Int. J. Intell. Def. Support Syst.最新文献

筛选
英文 中文
Deep learning-based approach for malware classification 基于深度学习的恶意软件分类方法
Int. J. Intell. Def. Support Syst. Pub Date : 2021-05-21 DOI: 10.1504/IJIDSS.2021.115226
Harisha Airbail, G. Mamatha, Rahul V. Hedge, P. R. Sushmika, Reshma Kumari, K. Sandeep
{"title":"Deep learning-based approach for malware classification","authors":"Harisha Airbail, G. Mamatha, Rahul V. Hedge, P. R. Sushmika, Reshma Kumari, K. Sandeep","doi":"10.1504/IJIDSS.2021.115226","DOIUrl":"https://doi.org/10.1504/IJIDSS.2021.115226","url":null,"abstract":"Any program that exhibit furtive demonstrations against the interests of the PC client can be considered as a malware. These baleful programs can play out varieties of different capacities, for example, taking, encoding, or erasing dainty information, changing or commandeering centre processing capacities, and examining clients' computer action without their consent. Today, malware is utilised by both governments and black hat hackers, to take individual, financial, or business data. In this paper, put forward a strategy for arranging malware utilising profound learning procedures. Malware binaries are pictured as greyscale pictures, with the perception that for some malware families, the pictures having a place with a similar family show up fundamentally the same as in surface and design. A standard picture highlights grouping strategy is proposed. The exploratory outcomes give 97.45% arrangement classification on a malware database of 9,339 examples with 25 diverse malware families.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127165713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Program viewer - a defence portfolio capability management system 程序查看器-一个国防组合能力管理系统
Int. J. Intell. Def. Support Syst. Pub Date : 2020-08-19 DOI: 10.1504/ijidss.2020.10031440
E. H. Lo, N. Tay, G. Bulluss
{"title":"Program viewer - a defence portfolio capability management system","authors":"E. H. Lo, N. Tay, G. Bulluss","doi":"10.1504/ijidss.2020.10031440","DOIUrl":"https://doi.org/10.1504/ijidss.2020.10031440","url":null,"abstract":"The recent first principles review (FPR) has clearly highlighted further need for improvements in defence capability management. Moreover, improved data management and decision support tools are essential to achieving the efficiencies and realising the opportunities presented. Program viewer is one such tool that leverages and aggregates actual stakeholder data to support force posture planning and capability acquisition prioritisation. Key contributions from this paper include: 1) fusing disparate and unexploited defence enterprise data for analysis; 2) producing a range of tailorable and informative views of cost, schedule and capability from actual defence data; 3) enabling impact analysis on what-if scenarios. Incorporating numerous stakeholder requested features, program viewer offers a new approach to aggregating and analysing defence capabilities, and has been used to support the current and previous force structure reviews (FSRs). This paper's target audience includes ADO and international military systems architects.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122965445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Archival solution API to upload bulk file and managing the data in cloud storage 归档解决方案API,用于上传批量文件和管理云存储中的数据
Int. J. Intell. Def. Support Syst. Pub Date : 2020-08-19 DOI: 10.1504/ijidss.2020.10031443
Neelamadhab Padhy, R. Mishra, Samaresh Mishra
{"title":"Archival solution API to upload bulk file and managing the data in cloud storage","authors":"Neelamadhab Padhy, R. Mishra, Samaresh Mishra","doi":"10.1504/ijidss.2020.10031443","DOIUrl":"https://doi.org/10.1504/ijidss.2020.10031443","url":null,"abstract":"The application programming interface (API) as a means of communication to establish a connection with the cloud, which allows storing the vast amounts of heterogeneous data. Data has been steadily growing over the past several years. Software developers can use different data from cloud as convenient ecosystems for developing, deploying, testing and maintaining their software. API provides the archival solution and storing the data in the cloud. This platform also plays an essential role in managing them effectively with improved transfer rates. API is becoming increasingly dynamic and complex day by day. One of the significant challenges faced by us is to develop appropriate individual API and extensible mechanisms for managing and storing the data in the cloud. The objective of this paper is to utilize the storage efficiently based on API capability and analysis of (extreme amounts of) raw heterogeneous data.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129512350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach to design a digital clock triggered modified pulse latch for 16-bit shift register 一种设计数字时钟触发的16位移位寄存器修改脉冲锁存器的新方法
Int. J. Intell. Def. Support Syst. Pub Date : 2020-08-19 DOI: 10.1504/ijidss.2020.10031441
Suraj Pattanaik
