A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Survivable mobile wireless networks
2002
Proceedings of the ACM workshop on Wireless security - WiSE '02
In this paper we survey issues and challenges in enhancing the survivability of mobile wireless networks, with particular emphasis on military requirements * . ...
survivability such as adaptive networks and satellites. ...
Furthermore, each may signify a different kind of vulnerability. For instance, consider two networks N 1 and N 2 . ...
doi:10.1145/570681.570685
dblp:conf/ws/SterbenzKHJLRZ02
fatcat:xxdhvrmhpbaiffbrjdqskogqwi
Enhancing Reliability of Tactical MANETs by Improving Routing Decisions
2018
Journal of Low Power Electronics and Applications
Mobile ad-hoc networks (MANETs) have been primarily designed to enhance tactical communications in a battlefield. They provide dynamic connectivity without requiring any pre-existing infrastructure. ...
The proposed routing protocol can quickly adapt to dynamic changes in network topology and link quality variations often encountered in tactical field operations. ...
of tactical MANETs, the number of hops for data transmission must be limited. ...
doi:10.3390/jlpea8040049
fatcat:ntbl4w6iyvgz7mr37sluvkchqm
Machine Learning Frameworks in Cancer Detection
2021
E3S Web of Conferences
These technologies include Bayesian networks and artificial neural networks, along with a number of other approaches. ...
All of the supervised machine learning approaches described here, along with a variety of input characteristics and data samples, are used to build the prediction models. ...
They also tested many different kinds of artificial neural network designs in order to identify the most effective one for cancer survival prediction. ...
doi:10.1051/e3sconf/202129701073
fatcat:pks3cjc4gfalzbqw4bumm6ugyi
Cyber-foraging for improving survivability of mobile systems
2015
MILCOM 2015 - 2015 IEEE Military Communications Conference
Cyber-foraging is a technique for dynamically augmenting the computing power of resource-limited mobile devices by opportunistically exploiting nearby fixed computing infrastructure. ...
However, the characteristics of tactical environments-such as dynamic context, limited computing resources, disconnected-intermittentlimited (DIL) network connectivity, and high levels of stress-pose a ...
Banjeree et al state that survivability deals with three basic kinds of threats: attacks, failures, and accidents ]. ...
doi:10.1109/milcom.2015.7357644
dblp:conf/milcom/EcheverriaLRB15
fatcat:ysvitfo47jhrlmnvc7gopppf2i
Network for hypersonic UCAV swarms
2020
Science China Information Sciences
In recent years, academia and industry have made many efforts to achieve common tactical data link systems and commercial drone networks. ...
In addition, a comprehensive survey of potential solutions for the network design is presented. ...
Acknowledgements This work was supported by National Natural Science Foundation of China (Grant Nos. U1636125, 6180011907, U1836201). ...
doi:10.1007/s11432-019-2765-7
fatcat:73eck6bvangqlopylxjbxlabt4
CLASSIFICATION AND CLUSTERING OF GENE EXPRESSION IN THE FORM OF MICROARRAY AND PREDICTION OF CANCERSUSCEPTIBILIT, CANCERRECURRENCE AND CANCERSURVIVAL
2020
JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
The early medical diagnosis and also outlook of a cancer kind have actually ended up being a requirement in cancer investigation, as it can assist in the succeeding scientific control of people. ...
For that reason, these strategies have been actually taken advantage of as a goal to model the advancement and also treatment of malignant disorders. ...
Away from these end results among the magazines employs ML techniques for the forecast of susceptibility in a cancer kind. ...
doi:10.26782/jmcms.2020.06.00015
fatcat:n6kdbxfohja5vcmp4avslrlrw4
Measurement of Effectiveness for an Anti-torpedo Combat System Using a Discrete Event Systems Specification-based Underwater Warfare Simulator
2011
The Journal of Defence Modeling and Simulation: Applications, Methodology, Technology
In addition, assessment of submarine tactical development, during an engagement against a torpedo, can be conducted using M&S techniques. ...
Modeling and simulation (M&S) has long played an important role in developing tactics and evaluating the measure of effectiveness (MOE) for the underwater warfare system. ...
For example, in case of underwater warfare that should reflect network centric warfare, link operations, such as link-11, should be needed in the underwater platform model. ...
doi:10.1177/1548512910390245
fatcat:fzz3kfia5vfurcox4j7zlzwtga
Outlining a Set of Theory-based Requirements for the Future Digital Soldier
2020
Academic and Applied Research in Military and Public
a network in network-centric military operations. ...
