Elizabeth K. Bowman, B. Broome, V. M. Holland, Douglas Summers-Stay, R. Rao, John Duselis, J. Howe, B. Madahar, A. Boury-Brisset, Bruce Forrester, P. Kwantes, G. Burghouts, J. V. van Huis, Adem Yasar Mulayim
{"title":"Complex event processing for content-based text, image, and video retrieval","authors":"Elizabeth K. Bowman, B. Broome, V. M. Holland, Douglas Summers-Stay, R. Rao, John Duselis, J. Howe, B. Madahar, A. Boury-Brisset, Bruce Forrester, P. Kwantes, G. Burghouts, J. V. van Huis, Adem Yasar Mulayim","doi":"10.1109/ICMCIS.2016.7496546","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496546","url":null,"abstract":"This report summarizes the findings of an exploratory team of the North Atlantic Treaty Organization (NATO) Information Systems Technology panel into Content-Based Analytics (CBA). The team carried out a technical review into the current status of theoretical and practical developments of methods, tools and techniques supporting joint exploitation of multimedia data sources. In particular, content-based information retrieval and analytics was considered as a means to allow military experts to exploit multiple data sources in a rapid fashion for sensemaking and knowledge generation. Elements included contextual understanding of complex events through computational/human processing techniques, event prediction through the automated extraction of network features, temporal trends, hidden clusters and resource flows, and the use of machine processing for automated translation, parsing, information extraction, and summarization of unstructured and semistructured data. The main conclusions of the study are that important research gaps exist in all the technical areas covered in this report. Though the research areas and developments are being advanced in the military sector and the civil sector, in particular, they remain at low levels of technical maturity for defense and security system applications. It is recommended that NATO collaborative research effort be expanded to advance those approaches that are most pertinent to our overall aim of enhancing the contextual understanding of complex events through CBA of heterogeneous multimedia streams.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125409264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multicarrier modulation for HF communications","authors":"J. Yli-Kaakinen, M. Renfors, Hannu Tuomivaara","doi":"10.1109/ICMCIS.2016.7496542","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496542","url":null,"abstract":"High-frequency (HF) communications can be flexibly realized using multicarrier modulation techniques. This paper compares the performance of three widely utilized MCM techniques, namely, orthogonal frequency-division multiplexing (OFDM), filter bank multicarrier/offset-QAM (FBMC/OQAM), and filtered multitone (FMT) in HF communications. The performance of these systems is simulated using commonly adopted HF-channel models. It is shown that the simulated uncoded bit-error rate of OFDM is slightly better than that of FBMC/OQAM and FMT. However, with pilot based channel estimation FMT outperforms FBMC/OQAM and OFDM systems in achievable coded frame error rate in case of selective channel models.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122142857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A rational multiparty information exchange model using extensive games","authors":"Alberto M. Campos, Viet Pham","doi":"10.1109/ICMCIS.2016.7496539","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496539","url":null,"abstract":"It is well known that excessive intelligence is mandatory in military procedures, in companies to know about competitors, as well as in markets to decide where to invest in. However, this information is not always fully reliable since it might be given by others with conflicting interests. Consequently, there is no guarantee that the supplied information has not been maliciously crafted to produce negative outputs to the receiving entity. For a formal treatment, a way to represent this problem is via Multi-Party Information Exchange (MPIE) model. Applying extensive games, we propose a MPIE when the information is relayed in non-secret channels. This is a refinement of a previous MPIE by rejecting solutions arisen from empty threats, through finding perfect equilibria in sub-games. The resolution to find such perfect equilibria is based on executing an algorithm that solves Mixed Integer Linear Programming (MILP) models. The case studies prove that empty threats are deleted and that a large number of players can be efficiently solved using the proposed algorithm.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123446145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compensation of imperfect channel reciprocity through MMSE prediction for physical-layer confidentiality enhancement","authors":"Hao Li, Xianbin Wang, Helen Tang","doi":"10.1109/ICMCIS.2016.7496571","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496571","url":null,"abstract":"In this paper, we utilize the minimum mean squared error (MMSE) prediction to compensate imperfect channel reciprocity in achieving physical-layer confidentiality enhancement, particularly for our recently developed secure OFDM system with dynamic subcarrier coordinate interleaving [1]. In the proposed method, the transmitter first estimates the correlation coefficient between the forward and backward channel estimates based on historical observations and then uses this correlation coefficient to predict the channel estimate that would be observed by the legitimate receiver. Relying on this predicted channel, the transmitter interleaves the real and imaginary components of a subcarrier symbol when its associated channel phase is larger than a predefined threshold. Improved channel reciprocity is thus established and the frequently updated interleaving pattern can be shared between legitimate users. In contrast, adversaries at a third location are not able to de-interleave the OFDM signals so that communication confidentiality is achieved. Compared with existing imperfect channel reciprocity compensation solutions in physical-layer confidentiality enhancement, the proposed technique requires no additional resource and is not sensitive to the origin of the imperfect channel reciprocity. Simulations are carried out to validate the proposed design.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124740805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Lund, Eirik Skjelbreid Grimstvedt, Morten Aronsen, Erlend Larsen, R. Macdonald
{"title":"Sensor networking and integration: A proof-of-concept experiment","authors":"K. Lund, Eirik Skjelbreid Grimstvedt, Morten Aronsen, Erlend Larsen, R. Macdonald","doi":"10.1109/ICMCIS.2016.7496551","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496551","url":null,"abstract":"In November 2015 the Norwegian Defence Research Establishment (FFI) conducted an experiment using two autonomous Unmanned Aerial Vehicles for geo-location of navigation radars. This was an interdisciplinary experiment that included a number of different research communities, and which contributed to a number of different research areas. This paper gives an overview of the experiment, with an emphasis on the information flow. The experiment has demonstrated how a continuous data flow can be established, from the sensors, via an operating center, and all the way to a joint headquarters. In addition, we describe how sensor data from different sources were integrated in order to identify tracks that needed further investigation. Finally, the paper provides some preliminary results from the experiment, both with respect to the radio communication between sensors and ground node, and to the actual geo-location process.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132472816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. H. Bloebaum, F. T. Johnsen, Marianne R. Brannsten, J. Alcaraz-Calero, Qi Wang, James Nightingale