{"title":"A novel approach to design a digital clock triggered modified pulse latch for 16-bit shift register","authors":"Suraj Pattanaik","doi":"10.1504/ijidss.2020.10031441","DOIUrl":"https://doi.org/10.1504/ijidss.2020.10031441","url":null,"abstract":"A low power area reduced clock pulse generator and a modified clock sense pulse latch is proposed for conventional shift register. The proposed clock pulse generator basically based on the inverted inverter delay circuit and a pass transistor logic AND gate circuit. This clock pulse generator and modified clock sense pulse latch consumes low power and low area than other conventional clock pulse generator. Here the clock pulse generator consist of five number of back to back cascaded clock pulse circuit. The pulse generated from the proposed clock pulse generator helps to increase the speed, reduces the area and power of conventional shift register. The clock pulse generator and the modified clock sense pulse latch is designed and tested by the Cadence Virtuoso 180 nm technology. The power consumption for 16-bit shift register is 0.705 mW at 500 MHz clock frequency and 0.395 mW at 100 MHz frequency. The proposed shift register saved 12% area and 19.50% power rather than other conventional shift register.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114678202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face recognition under occlusion for user authentication and invigilation in remotely distributed online assessments 遮挡下的人脸识别用于远程分布式在线评估中的用户认证和监考
Int. J. Intell. Def. Support Syst. Pub Date : 2018-12-01 DOI: 10.1504/IJIDSS.2018.099889
Niloofar Tavakolian, A. Nazemi, Z. Azimifar, I. Murray
{"title":"Face recognition under occlusion for user authentication and invigilation in remotely distributed online assessments","authors":"Niloofar Tavakolian, A. Nazemi, Z. Azimifar, I. Murray","doi":"10.1504/IJIDSS.2018.099889","DOIUrl":"https://doi.org/10.1504/IJIDSS.2018.099889","url":null,"abstract":"This study focuses on face recognition under uncontrolled conditions as a second biometric factor in order to multi factor authenticate(MFA) in online assessment. Obtained results of this project indicate reasonable accuracy to address the issue of occlusion using AR, MUCT and UMB Datasets, utilizing deep learning and the previous approach based on feature extraction (shallow method). The shallow method accuracy improvement includes HOG by 4%, in comparison to Gabor Sparse Representation based Classification (GSRC) method and by 9% using Gabor. Shallow method can handle occlusion issue in the lack of occlusion dictionaries and sufficient training sample. Modified ResNet as a deep learning method is used to be able to improve accuracy comparing the best member of the SRC family, Structured Sparse Representation based Classification(SSRC) by 3% on average.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128032438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Biological impact on military intelligence: application or metaphor? 生物学对军事情报的影响:应用还是隐喻?
Int. J. Intell. Def. Support Syst. Pub Date : 2014-04-04 DOI: 10.1504/IJIDSS.2015.075474
L. Ingber
{"title":"Biological impact on military intelligence: application or metaphor?","authors":"L. Ingber","doi":"10.1504/IJIDSS.2015.075474","DOIUrl":"https://doi.org/10.1504/IJIDSS.2015.075474","url":null,"abstract":"Ideas by Statistical Mechanics (ISM) is a generic program to model evolution and propagation of ideas/patterns throughout populations subjected to endogenous and exogenous interactions. The program is based on the author's work in Statistical Mechanics of Neocortical Interactions (SMNI). This product can be used for decision support for projects ranging from diplomatic, information, military, and economic (DIME) factors of propagation/evolution of ideas, to commercial sales, trading indicators across sectors of financial markets, advertising and political campaigns, etc. It seems appropriate to base an approach for propagation of ideas on the only system so far demonstrated to develop and nurture ideas, i.e., the neocortical brain. The issue here is whether such biological intelligence is a valid application to military intelligence, or is it simply a metaphor?","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115625700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
High fidelity simulation using the updated distributed interactive simulation standard 采用最新的分布式交互仿真标准进行高保真仿真
Int. J. Intell. Def. Support Syst. Pub Date : 2014-03-24 DOI: 10.1504/IJIDSS.2014.059959
P. Ryan, P. Ross, Will Oliver
