• Title/Summary/Keyword: Defense Information Technology

Search Result 962, Processing Time 0.025 seconds

PRI: A Practical Reputation-based Incentive Scheme for Delay Tolerant Networks

  • Zhang, Xi;Wang, Xiaofei;Liu, Anna;Zhang, Quan;Tang, Chaojing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.973-988
    • /
    • 2012
  • Delay tolerant networks (DTNs) characterized by the lack of guaranteed end-to-end paths exploit opportunistic data forwarding mechanism, which depends on the hypothesis that nodes are willing to store, carry, and forward the in-transit messages in an opportunistic way. However, this hypothesis might easily be violated by the presence of selfish nodes constrained with energy, bandwidth, and processing power. To address this problem, we propose a practical reputation-based incentive scheme, named PRI, to stimulate honest forwarding and discipline selfish behavior. A novel concept of successful forwarding credential and an observation protocol are presented to cope with the detection of nodes' behavior, and a reputation model is proposed to determine egoistic individuals. The simulation results demonstrate the effectiveness and practicality of our proposal.

Size Aware Correlation Filter Tracking with Adaptive Aspect Ratio Estimation

  • Zhu, Xiaozhou;Song, Xin;Chen, Xiaoqian;Bai, Yuzhu;Lu, Huimin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.805-825
    • /
    • 2017
  • Correlation Filter-based Trackers (CFTs) gained popularity recently for their effectiveness and efficiency. To deal with the size changes of the target which may degenerate the tracking performance, scale estimation has been introduced in existing CFTs. However, the variations of the aspect ratio were usually neglected, which also influence the size of the target. In this paper, Size Aware Correlation Filter Trackers (SACFTs) are proposed to deal with this problem. The SACFTs not only determine the translation and scale variations, but also take the aspect ratio changes into consideration, thus a better estimation of the size of the target can be realized, which improves the overall tracking performance. And competing results can be achieved compared with state-of-the-art methods according to the experiments conducted on two large scale datasets.

Selecting the Optimal Hidden Layer of Extreme Learning Machine Using Multiple Kernel Learning

  • Zhao, Wentao;Li, Pan;Liu, Qiang;Liu, Dan;Liu, Xinwang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5765-5781
    • /
    • 2018
  • Extreme learning machine (ELM) is emerging as a powerful machine learning method in a variety of application scenarios due to its promising advantages of high accuracy, fast learning speed and easy of implementation. However, how to select the optimal hidden layer of ELM is still an open question in the ELM community. Basically, the number of hidden layer nodes is a sensitive hyperparameter that significantly affects the performance of ELM. To address this challenging problem, we propose to adopt multiple kernel learning (MKL) to design a multi-hidden-layer-kernel ELM (MHLK-ELM). Specifically, we first integrate kernel functions with random feature mapping of ELM to design a hidden-layer-kernel ELM (HLK-ELM), which serves as the base of MHLK-ELM. Then, we utilize the MKL method to propose two versions of MHLK-ELMs, called sparse and non-sparse MHLK-ELMs. Both two types of MHLK-ELMs can effectively find out the optimal linear combination of multiple HLK-ELMs for different classification and regression problems. Experimental results on seven data sets, among which three data sets are relevant to classification and four ones are relevant to regression, demonstrate that the proposed MHLK-ELM achieves superior performance compared with conventional ELM and basic HLK-ELM.

An Intelligent MAC Protocol Selection Method based on Machine Learning in Wireless Sensor Networks

  • Qiao, Mu;Zhao, Haitao;Huang, Shengchun;Zhou, Li;Wang, Shan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5425-5448
    • /
    • 2018
  • Wireless sensor network has been widely used in Internet of Things (IoT) applications to support large and dense networks. As sensor nodes are usually tiny and provided with limited hardware resources, the existing multiple access methods, which involve high computational complexity to preserve the protocol performance, is not available under such a scenario. In this paper, we propose an intelligent Medium Access Control (MAC) protocol selection scheme based on machine learning in wireless sensor networks. We jointly consider the impact of inherent behavior and external environments to deal with the application limitation problem of the single type MAC protocol. This scheme can benefit from the combination of the competitive protocols and non-competitive protocols, and help the network nodes to select the MAC protocol that best suits the current network condition. Extensive simulation results validate our work, and it also proven that the accuracy of the proposed MAC protocol selection strategy is higher than the existing work.

Selection Criteria of Target Systems for Quality Management of National Defense Data (국방데이터 품질관리를 위한 대상 체계 선정 기준)

  • Jiseong Son;Yun-Young Hwang
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.155-160
    • /
    • 2023
  • In principle, data from all databases and systems managed by the Ministry of Defense or public institutions must be guaranteed to have a certain level of quality or higher, but since most information systems are built and operated, data quality management for all systems is realistically limited. Most defense data is not disclosed due to the nature of the work, and many systems are strategically developed or integrated and managed by the military depending on the need and importance of the work. In addition, many types of data that require data quality management are being accumulated and generated, such as sensor data generated from weapon systems, unstructured data, and artificial intelligence learning data. However, there is no data quality management guide for defense data and a guide for selecting quality control targets, and the selection criteria are ambiguous to select databases and systems for quality control of defense data according to the standards of the public data quality management manual. Depends on the person in charge. Therefore, this paper proposes criteria for selecting a target system for quality control of defense data, and describes the relationship between the proposed selection criteria and the selection criteria in the existing manual.

