Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








24,024 Hits in 5.5 sec

Survivable mobile wireless networks

James P. G. Sterbenz, Rajesh Krishnan, Regina Rosales Hain, Alden W. Jackson, David Levin, Ram Ramanathan, John Zao
2002 Proceedings of the ACM workshop on Wireless security - WiSE '02  
In this paper we survey issues and challenges in enhancing the survivability of mobile wireless networks, with particular emphasis on military requirements * .  ...  survivability such as adaptive networks and satellites.  ...  Furthermore, each may signify a different kind of vulnerability. For instance, consider two networks N 1 and N 2 .  ... 
doi:10.1145/570681.570685 dblp:conf/ws/SterbenzKHJLRZ02 fatcat:xxdhvrmhpbaiffbrjdqskogqwi

Enhancing Reliability of Tactical MANETs by Improving Routing Decisions

Salman Al-Shehri, Pavel Loskot
2018 Journal of Low Power Electronics and Applications  
Mobile ad-hoc networks (MANETs) have been primarily designed to enhance tactical communications in a battlefield. They provide dynamic connectivity without requiring any pre-existing infrastructure.  ...  The proposed routing protocol can quickly adapt to dynamic changes in network topology and link quality variations often encountered in tactical field operations.  ...  of tactical MANETs, the number of hops for data transmission must be limited.  ... 
doi:10.3390/jlpea8040049 fatcat:ntbl4w6iyvgz7mr37sluvkchqm

Machine Learning Frameworks in Cancer Detection

Sabyasachi Pramanik, K. Martin Sagayam, Om Prakash Jena, S. Krit
2021 E3S Web of Conferences  
These technologies include Bayesian networks and artificial neural networks, along with a number of other approaches.  ...  All of the supervised machine learning approaches described here, along with a variety of input characteristics and data samples, are used to build the prediction models.  ...  They also tested many different kinds of artificial neural network designs in order to identify the most effective one for cancer survival prediction.  ... 
doi:10.1051/e3sconf/202129701073 fatcat:pks3cjc4gfalzbqw4bumm6ugyi

Cyber-foraging for improving survivability of mobile systems

Sebastian Echeverria, Grace A. Lewis, James Root, Ben Bradshaw
2015 MILCOM 2015 - 2015 IEEE Military Communications Conference  
Cyber-foraging is a technique for dynamically augmenting the computing power of resource-limited mobile devices by opportunistically exploiting nearby fixed computing infrastructure.  ...  However, the characteristics of tactical environments-such as dynamic context, limited computing resources, disconnected-intermittentlimited (DIL) network connectivity, and high levels of stress-pose a  ...  Banjeree et al state that survivability deals with three basic kinds of threats: attacks, failures, and accidents ].  ... 
doi:10.1109/milcom.2015.7357644 dblp:conf/milcom/EcheverriaLRB15 fatcat:ysvitfo47jhrlmnvc7gopppf2i

Network for hypersonic UCAV swarms

Shixun Luo, Zhongshan Zhang, Shuai Wang, Shuo Zhang, Jibo Dai, Xiangyuan Bu, Jianping An
2020 Science China Information Sciences  
In recent years, academia and industry have made many efforts to achieve common tactical data link systems and commercial drone networks.  ...  In addition, a comprehensive survey of potential solutions for the network design is presented.  ...  Acknowledgements This work was supported by National Natural Science Foundation of China (Grant Nos. U1636125, 6180011907, U1836201).  ... 
doi:10.1007/s11432-019-2765-7 fatcat:73eck6bvangqlopylxjbxlabt4

CLASSIFICATION AND CLUSTERING OF GENE EXPRESSION IN THE FORM OF MICROARRAY AND PREDICTION OF CANCERSUSCEPTIBILIT, CANCERRECURRENCE AND CANCERSURVIVAL

Naresh Kumar Sripada
2020 JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES  
The early medical diagnosis and also outlook of a cancer kind have actually ended up being a requirement in cancer investigation, as it can assist in the succeeding scientific control of people.  ...  For that reason, these strategies have been actually taken advantage of as a goal to model the advancement and also treatment of malignant disorders.  ...  Away from these end results among the magazines employs ML techniques for the forecast of susceptibility in a cancer kind.  ... 
doi:10.26782/jmcms.2020.06.00015 fatcat:n6kdbxfohja5vcmp4avslrlrw4

Measurement of Effectiveness for an Anti-torpedo Combat System Using a Discrete Event Systems Specification-based Underwater Warfare Simulator

Kyung-Min Seo, Hae Sang Song, Se Jung Kwon, Tag Gon Kim, Tag Gon Kim, Il-Chul Moon
2011 The Journal of Defence Modeling and Simulation: Applications, Methodology, Technology  
In addition, assessment of submarine tactical development, during an engagement against a torpedo, can be conducted using M&S techniques.  ...  Modeling and simulation (M&S) has long played an important role in developing tactics and evaluating the measure of effectiveness (MOE) for the underwater warfare system.  ...  For example, in case of underwater warfare that should reflect network centric warfare, link operations, such as link-11, should be needed in the underwater platform model.  ... 
doi:10.1177/1548512910390245 fatcat:fzz3kfia5vfurcox4j7zlzwtga

