点,电气和机电时间常数分别相差3个数量级,分别为3.2 ms和2.7 s。仿真的两个重要特性——精度和计算强度——都取决于系统状态变量的量化大小。当量化大小约为变量最大值的1%时,LIQSS1方法的结果与众所周知的连续系统状态空间方法计算的结果相差不到1%。LIQSS1方法的计算效率随着量化大小的增加呈对数增长,在达到某一特定量化大小之前,精度没有明显损失,超过该特定量化大小后,误差迅速增加。对于正在研究的特定系统,在特定的量子尺寸上发现了一个“最佳点”,可以产生高计算效率和良好的准确性。
{"title":"Evaluation of Linear Implicit Quantized State System method for analyzing mission performance of power systems","authors":"N. Gholizadeh, Joseph M. Hood, R. Dougal","doi":"10.1177/15485129211061702","DOIUrl":"https://doi.org/10.1177/15485129211061702","url":null,"abstract":"The Linear Implicit Quantized State System (LIQSS) method has been evaluated for suitability in modeling and simulation of long duration mission profiles of Naval power systems which are typically characterized by stiff, non-linear, differential algebraic equations. A reference electromechanical system consists of an electric machine connected to a torque source on the shaft end and to an electric grid at its electrical terminals. The system is highly non-linear and has widely varying rate constants; at a typical steady state operating point, the electrical and electromechanical time constants differ by three orders of magnitude—being 3.2 ms and 2.7 s respectively. Two important characteristics of the simulation—accuracy and computational intensity—both depend on quantization size of the system state variables. At a quantization size of about 1% of a variable’s maximum value, results from the LIQSS1 method differed by less than 1% from results computed by well-known continuous-system state-space methods. The computational efficiency of the LIQSS1 method increased logarithmically with increasing quantization size, without significant loss of accuracy, up to some particular quantization size, beyond which the error increased rapidly. For the particular system under study, a “sweet spot” was found at a particular quantum size that yielded both high computational efficiency and good accuracy.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79793132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detection and defense of cyberattacks on the machine learning control of robotic systems 机器学习控制机器人系统的网络攻击检测与防御
IF 0.8 Q3 Engineering Pub Date : 2021-11-21 DOI: 10.1177/15485129211043874
George W. Clark, T. Andel, J. McDonald, T. Johnsten, T. Thomas
Robotic systems are no longer simply built and designed to perform sequential repetitive tasks primarily in a static manufacturing environment. Systems such as autonomous vehicles make use of intricate machine learning algorithms to adapt their behavior to dynamic conditions in their operating environment. These machine learning algorithms provide an additional attack surface for an adversary to exploit in order to perform a cyberattack. Since an attack on robotic systems such as autonomous vehicles have the potential to cause great damage and harm to humans, it is essential that detection and defenses of these attacks be explored. This paper discusses the plausibility of direct and indirect cyberattacks on a machine learning model through the use of a virtual autonomous vehicle operating in a simulation environment using a machine learning model for control. Using this vehicle, this paper proposes various methods of detection of cyberattacks on its machine learning model and discusses possible defense mechanisms to prevent such attacks.
