• Title/Summary/Keyword: Defense Information Technology

Search Result 962, Processing Time 0.027 seconds

A Weighted Block-by-Block Decoding Algorithm for CPM-QC-LDPC Code Using Neural Network

  • Xu, Zuohong;Zhu, Jiang;Zhang, Zixuan;Cheng, Qian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3749-3768
    • /
    • 2018
  • As one of the most potential types of low-density parity-check (LDPC) codes, CPM-QC-LDPC code has considerable advantages but there still exist some limitations in practical application, for example, the existing decoding algorithm has a low convergence rate and a high decoding complexity. According to the structural property of this code, we propose a new method based on a CPM-RID decoding algorithm that decodes block-by-block with weights, which are obtained by neural network training. From the simulation results, we can conclude that our proposed method not only improves the bit error rate and frame error rate performance but also increases the convergence rate, when compared with the original CPM-RID decoding algorithm and scaled MSA algorithm.

The Investigation of the Leased Line Modem Usability in the Wireless Internet Protocol Network (무선 IP 네트워크에서 전용선 모뎀 사용가능성 검증)

  • PARK, MINHO;Baek, Hae Hyeon;Kum, Dong Won;Choi, Hyungseok;Lee, Jong Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.423-431
    • /
    • 2015
  • A leased line modem usability was evaluated and investigated in the wireless internet protocol(IP) network. The signal of the modem in the circuit switching network was translated to IP packet by using several voice codecs (PCM, G.711A, $G.711{\mu}$, and etc.) and transmitted through the wireless IP network. The wireless IP network was simulated by the Tactical information and communication network Modeling and simulation Software(TMS). The performance and usability of the leased line modem are simulated using the system-in-the-loop(SITL) function of TMS with respect to packet delay, jitter, packet discard ratio, codecs, and wireless link BER.

A Study on Ontology Modeling for Weapon Parts Development Information (무기체계 부품국산화 정보의 온톨로지 구축방안 연구)

  • Jang, Woo Hyuk
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.7
    • /
    • pp.873-885
    • /
    • 2015
  • Today, It is difficult to search the various and numerous information efficiently. For this reason, Semantic Web emerged to provide searching services more easily through the structuring of a variety of unstructured format data and the definition of meaningful relationships between information. Especially, definition of relationship and meaning among resources is significant to share and infer related information. Ontology modeling plays just that role. Weapon parts development information is unstructured and dispersed all over. There are many difficulties in finding desired information, leading to getting improper outcomes. In this paper, we present an intuitive ontology model with weapon parts development information including the multi-dimensional information analysis and expansion of the relevant information. This study build up a ontology model through creating class and hierarchy about parts information and defining the properties of classes with Ontology Development 101[1] procedures using Protégé tools. The ontology model provides users with a platform on which search of needed information can be easy and efficient.

A Study on the Evaluation Model for Company Selection of Defense Information System R&D Projects (국방 정보시스템 연구개발사업 업체선정 평가모형 개발에 관한 연구)

  • Kim, Sun-Young;Lee, Young-Jae
    • The Journal of Information Systems
    • /
    • v.19 no.2
    • /
    • pp.73-95
    • /
    • 2010
  • This study shows the scientific and systematic Evaluation Model using factor analysis and AHP methods for the success of defense Information System R&D projects. The evaluation model was divided into 7 evaluation factors such as Developing support, Developing infrastructure, Developing management and test & evaluation, Support factors for strength, Understanding & developing strategy, Developing technology & organization, and Developing performance. And those were composed of totally 24 low level Evaluation index. The Developed Evaluation Model in the paper could be contributed more to objectively and transparently company selection of defense Information System R&D and other defense R&D Projects in the future.

Technology Convergence Analysis Using Social Network k-Core: Focusing on Company Technologies of Defense Industry (사회연결망 k-코어를 활용한 기술융합 분석: 방위산업 기업의 보유기술 중심)

  • Park, Dong-Soo;Yoon, Han-Seong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.3
    • /
    • pp.83-95
    • /
    • 2022
  • A technology can be newly formed through technological convergence achieved by the intersection of two or more technological fields. As the complexity of technology development increases, related interest is increasing. Researches have been carried out on the concept, related indicators and analysis of technology convergence including method of social networks. This paper intends to suggest an analysis method of technology convergence using social networks based on the company's possessing technologies. According to the similarity of technologies among companies, a social network was constructed and the technology convergence was analyzed using k-core, a social network subgroup method. Using the result of k-core, base and element technologies for convergence was identified with their relations. Using the suggested method, technology convergence was analyzed on real technology data of defense-industry companies. When the minimum technology similarity is 0, the overall technology convergence relations between technology elements can be identified. In the scope of data in this paper, technologies of defense S/W, aircraft structure and structural materials are identified as important base technology for convergence.

Multi-Task FaceBoxes: A Lightweight Face Detector Based on Channel Attention and Context Information

  • Qi, Shuaihui;Yang, Jungang;Song, Xiaofeng;Jiang, Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4080-4097
    • /
    • 2020
  • In recent years, convolutional neural network (CNN) has become the primary method for face detection. But its shortcomings are obvious, such as expensive calculation, heavy model, etc. This makes CNN difficult to use on the mobile devices which have limited computing and storage capabilities. Therefore, the design of lightweight CNN for face detection is becoming more and more important with the popularity of smartphones and mobile Internet. Based on the CPU real-time face detector FaceBoxes, we propose a multi-task lightweight face detector, which has low computing cost and higher detection precision. First, to improve the detection capability, the squeeze and excitation modules are used to extract attention between channels. Then, the textual and semantic information are extracted by shallow networks and deep networks respectively to get rich features. Finally, the landmark detection module is used to improve the detection performance for small faces and provide landmark data for face alignment. Experiments on AFW, FDDB, PASCAL, and WIDER FACE datasets show that our algorithm has achieved significant improvement in the mean average precision. Especially, on the WIDER FACE hard validation set, our algorithm outperforms the mean average precision of FaceBoxes by 7.2%. For VGA-resolution images, the running speed of our algorithm can reach 23FPS on a CPU device.