It requires a high level of precision, expertise and dedication to set the right standards for military concepts and to establish a proper set of requirements of standards for military concepts, such as ...
During the cooperation of different arms, there is a need for continuous networking, and reliable operation of voice and data communications. ...
doi:10.32565/aarms.2020.1.8
fatcat:as2xltwfcrfblm7gzqainxsreu
Fault-Tolerant Embedding Algorithm for Node Failure in Airborne Tactical Network Virtualization
2022
IEEE Access
INDEX TERMS Airborne tactical network, network virtualization, survivable virtual network embedding, node failure, pre-configured cycle. ...
With complex interference and malicious attacks, the application of NV is challenged by network failures when instantiating virtual networks on a shared substrate network, which is known as survivable ...
ACKNOWLEDGMENT The authors would like to thank the editors and the anonymous reviewers whose insightful comments have helped to improve the quality of this paper considerably. ...
doi:10.1109/access.2022.3180744
fatcat:cgb62ypgkvbxtjjw4qqkfzqani
Agriculture Information Service Built on Geospatial Data Infrastructure and Crop Modeling
2014
Proceedings of the 2014 International Workshop on Web Intelligence and Smart Sensing - IWWISS '14
where to apply fertilizer more to enhance homogeneity of growth and robustness of crops in their fields. ...
An agricultural information service platform, called FieldTouch, is being built and tested on geospatial data infrastructure and crop modeling framework. ...
GAs are powerful search techniques combining the survival of the fittest mechanism with a structured yet randomized information exchange to search for solutions of complex search and optimization problems ...
doi:10.1145/2637064.2637094
dblp:conf/iwwiss/HondaIYWCT14
fatcat:aeagzw6y2fcgjgmjzl3ummjjui
The system reliability analyser tool
2004
Requirements Engineering
It employs a Bayesian belief network (BBN) model to assess system reliability (Pearl in Probabilistic reasoning in intelligent systems: networks of plausible information, 1988) based on a variety of high-level ...
This paper describes the design and evaluation of a socio-technical design support system, the system reliability analyser (SRA). ...
Acknowledgements This research has been funded by the EPSRC as part of the SIMP (system integration for major projects) project. ...
doi:10.1007/s00766-004-0200-x
fatcat:c4c7f5ecirgupeof6rqikd5kvq
Decision-Making by Data, An Application of Data Science with Cognitive Ergonomics
2018
International Journal of Advances in Management and Economics
In this context, a new denomination known as Data Science, capable of handling data from several areas of knowledge, is a great capacity to display quick and objective information, which in a Business ...
Such a need comes in the face of its ability to make decisions in the increasingly shorter timeframe, the fact that it poses major challenges for data collection, transport, processing and performance. ...
Among the main techniques used in data mining are statistical techniques, machine learning techniques and techniques based on information validation, which are: decision trees, neural networks, and Bayesian ...
doi:10.31270/ijame/07/04/2018/02
fatcat:7zwo3g3afvcnnplwdk7kqwic4u
Dispersed Computing for Tactical Edge in Future Wars: Vision, Architecture, and Challenges
2021
Wireless Communications and Mobile Computing
We illustrate the fundamental principles of building a network model, channel allocation, and forwarding control mechanism of the network architecture for DCOMP called DANET and then design a new architecture ...
Thus, to meet the needs of communication and computing to build a new generation of computing architecture for real-time sharing and service collaboration of tactical edge resources to win the future war ...
of the network for data transmission. ...
doi:10.1155/2021/8899186
fatcat:hwuxnfgkr5fcjdwznmdyntgnvm
Cognitive Model for Assessing the Security of Information Systems for Various Purposes
2022
Symmetry
tools, based on the symmetry property that develops from integrated ontological and neuro-Bayesian models; typical clusters of information systems; tactics and techniques for the implementation of information ...
This article substantiates the relevance of the development of a cognitive model for assessing the security of information systems for various purposes, designed to support decision-making by officials ...
, tactics, and techniques for the implementation of ISTs. ...
doi:10.3390/sym14122631
fatcat:zfby75liqvfn5apu6jstqsxgku
Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph
[article]
2014
arXiv
pre-print
against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group. ...
Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. ...
With growing demand for network-integrated tactical systems, the integrity of data-links is an issue, for example: 1. Credibility of equipment/services suppliers 2. ...
arXiv:1401.6379v2
fatcat:u4pplhgcevasbhgczkqpvdcny4
« Previous
Showing results 1 — 15 out of 24,024 results