机器人系统不再简单地构建和设计,主要是在静态制造环境中执行顺序重复的任务。自动驾驶汽车等系统利用复杂的机器学习算法来调整其行为以适应其操作环境中的动态条件。这些机器学习算法为对手提供了一个额外的攻击面,以便进行网络攻击。由于对自动驾驶汽车等机器人系统的攻击有可能对人类造成巨大的损害和伤害,因此探索这些攻击的检测和防御至关重要。本文通过使用在使用机器学习模型进行控制的模拟环境中运行的虚拟自动驾驶汽车,讨论了对机器学习模型进行直接和间接网络攻击的可行性。利用该工具,本文在其机器学习模型上提出了各种检测网络攻击的方法,并讨论了防止此类攻击的可能防御机制。
{"title":"Detection and defense of cyberattacks on the machine learning control of robotic systems","authors":"George W. Clark, T. Andel, J. McDonald, T. Johnsten, T. Thomas","doi":"10.1177/15485129211043874","DOIUrl":"https://doi.org/10.1177/15485129211043874","url":null,"abstract":"Robotic systems are no longer simply built and designed to perform sequential repetitive tasks primarily in a static manufacturing environment. Systems such as autonomous vehicles make use of intricate machine learning algorithms to adapt their behavior to dynamic conditions in their operating environment. These machine learning algorithms provide an additional attack surface for an adversary to exploit in order to perform a cyberattack. Since an attack on robotic systems such as autonomous vehicles have the potential to cause great damage and harm to humans, it is essential that detection and defenses of these attacks be explored. This paper discusses the plausibility of direct and indirect cyberattacks on a machine learning model through the use of a virtual autonomous vehicle operating in a simulation environment using a machine learning model for control. Using this vehicle, this paper proposes various methods of detection of cyberattacks on its machine learning model and discusses possible defense mechanisms to prevent such attacks.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79549068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Renewable energy and energy storage to offset diesel generators at expeditionary contingency bases 可再生能源和能源储存,以抵消远征应急基地的柴油发电机
IF 0.8 Q3 Engineering Pub Date : 2021-10-22 DOI: 10.1177/15485129211051377
Scott M. Katalenich, M. Jacobson
Expeditionary contingency bases (non-permanent, rapidly built, and often remote outposts) for military and non-military applications represent a unique opportunity for renewable energy. Conventional applications rely upon diesel generators to provide electricity. However, the potential exists for renewable energy, improved efficiency, and energy storage to largely offset the diesel consumed by generators. This paper introduces a new methodology for planners to incorporate meteorological data for any location worldwide into a planning tool in order to minimize air pollution and carbon emissions while simultaneously improving the energy security and energy resilience of contingency bases. Benefits of the model apply not just to the military, but also to any organization building an expeditionary base—whether for humanitarian assistance, disaster relief, scientific research, or remote community development. Modeling results demonstrate that contingency bases using energy efficient buildings with batteries, rooftop solar photovoltaics, and vertical axis wind turbines can decrease annual generator diesel consumption by upward of 75% in all major climate zones worldwide, while simultaneously reducing air pollution, carbon emissions, and the risk of combat casualties from resupply missions.
军事和非军事用途的远征应急基地(非永久性的、快速建造的、通常是偏远的前哨基地)为可再生能源提供了独特的机会。传统的应用依靠柴油发电机提供电力。然而,可再生能源、提高效率和能源储存的潜力在很大程度上抵消了发电机消耗的柴油。本文为规划人员介绍了一种新的方法,将全球任何地点的气象数据纳入规划工具,以最大限度地减少空气污染和碳排放,同时提高应急基地的能源安全和能源弹性。这种模式的好处不仅适用于军队,也适用于任何建立远征基地的组织,无论是人道主义援助、救灾、科学研究还是偏远社区发展。建模结果表明,应急基地使用具有电池、屋顶太阳能光伏和垂直轴风力涡轮机的节能建筑,可以在全球所有主要气候带减少75%以上的年度发电机柴油消耗,同时减少空气污染、碳排放和再补给任务带来的战斗伤亡风险。
{"title":"Renewable energy and energy storage to offset diesel generators at expeditionary contingency bases","authors":"Scott M. Katalenich, M. Jacobson","doi":"10.1177/15485129211051377","DOIUrl":"https://doi.org/10.1177/15485129211051377","url":null,"abstract":"Expeditionary contingency bases (non-permanent, rapidly built, and often remote outposts) for military and non-military applications represent a unique opportunity for renewable energy. Conventional applications rely upon diesel generators to provide electricity. However, the potential exists for renewable energy, improved efficiency, and energy storage to largely offset the diesel consumed by generators. This paper introduces a new methodology for planners to incorporate meteorological data for any location worldwide into a planning tool in order to minimize air pollution and carbon emissions while simultaneously improving the energy security and energy resilience of contingency bases. Benefits of the model apply not just to the military, but also to any organization building an expeditionary base—whether for humanitarian assistance, disaster relief, scientific research, or remote community development. Modeling results demonstrate that contingency bases using energy efficient buildings with batteries, rooftop solar photovoltaics, and vertical axis wind turbines can decrease annual generator diesel consumption by upward of 75% in all major climate zones worldwide, while simultaneously reducing air pollution, carbon emissions, and the risk of combat casualties from resupply missions.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89809457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Graph analytics and visualization for cyber situational understanding 网络情境理解的图形分析和可视化
IF 0.8 Q3 Engineering Pub Date : 2021-10-08 DOI: 10.1177/15485129211051385
S. Noel, Stephen Purdy, Annie O’Rourke, E. Overly, Brianna Chen, Christine DiFonzo, Joseph Chen, George Sakellis, Mandira Hegde, Mano Sapra, Corrine M. Araki, Jeremy Martin, Ben Koehler, J. Keenan, Timothy Coen, William W. Watson, Jerry Harper, Kevin Jacobs
This paper describes the Cyber Situational Understanding (Cyber SU) Proof of Concept (CySUP) software system for exploring advanced Cyber SU capabilities. CySUP distills complex interrelationships among cyberspace entities to provide the “so what” of cyber events for tactical operations. It combines a variety of software components to build an end-to-end pipeline for live data ingest that populates a graph knowledge base, with query-driven exploratory analysis and interactive visualizations. CySUP integrates with the core infrastructure environment supporting command posts to provide a cyber overlay onto a common operating picture oriented to tactical commanders. It also supports detailed analysis of cyberspace entities and relationships driven by ad hoc graph queries, including the conversion of natural language inquiries to formal query language. To help assess its Cyber SU capabilities, CySUP leverages automated cyber adversary emulation to carry out controlled cyberattack campaigns that impact elements of tactical missions.