Efficient Multicast Routing on BCube-Based Data Centers

  • Xie, Junjie;Guo, Deke;Xu, Jia;Luo, Lailong;Teng, Xiaoqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4343-4355
    • /
    • 2014
  • Multicast group communication has many advantages in data centers and thus is widely used by many applications. It can efficiently reduce the network traffic and improve the application throughput. For the multicast application in data centers, an essential problem is how to find a minimal multicast tree, which has been proved to be NP-hard. In this paper, we propose an approximation tree-building method for the minimal multicast problem, named HD(Hamming Distance)-based multicast tree. Consider that many new network structures have been proposed for data centers. We choose three representative ones, including BCube, FBFLY, and HyperX, whose topological structures can be regarded as the generalized hypercube. Given a multicast group in BCube, the HD-based method can jointly schedule the path from each of receiver to the only sender among multiple disjoint paths; hence, it can quickly construct an efficient multicast tree with the low cost. The experimental results demonstrate that our method consumes less time to construct an efficient multicast tree, while considerably reduces the cost of the multicast tree compared to the representative methods. Our approach for BCube can also be adapted to other generalized hypercube network structures for data centers after minimal modifications.

Robust Backup Path Selection in Overlay Routing with Bloom Filters

  • Zhou, Xiaolei;Guo, Deke;Chen, Tao;Luo, Xueshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.1890-1910
    • /
    • 2013
  • Routing overlay offers an ideal methodology to improve the end-to-end communication performance by deriving a backup path for any node pair. This paper focuses on a challenging issue of selecting a proper backup path to bypass the failures on the default path with high probability for any node pair. For existing backup path selection approaches, our trace-driven evaluation results demonstrate that the backup and default paths for any node pair overlap with high probability and hence usually fail simultaneously. Consequently, such approaches fail to derive a robust backup path that can take over in the presence of failure on the default path. In this paper, we propose a three-phase RBPS approach to identify a proper and robust backup path. It utilizes the traceroute probing approach to obtain the fine-grained topology information, and systematically employs the grid quorum system and the Bloom filter to reduce the resulting communication overhead. Two criteria, delay and fault-tolerant ability on average, of the backup path are proposed to evaluate the performance of our RBPS approach. Extensive trace-driven evaluations show that the fault-tolerant ability of the backup path can be improved by about 60%, while the delay gain ratio concentrated at 14% after replacing existing approaches with ours. Consequently, our approach can derive a more robust and available backup path for any node pair than existing approaches. This is more important than finding a backup path with the lowest delay compared to the default path for any node pair.

A Fast and Robust Algorithm for Fighting Behavior Detection Based on Motion Vectors

  • Xie, Jianbin;Liu, Tong;Yan, Wei;Li, Peiqin;Zhuang, Zhaowen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2191-2203
    • /
    • 2011
  • In this paper, we propose a fast and robust algorithm for fighting behavior detection based on Motion Vectors (MV), in order to solve the problem of low speed and weak robustness in traditional fighting behavior detection. Firstly, we analyze the characteristics of fighting scenes and activities, and then use motion estimation algorithm based on block-matching to calculate MV of motion regions. Secondly, we extract features from magnitudes and directions of MV, and normalize these features by using Joint Gaussian Membership Function, and then fuse these features by using weighted arithmetic average method. Finally, we present the conception of Average Maximum Violence Index (AMVI) to judge the fighting behavior in surveillance scenes. Experiments show that the new algorithm achieves high speed and strong robustness for fighting behavior detection in surveillance scenes.

Scaling Inter-domain Routing System via Path Exploration Aggregation

  • Wang, Xiaoqiang;Zhu, Peidong;Lu, Xicheng;Chen, Kan;Cao, Huayang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.490-508
    • /
    • 2013
  • One of the most important scalability issues facing the current Internet is the rapidly increasing rate of BGP updates (BGP churn), to which route flap and path exploration are the two major contributors. Current countermeasures would either cause severe reachability loss or delay BGP convergence, and are becoming less attractive for the rising concern about routing convergence as the prevalence of Internet-based real time applications. Based on the observation that highly active prefixes usually repeatedly explore very few as-paths during path exploration, we propose a router-level mechanism, Path Exploration Aggregation (PEA), to scale BGP without either causing prefix unreachable or slowing routing convergence. PEA performs aggregation on the transient paths explored by a highly active prefix, and propagates the aggregated path instead to reduce the updates caused by as-path changes. Moreover, in order to avoid the use of unstable routes, PEA purposely prolongs the aggregated path via as-path prepending to make it less preferred in the perspective of downstream routers. With the BGP traces obtained from RouteViews and RIPE-RIS projects, PEA can reduce BGP updates by up to 63.1%, shorten path exploration duration by up to 53.3%, and accelerate the convergence 7.39 seconds on average per routing event.