Machine Translation in an Automated Defense System for Combined Operation (연합작전을 위한 군 자동화 시스템에서의 기계번역)

  • Jung, Gwang-Ryeol;Kim, Seong-Yong;Kim, Cheol-Ho
    • Annual Conference on Human and Language Technology
    • /
    • 1992.10a
    • /
    • pp.481-490
    • /
    • 1992
  • 본 논문은 연합 작전을 위한 군 자동화 시스템에서의 기계번역에 대하여 설명한다. 연합작전은 단일한 임무의 수행을 위하여 공동 행동을 취하는 둘 이상의 연합국 부대에 의하여 실시되는 작전이며, 작전 구성원들이 사용하는 언어는 한국어와 영어 등 2개 국어 이상을 동시에 사용하고 있으므로, 상호간의 의사소통을 원활히 하기 위해서는 정확한 번역시스템이 필요하다. 현재 사용중인 군 자동화 시스템에서 기계번역의 개발과 시험 내용을 사용자의 요구사항, 시험 항목 및 현 기능을 중심으로 설명한다. 또한, 번역 결과의 평가에 대해 설명하고 향후의 기능 향상 요구사항 및 예정사항을 제시한다.

  • PDF

Efficient Channel Assignment Scheme Based on Finite Projective Plane Theory

  • Chen, Chi-Chung;Su, Ing-Jiunn;Liao, Chien-Hsing;Woo, Tai-Kuo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.628-646
    • /
    • 2016
  • This paper proposes a novel channel assignment scheme that is based on finite projective plane (FPP) theory. The proposed scheme involves using a Markov chain model to allocate N channels to N users through intermixed channel group arrangements, particularly when channel resources are idle because of inefficient use. The intermixed FPP-based channel group arrangements successfully related Markov chain modeling to punch through ratio formulations proposed in this study, ensuring fair resource use among users. The simulation results for the proposed FPP scheme clearly revealed that the defined throughput increased, particularly under light traffic load conditions. Nevertheless, if the proposed scheme is combined with successive interference cancellation techniques, considerably higher throughput is predicted, even under heavy traffic load conditions.

An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.35-42
    • /
    • 2019
  • In this paper, we propose an approach to apply network-based moving target defense into Internet of Things (IoT) networks. The IoT is a technology that provides the high interconnectivity of things like electronic devices. However, cyber security risks are expected to increase as the interconnectivity of such devices increases. One recent study demonstrated a man-in-the-middle attack in the statically configured IoT network. In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. The approach continuously changes system's attack surface to prevent attacks. After analyzing IPv4 / IPv6-based moving target defense schemes and IoT network-related technologies, we present our approach in terms of addressing systems, address mutation techniques, communication models, network configuration, and node mobility. In addition, we summarize the direction of future research in relation to the proposed approach.

An Operational Concept for Information Systems: A Case of the D Information Resource Management Information System (정보시스템 운영개념 연구: D정보자원관리시스템 사례)

  • Lee, Sang-Ho;Sim, Seung-Bae
    • Journal of Information Technology Services
    • /
    • v.5 no.1
    • /
    • pp.129-147
    • /
    • 2006
  • This study analyzed an operational concept for the D Information Resource Management Information System (DIRMIS) to manage any IT resources effectively in defense area. We first deduced the concept of the information resource management (IRM) for defense area from the literature review, and we suggested a guideline, which has used in defense area, of the documentation for the operational concept description (OCD). Moreover, we developed the operational concept for the DIRMIS following the guideline. Especially, this study is a practical approach for suggesting of a case, and the share of accumulated cases will contribute to advance in System Integration (SI) industry as well as academic research.

Energy-efficient Joint Control of Epidemic Routing in Delay Tolerant Networks

  • Wu, Yahui;Deng, Su;Huang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.2
    • /
    • pp.234-252
    • /
    • 2013
  • Due to the uncertain of connections in Delay Tolerant Networks (DTNs), most routing algorithms in DTNs need nodes to forward the message to others based on the opportunistic contact. The contact is related with the beaconing rate. In particular, nodes have more chances to encounter with each other with bigger beaconing rate, but more energy will be used. On the other hand, if the nodes forward the message to every node all the time, the efficiency of the routing algorithm is better, but it needs more energy, too. This paper tries to exploit the optimal beaconing rate and forwarding rate when the total energy is constraint. First, a theoretical framework is proposed, which can be used to evaluate the performance with different forwarding rate and beaconing rate. Then, this paper formulates a joint optimization problem based on the framework. Through Pontryagin's Maximal Principle, this paper obtains the optimal policy and proves that both the optimal forwarding and beaconing rates conform to threshold form. Simulation results show the accuracy of the theoretical framework. Extensive numerical results show that the optimal policy obtained in this paper is the best.