• Title/Summary/Keyword: Defense Information Technology

Search Result 962, Processing Time 0.032 seconds

PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks

  • Zhang, Xi;Wang, Xiaofei;Liu, Anna;Zhang, Quan;Tang, Chaojing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권4호
    • /
    • pp.973-988
    • /
    • 2012
  • Delay tolerant networks (DTNs) characterized by the lack of guaranteed end-to-end paths exploit opportunistic data forwarding mechanism, which depends on the hypothesis that nodes are willing to store, carry, and forward the in-transit messages in an opportunistic way. However, this hypothesis might easily be violated by the presence of selfish nodes constrained with energy, bandwidth, and processing power. To address this problem, we propose a practical reputation-based incentive scheme, named PRI, to stimulate honest forwarding and discipline selfish behavior. A novel concept of successful forwarding credential and an observation protocol are presented to cope with the detection of nodes' behavior, and a reputation model is proposed to determine egoistic individuals. The simulation results demonstrate the effectiveness and practicality of our proposal.

Size Aware Correlation Filter Tracking with Adaptive Aspect Ratio Estimation

  • Zhu, Xiaozhou;Song, Xin;Chen, Xiaoqian;Bai, Yuzhu;Lu, Huimin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.805-825
    • /
    • 2017
  • Correlation Filter-based Trackers (CFTs) gained popularity recently for their effectiveness and efficiency. To deal with the size changes of the target which may degenerate the tracking performance, scale estimation has been introduced in existing CFTs. However, the variations of the aspect ratio were usually neglected, which also influence the size of the target. In this paper, Size Aware Correlation Filter Trackers (SACFTs) are proposed to deal with this problem. The SACFTs not only determine the translation and scale variations, but also take the aspect ratio changes into consideration, thus a better estimation of the size of the target can be realized, which improves the overall tracking performance. And competing results can be achieved compared with state-of-the-art methods according to the experiments conducted on two large scale datasets.

Selecting the Optimal Hidden Layer of Extreme Learning Machine Using Multiple Kernel Learning

  • Zhao, Wentao;Li, Pan;Liu, Qiang;Liu, Dan;Liu, Xinwang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.5765-5781
    • /
    • 2018
  • Extreme learning machine (ELM) is emerging as a powerful machine learning method in a variety of application scenarios due to its promising advantages of high accuracy, fast learning speed and easy of implementation. However, how to select the optimal hidden layer of ELM is still an open question in the ELM community. Basically, the number of hidden layer nodes is a sensitive hyperparameter that significantly affects the performance of ELM. To address this challenging problem, we propose to adopt multiple kernel learning (MKL) to design a multi-hidden-layer-kernel ELM (MHLK-ELM). Specifically, we first integrate kernel functions with random feature mapping of ELM to design a hidden-layer-kernel ELM (HLK-ELM), which serves as the base of MHLK-ELM. Then, we utilize the MKL method to propose two versions of MHLK-ELMs, called sparse and non-sparse MHLK-ELMs. Both two types of MHLK-ELMs can effectively find out the optimal linear combination of multiple HLK-ELMs for different classification and regression problems. Experimental results on seven data sets, among which three data sets are relevant to classification and four ones are relevant to regression, demonstrate that the proposed MHLK-ELM achieves superior performance compared with conventional ELM and basic HLK-ELM.

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권11호
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.

국방데이터 품질관리를 위한 대상 체계 선정 기준 (Selection Criteria of Target Systems for Quality Management of National Defense Data)

  • 손지성;황윤영
    • 인터넷정보학회논문지
    • /
    • 제24권6호
    • /
    • pp.155-160
    • /
    • 2023
  • 국방부 또는 공공기관에서 관리하는 모든 데이터베이스 및 시스템의 데이터는 일정 품질 이상 보장하는 것이 원칙이나 대부분 다수의 정보시스템을 구축·운영하기 때문에 현실적으로 모든 시스템에 대한 데이터 품질관리는 한계가 있다. 국방데이터는 업무의 특성상 공개되지 않는 데이터가 대부분이고 군에서 업무의 필요 및 중요도에 따라 전략적으로 개발되거나 통합되어 관리하는 시스템이 많다. 또한, 무기체계에서 발생하는 센서데이터, 비정형데이터, 인공지능 학습데이터 등 데이터 품질관리가 필요한 다양한 유형의 많은 데이터가 축척되고 생성되고 있다. 그러나, 국방데이터를 위한 데이터 품질관리 가이드 및 품질관리 대상 선정에 대한 가이드가 부재한 상황이고, 공공데이터 품질관리 매뉴얼의 기준에 따라 국방데이터의 품질관리 대상 데이터베이스 및 시스템을 선정하기에는 선정 기준이 모호하며 실무 담당자에 의존적이다. 따라서, 본 논문에서는 국방데이터의 품질관리를 위한 대상 체계 선정 기준에 대하여 제안하며, 제안한 선정기준들과 기존 매뉴얼의 선정기준과의 관계성에 대하여 기술한다.

