Int. J. Intell. Def. Support Syst.最新文献

筛选
英文 中文
Management of C2 data standards with modular OWL ontologies 使用模块化OWL本体管理C2数据标准
Int. J. Intell. Def. Support Syst. Pub Date : 2011-10-26 DOI: 10.1504/IJIDSS.2011.043359
Kevin Gupton, C. Blais, K. Heffner
{"title":"Management of C2 data standards with modular OWL ontologies","authors":"Kevin Gupton, C. Blais, K. Heffner","doi":"10.1504/IJIDSS.2011.043359","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.043359","url":null,"abstract":"Standard information exchange data models (IEDMs) – such as JC3IEDM, MSDL, NIEM, and C2Core – often are expressed as XML schema. This choice of model representation comes with the benefits of a widely adopted format and a well-supported XML toolset. Although XML, as a technology, has been an enabler in achieving interoperability among C4I and M&S systems, several key issues persist. Lacking formalised semantic specifications, systems utilising multiple IEDMs face difficult model mapping and translation tasks. As IEDM user-bases grow, so do maintainability and scalability challenges. Despite numerous IEDM alignment efforts, no maintainable process has emerged. \u0000 \u0000This paper describes a model management methodology that endorses the use of the Web Ontology Language (OWL) for model representation and embraces Semantic Web best practices. Not only can the ‘mappability’ between various models be expressed using OWL, but also multiple standards can be aligned to build upon each other, providing the basis for model execution.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117322158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Defining C2 semantics by a platform-independent JC3IEDM 通过与平台无关的JC3IEDM定义C2语义
Int. J. Intell. Def. Support Syst. Pub Date : 2011-10-26 DOI: 10.1504/IJIDSS.2011.043358
M. Gerz, O. Meyer
{"title":"Defining C2 semantics by a platform-independent JC3IEDM","authors":"M. Gerz, O. Meyer","doi":"10.1504/IJIDSS.2011.043358","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.043358","url":null,"abstract":"The Joint Consultation, Command, and Control Information Exchange Data Model (JC3IEDM) is the most acknowledged data model in military command and control (C2). So far, the model has been designed to support database replication. In 2007, the Multilateral Interoperability Programme (MIP) has started to transform the JC3IEDM into a platform independent UML model that is also suitable for other purposes. The structure of the JC3IEDM is being revised to solve known weaknesses, to better support modularity, to improve its comprehension, to provide a stricter and unambiguous semantics, and to support the generation of efficient exchange formats. In parallel, MIP started revising its approach of interoperability by better documenting the context of the information exchanges. In this paper, we present the principles of a capability-based approach and the key characteristics of the revised UML model. Moreover, we discuss in which way the JC3IEDM is qualified as a C2 ontology.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130414214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel ontological approach to semantic interoperability between legacy air defence command and control systems 传统防空指挥控制系统之间语义互操作性的一种新的本体论方法
Int. J. Intell. Def. Support Syst. Pub Date : 2011-10-26 DOI: 10.1504/IJIDSS.2011.043357
Chris Partridge, Mike Lambert, Michael Loneragan, Andrew Mitchell, P. Garbacz
{"title":"A novel ontological approach to semantic interoperability between legacy air defence command and control systems","authors":"Chris Partridge, Mike Lambert, Michael Loneragan, Andrew Mitchell, P. Garbacz","doi":"10.1504/IJIDSS.2011.043357","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.043357","url":null,"abstract":"In common with many other government defence departments, the UK Ministry of Defence (MoD) has realised that it has a plethora of legacy systems that were procured as domain specific with little emphasis given to integration requirements. In particular, it realised that the lack of integration between a significant number of the legacy air defence command and control (AD-C2) systems meant it could not deliver the increased agility needed for joint force AD and that current approaches to integration were unlikely to resolve the problem. They realised that they needed a new approach that demonstrably worked. \u0000 \u0000This paper describes a programme initiated by the MoD to address this problem through the formulation of a novel solution and its demonstration in the tactical AD-C2 environment using a sample of these existing legacy systems. It describes the ontological solution deployed to resolve the ‘hard’ semantic interoperability challenge. It outlines the physical and semantic architecture that was developed to support this approach and describes the implemented planning and collaborative execution (PACE-based) and semantic interoperability engine (SIE) solution.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130666826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Creating an extensible command and control ontology 创建可扩展的命令和控制本体
Int. J. Intell. Def. Support Syst. Pub Date : 2011-10-26 DOI: 10.1504/IJIDSS.2011.043356
Bill Mandrick
{"title":"Creating an extensible command and control ontology","authors":"Bill Mandrick","doi":"10.1504/IJIDSS.2011.043356","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.043356","url":null,"abstract":"This essay describes the process of creating a military ontology from the war-fighter's perspective. The war-fighter's perspective is expressed in joint military doctrine, which presents fundamental principles that guide the employment of USA military forces in coordinated and integrated action toward a common objective (http://www.dtic.mil/doctrine/new_pubs/jointpub.htm). An ontology based upon military doctrine is intended to represent the war-fighter's direct view of the domain, and would be used to enhance: 1) situational understanding about some domain; 2) the military decision making and planning process; 3) the design of information systems in an evolving situation; 4) understanding about the relation of data elements to the domain. This essay uses the joint intelligence preparation of the operational environment (JIPOE) process as an example of how the war-fighter would create such an ontology. The JIPOE ontology described here is derived directly from JIPOE doctrine, and extends from a command and control (C2) ontology.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130461753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a better, science-based, evaluation of kinetic non-lethal weapons 朝着更好的,基于科学的,动能非致命武器评估的方向发展