Outlining a Set of Theory-based Requirements for the Future Digital Soldier

Szilveszter Szeleczki
2020 Academic and Applied Research in Military and Public  
a network in network-centric military operations.  ...  It requires a high level of precision, expertise and dedication to set the right standards for military concepts and to establish a proper set of requirements of standards for military concepts, such as  ...  During the cooperation of different arms, there is a need for continuous networking, and reliable operation of voice and data communications.  ... 
doi:10.32565/aarms.2020.1.8 fatcat:as2xltwfcrfblm7gzqainxsreu

Fault-Tolerant Embedding Algorithm for Node Failure in Airborne Tactical Network Virtualization

Jingcheng Miao, Na Lv, Qi Gao, Kefan Chen, Xiang Wang
2022 IEEE Access  
INDEX TERMS Airborne tactical network, network virtualization, survivable virtual network embedding, node failure, pre-configured cycle.  ...  With complex interference and malicious attacks, the application of NV is challenged by network failures when instantiating virtual networks on a shared substrate network, which is known as survivable  ...  ACKNOWLEDGMENT The authors would like to thank the editors and the anonymous reviewers whose insightful comments have helped to improve the quality of this paper considerably.  ... 
doi:10.1109/access.2022.3180744 fatcat:cgb62ypgkvbxtjjw4qqkfzqani

Agriculture Information Service Built on Geospatial Data Infrastructure and Crop Modeling

Kiyoshi Honda, Amor V. M. Ines, Akihiro Yui, Apichon Witayangkurn, Rassarin Chinnachodteeranun, Kumpee Teeravech
2014 Proceedings of the 2014 International Workshop on Web Intelligence and Smart Sensing - IWWISS '14  
where to apply fertilizer more to enhance homogeneity of growth and robustness of crops in their fields.  ...  An agricultural information service platform, called FieldTouch, is being built and tested on geospatial data infrastructure and crop modeling framework.  ...  GAs are powerful search techniques combining the survival of the fittest mechanism with a structured yet randomized information exchange to search for solutions of complex search and optimization problems  ... 
doi:10.1145/2637064.2637094 dblp:conf/iwwiss/HondaIYWCT14 fatcat:aeagzw6y2fcgjgmjzl3ummjjui

The system reliability analyser tool

Andreas Gregoriades, Alistair Sutcliffe
2004 Requirements Engineering  
It employs a Bayesian belief network (BBN) model to assess system reliability (Pearl in Probabilistic reasoning in intelligent systems: networks of plausible information, 1988) based on a variety of high-level  ...  This paper describes the design and evaluation of a socio-technical design support system, the system reliability analyser (SRA).  ...  Acknowledgements This research has been funded by the EPSRC as part of the SIMP (system integration for major projects) project.  ... 
doi:10.1007/s00766-004-0200-x fatcat:c4c7f5ecirgupeof6rqikd5kvq

Decision-Making by Data, An Application of Data Science with Cognitive Ergonomics

Claudia Lysia De Oliveira Araujo, Thomas Jeferson Nogueira Santos, Henrique Matias Galvão
2018 International Journal of Advances in Management and Economics  
In this context, a new denomination known as Data Science, capable of handling data from several areas of knowledge, is a great capacity to display quick and objective information, which in a Business  ...  Such a need comes in the face of its ability to make decisions in the increasingly shorter timeframe, the fact that it poses major challenges for data collection, transport, processing and performance.  ...  Among the main techniques used in data mining are statistical techniques, machine learning techniques and techniques based on information validation, which are: decision trees, neural networks, and Bayesian  ... 
doi:10.31270/ijame/07/04/2018/02 fatcat:7zwo3g3afvcnnplwdk7kqwic4u

Dispersed Computing for Tactical Edge in Future Wars: Vision, Architecture, and Challenges

Haigen Yang, Gang Li, GuiYing Sun, JinXiang Chen, Xiangxin Meng, HongYan Yu, Wenting Xu, Qiang Qu, Xiaokun Ying, Shaohua Wan
2021 Wireless Communications and Mobile Computing  
We illustrate the fundamental principles of building a network model, channel allocation, and forwarding control mechanism of the network architecture for DCOMP called DANET and then design a new architecture  ...  Thus, to meet the needs of communication and computing to build a new generation of computing architecture for real-time sharing and service collaboration of tactical edge resources to win the future war  ...  of the network for data transmission.  ... 
doi:10.1155/2021/8899186 fatcat:hwuxnfgkr5fcjdwznmdyntgnvm

Cognitive Model for Assessing the Security of Information Systems for Various Purposes

Vladimir V. Baranov, Alexander A. Shelupanov
2022 Symmetry  
tools, based on the symmetry property that develops from integrated ontological and neuro-Bayesian models; typical clusters of information systems; tactics and techniques for the implementation of information  ...  This article substantiates the relevance of the development of a cognitive model for assessing the security of information systems for various purposes, designed to support decision-making by officials  ...  , tactics, and techniques for the implementation of ISTs.  ... 
doi:10.3390/sym14122631 fatcat:zfby75liqvfn5apu6jstqsxgku

Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph [article]

Nyagudi Musandu Nyagudi
2014 arXiv   pre-print
against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.  ...  Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations.  ...  With growing demand for network-integrated tactical systems, the integrity of data-links is an issue, for example: 1. Credibility of equipment/services suppliers 2.  ... 
arXiv:1401.6379v2 fatcat:u4pplhgcevasbhgczkqpvdcny4
« Previous Showing results 1 — 15 out of 24,024 results