本文描述了用于探索高级网络态势理解能力的网络态势理解(Cyber SU)概念验证(CySUP)软件系统。CySUP提炼网络空间实体之间复杂的相互关系,为战术行动提供网络事件的“so what”。它结合了各种软件组件,为实时数据摄取构建端到端管道,填充图形知识库,具有查询驱动的探索性分析和交互式可视化。CySUP集成了支持指挥所的核心基础设施环境,为战术指挥官提供面向共同作战图像的网络覆盖。它还支持由特别图形查询驱动的网络空间实体和关系的详细分析,包括将自然语言查询转换为正式查询语言。为了帮助评估其网络SU能力,CySUP利用自动化的网络对手仿真来执行影响战术任务要素的受控网络攻击活动。
{"title":"Graph analytics and visualization for cyber situational understanding","authors":"S. Noel, Stephen Purdy, Annie O’Rourke, E. Overly, Brianna Chen, Christine DiFonzo, Joseph Chen, George Sakellis, Mandira Hegde, Mano Sapra, Corrine M. Araki, Jeremy Martin, Ben Koehler, J. Keenan, Timothy Coen, William W. Watson, Jerry Harper, Kevin Jacobs","doi":"10.1177/15485129211051385","DOIUrl":"https://doi.org/10.1177/15485129211051385","url":null,"abstract":"This paper describes the Cyber Situational Understanding (Cyber SU) Proof of Concept (CySUP) software system for exploring advanced Cyber SU capabilities. CySUP distills complex interrelationships among cyberspace entities to provide the “so what” of cyber events for tactical operations. It combines a variety of software components to build an end-to-end pipeline for live data ingest that populates a graph knowledge base, with query-driven exploratory analysis and interactive visualizations. CySUP integrates with the core infrastructure environment supporting command posts to provide a cyber overlay onto a common operating picture oriented to tactical commanders. It also supports detailed analysis of cyberspace entities and relationships driven by ad hoc graph queries, including the conversion of natural language inquiries to formal query language. To help assess its Cyber SU capabilities, CySUP leverages automated cyber adversary emulation to carry out controlled cyberattack campaigns that impact elements of tactical missions.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76248273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stochastic preemptive goal programming of Air Force weapon systems mix 空军武器系统混合随机先发制人目标规划
IF 0.8 Q3 Engineering Pub Date : 2021-10-08 DOI: 10.1177/15485129211051751
J. Anderson, Jessica M Astudillo, Zachary Butcher, Matthew D Cornman, Anthony J Correale, James B. Crumpacker, Nathaniel C Dennie, Alexandra R Gaines, Mark A. Gallagher, John C Goodwill, Emily S. Graves, Donald B Hale, Kimberly G Holland, B. D. Huffman, M. McGee, Nicholas A Pollack, Rachel C. Ramirez, Camero Song, Emmie K Swize, Erick A Tello, Jesse G. Wales, J. C. Walker, A. B. Wilson, William F. Wilson, Kylie E Wooten, M. Zawadzki
We demonstrate a new approach to conducting a military force structure study under uncertainty. We apply the stochastic preemptive goal program approach, described by Ledwith et al., to balance probabilistic goals for military force effectiveness and the force’s cost. We use the Bayesian Enterprise Analytic Model (BEAM), as described in “Probabilistic Analysis of Complex Combat Scenarios,” to evaluate effectiveness, expressed in terms of the probability of achieving campaign objectives, in three hypothetical scenarios. We develop cost estimates along with their uncertainty to evaluate the force’s research and development, production, and annual operating and support costs. Our summary depicts how the trade-off between various prioritized goals influences the recommended robust force. Our approach enables defense leaders to balance risk in both force effectiveness in various scenarios along with risk in different types of cost categories.