연합작전을 위한 군 자동화 시스템에서의 기계번역 (Machine Translation in an Automated Defense System for Combined Operation)

  • 정광렬;김성용;김철호
    • 한국정보과학회 언어공학연구회:학술대회논문집(한글 및 한국어 정보처리)
    • /
    • 한국정보과학회언어공학연구회 1992년도 제4회 한글 및 한국어정보처리 학술대회
    • /
    • pp.481-490
    • /
    • 1992
  • 본 논문은 연합 작전을 위한 군 자동화 시스템에서의 기계번역에 대하여 설명한다. 연합작전은 단일한 임무의 수행을 위하여 공동 행동을 취하는 둘 이상의 연합국 부대에 의하여 실시되는 작전이며, 작전 구성원들이 사용하는 언어는 한국어와 영어 등 2개 국어 이상을 동시에 사용하고 있으므로, 상호간의 의사소통을 원활히 하기 위해서는 정확한 번역시스템이 필요하다. 현재 사용중인 군 자동화 시스템에서 기계번역의 개발과 시험 내용을 사용자의 요구사항, 시험 항목 및 현 기능을 중심으로 설명한다. 또한, 번역 결과의 평가에 대해 설명하고 향후의 기능 향상 요구사항 및 예정사항을 제시한다.

  • PDF

Efficient Channel Assignment Scheme Based on Finite Projective Plane Theory

  • Chen, Chi-Chung;Su, Ing-Jiunn;Liao, Chien-Hsing;Woo, Tai-Kuo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권2호
    • /
    • pp.628-646
    • /
    • 2016
  • This paper proposes a novel channel assignment scheme that is based on finite projective plane (FPP) theory. The proposed scheme involves using a Markov chain model to allocate N channels to N users through intermixed channel group arrangements, particularly when channel resources are idle because of inefficient use. The intermixed FPP-based channel group arrangements successfully related Markov chain modeling to punch through ratio formulations proposed in this study, ensuring fair resource use among users. The simulation results for the proposed FPP scheme clearly revealed that the defined throughput increased, particularly under light traffic load conditions. Nevertheless, if the proposed scheme is combined with successive interference cancellation techniques, considerably higher throughput is predicted, even under heavy traffic load conditions.

An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권9호
    • /
    • pp.35-42
    • /
    • 2019
  • In this paper, we propose an approach to apply network-based moving target defense into Internet of Things (IoT) networks. The IoT is a technology that provides the high interconnectivity of things like electronic devices. However, cyber security risks are expected to increase as the interconnectivity of such devices increases. One recent study demonstrated a man-in-the-middle attack in the statically configured IoT network. In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. The approach continuously changes system's attack surface to prevent attacks. After analyzing IPv4 / IPv6-based moving target defense schemes and IoT network-related technologies, we present our approach in terms of addressing systems, address mutation techniques, communication models, network configuration, and node mobility. In addition, we summarize the direction of future research in relation to the proposed approach.

정보시스템 운영개념 연구: D정보자원관리시스템 사례 (An Operational Concept for Information Systems: A Case of the D Information Resource Management Information System)

  • 이상호;심승배
    • 한국IT서비스학회지
    • /
    • 제5권1호
    • /
    • pp.129-147
    • /
    • 2006
  • This study analyzed an operational concept for the D Information Resource Management Information System (DIRMIS) to manage any IT resources effectively in defense area. We first deduced the concept of the information resource management (IRM) for defense area from the literature review, and we suggested a guideline, which has used in defense area, of the documentation for the operational concept description (OCD). Moreover, we developed the operational concept for the DIRMIS following the guideline. Especially, this study is a practical approach for suggesting of a case, and the share of accumulated cases will contribute to advance in System Integration (SI) industry as well as academic research.

Energy-efficient Joint Control of Epidemic Routing in Delay Tolerant Networks

  • Wu, Yahui;Deng, Su;Huang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권2호
    • /
    • pp.234-252
    • /
    • 2013
  • Due to the uncertain of connections in Delay Tolerant Networks (DTNs), most routing algorithms in DTNs need nodes to forward the message to others based on the opportunistic contact. The contact is related with the beaconing rate. In particular, nodes have more chances to encounter with each other with bigger beaconing rate, but more energy will be used. On the other hand, if the nodes forward the message to every node all the time, the efficiency of the routing algorithm is better, but it needs more energy, too. This paper tries to exploit the optimal beaconing rate and forwarding rate when the total energy is constraint. First, a theoretical framework is proposed, which can be used to evaluate the performance with different forwarding rate and beaconing rate. Then, this paper formulates a joint optimization problem based on the framework. Through Pontryagin's Maximal Principle, this paper obtains the optimal policy and proves that both the optimal forwarding and beaconing rates conform to threshold form. Simulation results show the accuracy of the theoretical framework. Extensive numerical results show that the optimal policy obtained in this paper is the best.