{"title":"High fidelity simulation using the updated distributed interactive simulation standard","authors":"P. Ryan, P. Ross, Will Oliver","doi":"10.1504/IJIDSS.2014.059959","DOIUrl":"https://doi.org/10.1504/IJIDSS.2014.059959","url":null,"abstract":"Distributed interactive simulation (DIS) is a widely-used networking protocol standard that provides a method of communicating entity information among simulators and simulations to create a synthetic environment. The IEEE DIS standard is being revised with balloting expected to be completed in 2012. The proposed new standard includes an extensive revision, clearing up ambiguities present in the existing 1998 version, and adding additional capabilities that reflect changes in military equipment and doctrine, and also advances in technology such as the internet, mobile telephony, and the widespread use of the global positioning system for positional and time data. Five new protocol data units have been added to include information operations capability, enhanced warfare support, and the ability to communicate information about individual attributes for a particular entity, object, or event. In this paper we review these new capabilities in detail, and explore what this will mean for the Australian simulati...","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114958396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interception of an aerodynamically stable weaving re-entry vehicle 拦截空气动力稳定的编织再入飞行器
Int. J. Intell. Def. Support Syst. Pub Date : 2014-03-24 DOI: 10.1504/IJIDSS.2014.059965
A. Vermeulen, R. Savelsberg
{"title":"Interception of an aerodynamically stable weaving re-entry vehicle","authors":"A. Vermeulen, R. Savelsberg","doi":"10.1504/IJIDSS.2014.059965","DOIUrl":"https://doi.org/10.1504/IJIDSS.2014.059965","url":null,"abstract":"Traditional missile guidance laws are designed against fighter aircraft, with a much lower velocity (600–800 m/s) than ballistic missiles. To see whether intercepting a theatre ballistic missile inside the atmosphere is difficult in terms of missile guidance, trajectories of two different re-entry vehicles and the terminal phase of their interception, while the interceptor is guided by its own sensors, are simulated using MATLAB/Simulink. The interception is always successful if the inherent delay of the missile guidance system is small (below 0.5 seconds). The re-entry vehicles follow weaving trajectories, but the amplitude of the weave is small and does not pose problems for the interceptor. Neither does the high velocity of the missile (2,600 m/s), provided that the interceptor is near the inverse trajectory at the start of the terminal phase. Consequently, current missile guidance technology seems to be sufficient against aerodynamically stable missiles, but early detection and tracking are essential for success.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129651610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sensor selection and fusion using subjective logic 采用主观逻辑对传感器进行选择和融合
Int. J. Intell. Def. Support Syst. Pub Date : 2014-03-24 DOI: 10.1504/IJIDSS.2014.059960
E. El-Mahassni
{"title":"Sensor selection and fusion using subjective logic","authors":"E. El-Mahassni","doi":"10.1504/IJIDSS.2014.059960","DOIUrl":"https://doi.org/10.1504/IJIDSS.2014.059960","url":null,"abstract":"Sensor fusion is the notion of combining the data from two or more sensors in order to enhance performance compared with that of individual sensors. The most common method for fusing sensors is through Bayesian methods. However, these cannot easily take into account unknown uncertainty or imprecision. A relatively new method is subjective logic. Although similar to Dempster-Shafer theory, it is unique in that it allows us to collapse the frame of discernment into a binary frame, thereby reducing the complexity. In this paper, we show two novel methods for employing subjective logic: 1) it can be used for target identification (and we show some examples for surveillance in the airborne environment); 2) given some knowledge about the performance of a suite of sensors, we might be able to select the best sensor for a given task. This is achieved through the use of the expected decision formula.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133272592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computational approach and cognitive assistant for evidence-based reasoning in intelligence analysis 智能分析中基于证据推理的计算方法和认知辅助
Int. J. Intell. Def. Support Syst. Pub Date : 2014-03-24 DOI: 10.1504/IJIDSS.2014.059976
G. Tecuci, D. Schum, Dorin Marcu, Mihai Boicu
{"title":"Computational approach and cognitive assistant for evidence-based reasoning in intelligence analysis","authors":"G. Tecuci, D. Schum, Dorin Marcu, Mihai Boicu","doi":"10.1504/IJIDSS.2014.059976","DOIUrl":"https://doi.org/10.1504/IJIDSS.2014.059976","url":null,"abstract":"This paper presents a computational approach to intelligence analysis and its current implementation into a cognitive assistant called Disciple-CD. Intelligence analysis is viewed as ceaseless discovery of evidence, hypotheses, and arguments in a non-stationary world, involving cooperative processes of evidence in search of hypotheses, hypotheses in search of evidence, and evidentiary tests of hypotheses. Disciple-CD helps intelligence analysts formulate hypotheses, develop arguments that reduce complex hypotheses to simpler and simpler ones, collect evidence to evaluate the simplest hypotheses, assess the relevance, believability, and inferential force of evidence, and finally the likeliness of the hypotheses.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132250476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信