我们展示了在不确定性下进行军事力量结构研究的新方法。我们应用Ledwith等人描述的随机先发制人目标规划方法来平衡军事力量有效性和部队成本的概率目标。我们使用贝叶斯企业分析模型(BEAM),如“复杂战斗场景的概率分析”中所述,在三个假设场景中以实现战役目标的概率来评估有效性。我们根据其不确定性进行成本估算,以评估部队的研发、生产、年度运营和支持成本。我们的摘要描述了各种优先级目标之间的权衡如何影响推荐的鲁棒力。我们的方法使国防领导人能够平衡各种情况下部队有效性的风险以及不同类型成本类别的风险。
{"title":"Stochastic preemptive goal programming of Air Force weapon systems mix","authors":"J. Anderson, Jessica M Astudillo, Zachary Butcher, Matthew D Cornman, Anthony J Correale, James B. Crumpacker, Nathaniel C Dennie, Alexandra R Gaines, Mark A. Gallagher, John C Goodwill, Emily S. Graves, Donald B Hale, Kimberly G Holland, B. D. Huffman, M. McGee, Nicholas A Pollack, Rachel C. Ramirez, Camero Song, Emmie K Swize, Erick A Tello, Jesse G. Wales, J. C. Walker, A. B. Wilson, William F. Wilson, Kylie E Wooten, M. Zawadzki","doi":"10.1177/15485129211051751","DOIUrl":"https://doi.org/10.1177/15485129211051751","url":null,"abstract":"We demonstrate a new approach to conducting a military force structure study under uncertainty. We apply the stochastic preemptive goal program approach, described by Ledwith et al., to balance probabilistic goals for military force effectiveness and the force’s cost. We use the Bayesian Enterprise Analytic Model (BEAM), as described in “Probabilistic Analysis of Complex Combat Scenarios,” to evaluate effectiveness, expressed in terms of the probability of achieving campaign objectives, in three hypothetical scenarios. We develop cost estimates along with their uncertainty to evaluate the force’s research and development, production, and annual operating and support costs. Our summary depicts how the trade-off between various prioritized goals influences the recommended robust force. Our approach enables defense leaders to balance risk in both force effectiveness in various scenarios along with risk in different types of cost categories.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77293783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recasted nonlinear complex diffusion method for removal of Rician noise from breast MRI images 重构非线性复扩散法去除乳腺MRI图像中的噪声
IF 0.8 Q3 Engineering Pub Date : 2021-10-08 DOI: 10.1177/15485129211052284
Pradeep Kumar, Subodh Srivastava, Y. Padma Sai
The evolution of magnetic resonance imaging (MRI) leads to the study of the internal anatomy of the breast. It maps the physical features along with functional characteristics of selected regions. However, its mapping accuracy is affected by the presence of Rician noise. This noise limits the qualitative and quantitative measures of breast image. This paper proposes recasted nonlinear complex diffusion filter for sharpening the details and removal of Rician noise. It follows maximum likelihood estimation along with optimal parameter selection of complex diffusion where the overall functionality is balanced by regularization parameters. To make recasted nonlinear complex diffusion, the edge threshold constraint “k” of diffusion coefficient is reformed. It is replaced by the standard deviation of the image. It offers a wide range of threshold as variability present in the image with respect to edge. It also provides an automatic selection of “k” instead of user-based value. A series of evaluation has been conducted with respect to different noise ratios further quality improvement of MRI. The qualitative and quantitative assessments of evaluations are tested for the Reference Image Database to Evaluate Therapy Response (RIDER) Breast database. The proposed method is also compared with other existing methods. The quantitative assessment includes the parameters of the full-reference image, human visual system, and no-reference image. It is observed that the proposed method is capable of preserving edges, sharpening the details, and removal of Rician noise.
