This paper addresses the problem of avoiding dynamic obstacles while following the learned trajectory through non-point based maps directly through laser data. The geometric representation of free configuration area c...
详细信息
A Service Bus is a distributed infrastructure used for enterprise integration. It resolves the problem of connecting heterogeneous C4I systems among various defense forces. The current work focuses on describing a det...
详细信息
A Service Bus is a distributed infrastructure used for enterprise integration. It resolves the problem of connecting heterogeneous C4I systems among various defense forces. The current work focuses on describing a detailed comparative analysis of three SOA service buses; Mule, Fuse and GlassFish for C4I systems using Multi-criteria Decision Making Technique (MCDM). In this paper, the phenomenon of selecting the best alternative is based on two criteria; main criteria and sub-criteria. The presented results may be used for integrating different C4I systems and can further assist enterprises in selecting a service bus in an optimized way.
The increase usage of C4I systems in defense and civil era had made it more imperative and attractive. Therefore, we can witness that the researchers, analysts, designers and developers had taken much interest in C4I ...
详细信息
ISBN:
(纸本)9781424460793
The increase usage of C4I systems in defense and civil era had made it more imperative and attractive. Therefore, we can witness that the researchers, analysts, designers and developers had taken much interest in C4I systems. This paper describes a comparative analysis of defense industry frameworks such as DODAF, MODAF, NAF and UPDM. These frameworks had used in design and development process of defense information systems for instance, C4I systems. In this work, we used multi criteria software for comparative analysis of different defense industry frameworks. Further, results obtained by experiments are discussed. This effort done in this paper may be utilized by the researchers in two different possible ways, either by using the results directly obtained in this paper or by extracting the results by similar approach but on different architecture frameworks (AFs) in the field of C4I Systems.
C4I (command, control, communications, computer and intelligence) system is a complex system of systems that enables the military commander to achieve decision superiority by affecting adversary's information and ...
详细信息
ISBN:
(纸本)9781424466146;9780769540160
C4I (command, control, communications, computer and intelligence) system is a complex system of systems that enables the military commander to achieve decision superiority by affecting adversary's information and information based processes while protecting one`s own information systems. Owing to the sensitivity of military information the security threats to C4I systems are real and growing therefore security is a major challenge in order to maintain integrity, confidentiality, availability and accountability. Different Models and architectures frameworks e.g. DODAF, CDSA have been proposed which decompose the detail structure of C4I systems however these models and frameworks do not provide mechanism to capture associated security risks and issues. Threat modeling is the process to understand different ways system can be attacked which helps towards secure system design and implement countermeasures. This paper suggests that using threat modeling could help to eradicate or reduce the effect of advancing threats to C4I systems. In this paper we also identify how security can be modeled in top down manner e.g. from architecture level to lower level of modeling so that countermeasures can be incorporated on system level rather than on bit by bit basis.
It is well known that the combination between Neural networks and fuzzy controllers are considered as the most efficient approximators of different functions and also proves their capability of controlling nonlinear d...
详细信息
ISBN:
(纸本)9781849192316
It is well known that the combination between Neural networks and fuzzy controllers are considered as the most efficient approximators of different functions and also proves their capability of controlling nonlinear dynamical systems So, in this paper, the authors introduce a novel technique of control called" hybrid control" which is Based on Feedback Linearization and Field Oriented Control of an Induction Motor, in order to replace the sliding mode controllers (speed and flux ones). In fact, the objectives required by the introduction of neural networks (RANNCs) is to perform the control which is shown by simulation results.
A SOA ESB is a middleware that provides services such as message routing and transformation. Further, it has the capabilities to ease the pains of connecting heterogeneous C4I systems among various defense forces. The...
详细信息
Ever since the inception of the idea of collaborating the enterprise systems, the need of an Enterprise Service Bus (ESB) has been a relentless need of the market, the bigger the systems get after collaboration the fa...
详细信息
Ever since the inception of the idea of collaborating the enterprise systems, the need of an Enterprise Service Bus (ESB) has been a relentless need of the market, the bigger the systems get after collaboration the failures of the ESB's was inevitable. Things moved to more gravity when the bulkiest of the systems like Defense architectures came into picture, with the advent of this not of the efficiency but also the factors like stability, reliability, resource utilization were also of pivotal importance. This paper reviews a critical and comparative analysis of the current ESB's keeping in view the C4I System as a base, so as to ascertain which ESB fulfills the requirements of the system of systems. In comparison we try to analyze Mule ESB, GlassFish ESB and Fuse ESB with respect to interoperability. This study demonstrates that Mule is more feasible to C4I systems because it is simple, easy to integrate, no adopter requirement and flexible.
The subject paper develops a low-level logic fault test simulation environment for embedded systems targeted specifically towards application-specific integrated circuits (ASICs) and intellectual property (IP) cores. ...
详细信息
The subject paper develops a low-level logic fault test simulation environment for embedded systems targeted specifically towards application-specific integrated circuits (ASICs) and intellectual property (IP) cores. The simulation architecture emulates a typical built-in self-testing (BIST) environment with automatic test pattern generator (ATPG) that sends its outputs to a circuit (core) under test (CUT) and the output streams from the CUT are fed into an output response analyzer (ORA). The paper describes in detail the test architecture environment, test application and fault injection including the application of the logic fault simulator. Results on simulation on some specific IP cores designed using combinations from ISCAS 85 combinational and ISCAS 89 sequential benchmark circuits are provided as well for appraisal.
With the increasing demand for enhanced security, iris biometrics-based personal identification has become an interesting research topic in the field of pattern recognition. While most state-of-the-art iris recognitio...
详细信息
With the increasing demand for enhanced security, iris biometrics-based personal identification has become an interesting research topic in the field of pattern recognition. While most state-of-the-art iris recognition algorithms are focused on preprocessing iris images, important new directions have been identified recently in iris biometrics research. These include optimal feature selection and iris pattern classification. In this paper, we propose an iris recognition scheme based on Genetic algorithms (GAs) and asymmetrical Support Vector Machines (SVMs). Instead of using the whole iris region, we elicit the iris information between the collarette and the pupillary boundaries to suppress effects of eyelids and eyelashes occlusions, and pupil dilation, and to minimize the matching error. To select the optimal feature subset together with increasing the overall recognition accuracy, we apply GAs with a new fitness function. The traditional SVMs are modified into asymmetrical SVMs to handle: (1) highly unbalanced sample proportion between two classes, and 2) different types of misclassification error that lead to different misclassification losses. Furthermore, the parameters of SVMs are optimized in order to improve the generalization performance. The proposed technique is computationally effective, with recognition rates of 97.80% and 95.70% on the Iris Challenge Evaluation (ICE) and the West Virginia University (WVU) iris datasets, respectively.
暂无评论