{"title":"Recommendations for realizing SOAP publish/subscribe in tactical networks","authors":"T. H. Bloebaum, F. T. Johnsen, Marianne R. Brannsten, J. Alcaraz-Calero, Qi Wang, James Nightingale","doi":"10.1109/ICMCIS.2016.7496588","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496588","url":null,"abstract":"In this paper, we investigate the publish/subscribe standard WS-Notiflcation with respect to deployment and use in the tactical domain. We leverage a network emulator, CORE, to generate a testbed for controlled and repeatable experiments exhibiting typical tactical network traits: Limited data rates, delays, and packet loss, as well as node mobility and subsequent sporadic loss of connectivity. The work was performed in context of the NATO CSO/IST-118 “SOA recommendations for disadvantaged grids in the tactical domain” group. Our goal was not only to see how the WS-Notification standard behaves in the tactical domain, but also to investigate optimizations (here: compression) as part of our work for giving recommendations towards tactical SOA deployment. Our findings include that compression in general is beneficial and should be leveraged. However, the broker-based nature of WS-Notification proved, as expected, to be problematic in disruptive environments (single point of failure), and so measures that can mitigate this should be investigated further.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127890013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emitter signal sorting based on fractal dimensions of pulse envelope's front edge","authors":"Qi-xiang Fu, Cheng Li, Feiyang Cai, Wei Wang, Shunping Xiao","doi":"10.1109/ICMCIS.2016.7496558","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496558","url":null,"abstract":"In order to sort signals from the emitters with the same type, a sorting method based on fractal dimensions of pulse envelope's front edge is proposed in this paper. Firstly, a novel signal sorting flow based on fractal dimensions is presented. Then the approach for extracting the box dimension and information dimension of the pulse envelope's front edge is given. Finally, simulated signals and actual signals are used for validating the proposed method respectively. Experiment results show that the correct sorting rate by this method after traditional sorting for signals from the same type emitters is above 95%.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123864933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Italian Army C2 evolution: From the current SIACCON2 land command & control system to the LC2EVO using “agile” software development methodology","authors":"A. Messina, F. Fiore","doi":"10.1109/ICMCIS.2016.7496585","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496585","url":null,"abstract":"The continuous evolution of the military “land operations ” generates instability of the Command & Control systems requirements obliging the developers to work with unstable and unconsolidated mission needs. In 2013, the Italian Army General Staff Logistic Department decided to overcome the problem of the “volatile requirement” transitioning to a completely different software development methodology derived from the commercial, area but almost completely new to the “mission critical” software applications: the so called “agile” methodology. The introduction of “agile” in the development of high reliability software was not easy and implied the generation of a brand new “agile” methodology called: Italian Army Agile or ITA2. Setting up the LC2Evo (the evolution software of the land C2) implied the solution of many problems and the construction of a solid structure based on four “pillars”: User Community Governance, Specific “agile” Training, new “agile” CASE1 Tools, custom “agile” development doctrine. This paper gives a short description of the Italian C2 software evolution from the current SIACCON2 to the LC2Evo whose first components are in use already in various national and out of area operations. The LC2Evo “dismounted Soldier segment software using augmented reality and goggle glass-like display is also described. The major problems tackled and solved for the construction of the “four pillars” are treated.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125656939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Influence of the frequency stability on the emitter position in SDF method","authors":"J. Kelner, C. Ziółkowski, Piotr E. Marszalek","doi":"10.1109/ICMCIS.2016.7496554","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496554","url":null,"abstract":"An accuracy of each location method depends primarily on an accuracy of a parameter measurements that is the basis of the method. In the case of frequency methods, a frequency stability of a localized emitter is the main factor influencing on the location error. In this paper, the impact of the frequency stability on accuracy of the emitter position in signal Doppler frequency method is analyzed. The presented analysis is based on simulation tests. Empirical results of the frequency stability achieved for the selected signal generators are used in these simulations.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128636948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Paula Fraga-Lamas, L. Castedo-Ribas, Antonio Morales-Méndez, J. M. Camas-Albar
{"title":"Evolving military broadband wireless communication systems: WiMAX, LTE and WLAN","authors":"Paula Fraga-Lamas, L. Castedo-Ribas, Antonio Morales-Méndez, J. M. Camas-Albar","doi":"10.1109/ICMCIS.2016.7496570","DOIUrl":"https://doi.org/10.1109/ICMCIS.2016.7496570","url":null,"abstract":"Emerging technologies for mobile broadband wireless are being considered as a Commercial Off-The-Shelf solution to cover the operational requirements of the future warfare. The capabilities of these technologies are being enhanced to meet the growing market demands on performance. In this context, several standards such as WiMAX, LTE or WLAN are introducing themselves as strong candidates to fulfill these requirements. This paper presents an innovative scenario-based approach to develop a Military Broadband Wireless Communication System (MBWCS). Its main objective is to analyze how similar a military MBWCS can be to the identified civil standards, taking operational and high level technical requirements into account. This specification will be used for analyzing the applicability and the modifications of each of the standards layers individually. Proving the feasibility and aptitude of each standard provides strong foundations to address a MBWCS in the most efficient way.","PeriodicalId":103155,"journal":{"name":"2016 International Conference on Military Communications and Information Systems (ICMCIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123778706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}