磁共振成像(MRI)的发展导致了对乳房内部解剖结构的研究。它绘制了选定区域的物理特征和功能特征。然而,它的映射精度受到噪声的影响。这种噪声限制了乳房图像的定性和定量测量。本文提出了一种重形非线性复杂扩散滤波器,用于细节的锐化和噪声的去除。它遵循最大似然估计和复杂扩散的最优参数选择,其中总体功能由正则化参数平衡。为了实现非线性复扩散,对扩散系数的边缘阈值约束“k”进行了改进。它被图像的标准偏差取代。它提供了一个广泛的阈值作为可变性存在于相对于边缘的图像。它还提供了“k”的自动选择,而不是基于用户的值。对不同的噪声比进行了一系列的评价,进一步提高了MRI的质量。评估的定性和定量评估被用于评估治疗反应的参考图像数据库(RIDER)乳房数据库。并与现有方法进行了比较。定量评价包括全参考图像、人眼视觉系统和无参考图像的参数。实验结果表明,该方法能够有效地保留图像边缘,锐化图像细节,去除图像噪声。
{"title":"Recasted nonlinear complex diffusion method for removal of Rician noise from breast MRI images","authors":"Pradeep Kumar, Subodh Srivastava, Y. Padma Sai","doi":"10.1177/15485129211052284","DOIUrl":"https://doi.org/10.1177/15485129211052284","url":null,"abstract":"The evolution of magnetic resonance imaging (MRI) leads to the study of the internal anatomy of the breast. It maps the physical features along with functional characteristics of selected regions. However, its mapping accuracy is affected by the presence of Rician noise. This noise limits the qualitative and quantitative measures of breast image. This paper proposes recasted nonlinear complex diffusion filter for sharpening the details and removal of Rician noise. It follows maximum likelihood estimation along with optimal parameter selection of complex diffusion where the overall functionality is balanced by regularization parameters. To make recasted nonlinear complex diffusion, the edge threshold constraint “k” of diffusion coefficient is reformed. It is replaced by the standard deviation of the image. It offers a wide range of threshold as variability present in the image with respect to edge. It also provides an automatic selection of “k” instead of user-based value. A series of evaluation has been conducted with respect to different noise ratios further quality improvement of MRI. The qualitative and quantitative assessments of evaluations are tested for the Reference Image Database to Evaluate Therapy Response (RIDER) Breast database. The proposed method is also compared with other existing methods. The quantitative assessment includes the parameters of the full-reference image, human visual system, and no-reference image. It is observed that the proposed method is capable of preserving edges, sharpening the details, and removal of Rician noise.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77150710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing network microsegmentation policy for cyber resilience 优化网络微分段策略的网络弹性
IF 0.8 Q3 Engineering Pub Date : 2021-10-08 DOI: 10.1177/15485129211051386
S. Noel, Vipin Swarup, K. Johnsgard
This paper describes an approach for improving cyber resilience through the synthesis of optimal microsegmentation policy for a network. By leveraging microsegmentation security architecture, we can reason about fine-grained policy rules that enforce access for given combinations of source address, destination address, destination port, and protocol. Our approach determines microsegmentation policy rules that limit adversarial movement within a network according to assumed attack scenarios and mission availability needs. For this problem, we formulate a novel optimization objective function that balances cyberattack risks against accessibility to critical network resources. Given the application of a particular set of policy rules as a candidate optimal solution, this objective function estimates the adversary effort for carrying out a particular attack scenario, which it balances against the extent to which the solution restricts access to mission-critical services. We then apply artificial intelligence techniques (evolutionary programming) to learn microsegmentation policy rules that optimize this objective function.
本文描述了一种通过综合网络最优微分段策略来提高网络弹性的方法。通过利用微段安全体系结构,我们可以推断出对源地址、目标地址、目标端口和协议的给定组合强制访问的细粒度策略规则。我们的方法确定了微分段策略规则,根据假设的攻击场景和任务可用性需求,限制网络内的对抗运动。针对这个问题,我们制定了一个新的优化目标函数,以平衡网络攻击风险与关键网络资源的可访问性。给定一组特定策略规则的应用程序作为候选最优解决方案,此目标函数估计对手执行特定攻击场景的努力,并将其与解决方案限制访问关键任务服务的程度进行平衡。然后,我们应用人工智能技术(进化编程)来学习优化该目标函数的微分割策略规则。
{"title":"Optimizing network microsegmentation policy for cyber resilience","authors":"S. Noel, Vipin Swarup, K. Johnsgard","doi":"10.1177/15485129211051386","DOIUrl":"https://doi.org/10.1177/15485129211051386","url":null,"abstract":"This paper describes an approach for improving cyber resilience through the synthesis of optimal microsegmentation policy for a network. By leveraging microsegmentation security architecture, we can reason about fine-grained policy rules that enforce access for given combinations of source address, destination address, destination port, and protocol. Our approach determines microsegmentation policy rules that limit adversarial movement within a network according to assumed attack scenarios and mission availability needs. For this problem, we formulate a novel optimization objective function that balances cyberattack risks against accessibility to critical network resources. Given the application of a particular set of policy rules as a candidate optimal solution, this objective function estimates the adversary effort for carrying out a particular attack scenario, which it balances against the extent to which the solution restricts access to mission-critical services. We then apply artificial intelligence techniques (evolutionary programming) to learn microsegmentation policy rules that optimize this objective function.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79509405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Investigation of Bi-Directional LSTM deep learning-based ubiquitous MIMO uplink NOMA detection for military application considering Robust channel conditions 考虑鲁棒信道条件的基于双向LSTM深度学习的军事通用MIMO上行NOMA检测研究
IF 0.8 Q3 Engineering Pub Date : 2021-10-05 DOI: 10.1177/15485129211050403
Joel Alanya-Beltran, Ravi Shankar, Patteti Krishna, Selva Kumar S
Ubiquitous multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) networks (UMNs) have emerged as an important technology for enabling security and other applications that need continuous monitoring. Their implementation, however, could be obstructed by the limited bandwidth available due to many wireless users. In this paper, bidirectional long short-term memory (LSTM)-based MIMO-NOMA detector is analyzed considering imperfect successive interference cancelation (SIC). Simulation results demonstrate that the traditional SIC MIMO-NOMA scheme achieves 15 dB, and the deep learning (DL) MIMO-NOMA scheme achieves 11 dB for 10 5 number of iterations. There is a gap of 4 dB which means that the DL-based MIMO-NOMA performs better than the traditional SIC MIMO-NOMA techniques. It has been observed that when the channel error factor increases from 0 to 1, the performance of DL decreases significantly. For the channel error factor value less than 0.07, the DL detector performance much better than the SIC detector even though the perfect channel state information (CSI) is considered. The DL detector’s performance decreases significantly where variations between the actual and expected channel states occurred, although the DL-based detectors’ performance was able to sustain its predominance within a specified tolerance range.
无处不在的多输入多输出(MIMO)非正交多址(NOMA)网络(umn)已经成为实现安全和其他需要连续监控的应用的重要技术。然而,由于无线用户众多,可用的带宽有限,可能会阻碍它们的实现。本文分析了考虑不完全连续干扰消除(SIC)的基于双向长短期记忆(LSTM)的MIMO-NOMA检测器。仿真结果表明,传统的SIC MIMO-NOMA方案达到15 dB,深度学习(DL) MIMO-NOMA方案达到11 dB,迭代次数为105次。有4 dB的间隙,这意味着基于dl的MIMO-NOMA比传统的SIC MIMO-NOMA技术性能更好。当信道误差因子从0增加到1时,DL的性能显著下降。当信道误差因子小于0.07时,即使考虑了完美信道状态信息(CSI), DL检测器的性能也明显优于SIC检测器。尽管基于DL的检测器的性能能够在指定的公差范围内保持其优势,但当实际和预期通道状态发生变化时,DL检测器的性能会显著下降。
{"title":"Investigation of Bi-Directional LSTM deep learning-based ubiquitous MIMO uplink NOMA detection for military application considering Robust channel conditions","authors":"Joel Alanya-Beltran, Ravi Shankar, Patteti Krishna, Selva Kumar S","doi":"10.1177/15485129211050403","DOIUrl":"https://doi.org/10.1177/15485129211050403","url":null,"abstract":"Ubiquitous multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) networks (UMNs) have emerged as an important technology for enabling security and other applications that need continuous monitoring. Their implementation, however, could be obstructed by the limited bandwidth available due to many wireless users. In this paper, bidirectional long short-term memory (LSTM)-based MIMO-NOMA detector is analyzed considering imperfect successive interference cancelation (SIC). Simulation results demonstrate that the traditional SIC MIMO-NOMA scheme achieves 15 dB, and the deep learning (DL) MIMO-NOMA scheme achieves 11 dB for 10 5 number of iterations. There is a gap of 4 dB which means that the DL-based MIMO-NOMA performs better than the traditional SIC MIMO-NOMA techniques. It has been observed that when the channel error factor increases from 0 to 1, the performance of DL decreases significantly. For the channel error factor value less than 0.07, the DL detector performance much better than the SIC detector even though the perfect channel state information (CSI) is considered. The DL detector’s performance decreases significantly where variations between the actual and expected channel states occurred, although the DL-based detectors’ performance was able to sustain its predominance within a specified tolerance range.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81455632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Impact of the learning rate and batch size on NOMA system using LSTM-based deep neural network 基于lstm的深度神经网络学习率和批处理大小对NOMA系统的影响
IF 0.8 Q3 Engineering Pub Date : 2021-10-01 DOI: 10.1177/15485129211049782
Ravi Shankar, B. Sarojini, H. Mehraj, A. Kumar, Rahul Neware, Ankur Singh Bist
In this work, the deep learning (DL)-based fifth-generation (5G) non-orthogonal multiple access (NOMA) detector is investigated over the independent and identically distributed (i.i.d.) Nakagami-m fading channel conditions. The end-to-end system performance comparisons are given between the DL NOMA detector with the existing conventional successive interference cancelation (SIC)-based NOMA detector and from results, it has been proved that the DL NOMA detector performance is better than the convention SIC NOMA detector. In our analysis, the long-short term memory (LSTM) recurrent neural network (RNN) is employed, and the results are compared with the minimum mean square estimation (MMSE) and least square estimation (LS) detector’s performance considering all practical conditions such as multipath fading and nonlinear clipping distortion. It has been shown that with the increase in the relay to destination (RD) channel gain, the bit error rate (BER) improves. Also, with the increase in fading parameter m, the BER performance improves. The simulation curves demonstrate that when the clipping ratio (CR) is unity, the performance of the DL-based detector significantly improves as compared to the MMSE and LS detector for the signal-to-noise ratio (SNR) values greater than 15 dB and it proves that the DL technique is more robust to the nonlinear clipping distortion.
在这项工作中,研究了基于深度学习(DL)的第五代(5G)非正交多址(NOMA)检测器在独立和同分布(i.i.d)。Nakagami-m衰落信道条件。将DL - NOMA探测器与现有的基于连续干扰消除(SIC)的传统NOMA探测器进行了端到端系统性能比较,结果表明DL - NOMA探测器的性能优于传统的SIC NOMA探测器。在我们的分析中,使用了长短期记忆(LSTM)递归神经网络(RNN),并将结果与最小均方估计(MMSE)和最小二乘估计(LS)检测器的性能进行了比较,考虑了多径衰落和非线性裁剪失真等所有实际情况。研究表明,随着中继到目的地信道增益的增加,误码率(BER)有所提高。随着衰落参数m的增大,误码率性能也有所提高。仿真曲线表明,当截断比(CR)为1时,当信噪比(SNR)大于15 dB时,基于DL的检波器性能较MMSE和LS检波器有显著提高,证明DL技术对非线性截断失真具有更强的鲁棒性。
{"title":"Impact of the learning rate and batch size on NOMA system using LSTM-based deep neural network","authors":"Ravi Shankar, B. Sarojini, H. Mehraj, A. Kumar, Rahul Neware, Ankur Singh Bist","doi":"10.1177/15485129211049782","DOIUrl":"https://doi.org/10.1177/15485129211049782","url":null,"abstract":"In this work, the deep learning (DL)-based fifth-generation (5G) non-orthogonal multiple access (NOMA) detector is investigated over the independent and identically distributed (i.i.d.) Nakagami-m fading channel conditions. The end-to-end system performance comparisons are given between the DL NOMA detector with the existing conventional successive interference cancelation (SIC)-based NOMA detector and from results, it has been proved that the DL NOMA detector performance is better than the convention SIC NOMA detector. In our analysis, the long-short term memory (LSTM) recurrent neural network (RNN) is employed, and the results are compared with the minimum mean square estimation (MMSE) and least square estimation (LS) detector’s performance considering all practical conditions such as multipath fading and nonlinear clipping distortion. It has been shown that with the increase in the relay to destination (RD) channel gain, the bit error rate (BER) improves. Also, with the increase in fading parameter m, the BER performance improves. The simulation curves demonstrate that when the clipping ratio (CR) is unity, the performance of the DL-based detector significantly improves as compared to the MMSE and LS detector for the signal-to-noise ratio (SNR) values greater than 15 dB and it proves that the DL technique is more robust to the nonlinear clipping distortion.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78680960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1