Int. J. Intell. Def. Support Syst. Pub Date : 2011-04-10 DOI: 10.1504/IJIDSS.2011.039548
B. Koene, A. Papy
{"title":"Towards a better, science-based, evaluation of kinetic non-lethal weapons","authors":"B. Koene, A. Papy","doi":"10.1504/IJIDSS.2011.039548","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.039548","url":null,"abstract":"A review of relevant existing experimental methods to evaluate so-called kinetic non-lethal weapons is presented. Next performance tests of two existing non-lethal weapon systems are shown and compared with other projectiles. Tissue simulants and an accurate determination of their physical properties are important to improve evaluation methods of non-lethal projectiles. Knowledge of physical properties is necessary to allow the physical modelling of the human body and interaction with projectiles. Presumably, for this purpose plasticine (clay), soap and gelatine are relevant tissue simulants. The present status of knowledge in this field is discussed. In addition, expectations and possibilities for the future are discussed.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115449224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Sensor selection for optimal target tracking in sensor networks 传感器网络中最优目标跟踪的传感器选择
Int. J. Intell. Def. Support Syst. Pub Date : 2011-04-10 DOI: 10.1504/IJIDSS.2011.039549
U. Ramdaras, F. Absil, P. Genderen
{"title":"Sensor selection for optimal target tracking in sensor networks","authors":"U. Ramdaras, F. Absil, P. Genderen","doi":"10.1504/IJIDSS.2011.039549","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.039549","url":null,"abstract":"To realise the capability of the network centric warfare (NCW) systems concept, the coordination between various sensor platforms (e.g., naval units, combat aircrafts, helicopters or unmanned aerial systems) will have to be increased and cross-platform sensor management (SM) will be applied. \u0000 \u0000The sensor selection process, as part of SM, serves to find the appropriate sensor for doing an observation. With a properly working selection process, sensor deployment can be optimised for the entire sensor network. \u0000 \u0000This paper presents a sensor selection algorithm (SSA) for a radar target tracking scenario. It is based on the expected performance, computed with the modified Riccati equation. The particle filtering technique is used for target tracking. The SSA takes limited detection probability into account and various expected performance criteria. \u0000 \u0000Scenarios for two non-moving co-located radar systems and three simple target trajectories are simulated to validate the sensor selection strategy and demonstrate the tracking algorithm performance.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131330292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic stress detection in emergency (telephone) calls 紧急(电话)呼叫自动应力检测
Int. J. Intell. Def. Support Syst. Pub Date : 2011-04-10 DOI: 10.1504/IJIDSS.2011.039547
I. Lefter, L. Rothkrantz, D. V. Leeuwen, P. Wiggers
{"title":"Automatic stress detection in emergency (telephone) calls","authors":"I. Lefter, L. Rothkrantz, D. V. Leeuwen, P. Wiggers","doi":"10.1504/IJIDSS.2011.039547","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.039547","url":null,"abstract":"The abundance of calls to emergency lines during crises is difficult to handle by the limited number of operators. Detecting if the caller is experiencing some extreme emotions can be a solution for distinguishing the more urgent calls. Apart from these, there are several other applications that can benefit from awareness of the emotional state of the speaker. This paper describes the design of a system for selecting the calls that appear to be urgent, based on emotion detection. The system is trained using a database of spontaneous emotional speech from a call-centre. Four machine learning techniques are applied, based on either prosodic or spectral features, resulting in individual detectors. As a last stage, we investigate the effect of fusing these detectors into a single detection system. We observe an improvement in the equal error rate (EER) from 19.0% on average for four individual detectors to 4.2% when fused using linear logistic regression. All experiments are performed in a speaker independent cross-validation framework.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133061959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
A robust approach to the missile defence location problem 导弹防御定位问题的一种鲁棒方法
Int. J. Intell. Def. Support Syst. Pub Date : 2011-04-10 DOI: 10.1504/IJIDSS.2011.039546
Axel A. F. Bloemen, L. Evers, A. I. Barros, H. Monsuur, A. Wagelmans
{"title":"A robust approach to the missile defence location problem","authors":"Axel A. F. Bloemen, L. Evers, A. I. Barros, H. Monsuur, A. Wagelmans","doi":"10.1504/IJIDSS.2011.039546","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.039546","url":null,"abstract":"This paper proposes a model for determining a robust defence strategy against ballistic missile threat. Our approach takes into account a variety of possible future scenarios and different forms of robustness criteria, including the well-known absolute robustness criterion. We consider two problem variants. In the first, the number of ballistic missile interceptor systems is minimised, such that a predetermined defence level is achieved. In the second variant, the defence level is maximised for a given number of available interceptor systems. The solutions of both variants consist of a subset of all possible locations of the interceptor systems. We applied two solution approaches to this problem: a heuristic and an exact solution method. The heuristic method is based on simulated annealing and produces good results within a short amount of computation time. We also developed an integer programming formulation which can be solved to optimality using a standard solver. The computation time is higher, but because of the nice properties of the proposed IP-formulation, it can still be solved within reasonable amount of computation time. These two solution approaches were tested using a fictive, but realistic dataset. The results illustrate the effects of the predetermined defence levels and the availability of interceptor systems, as well as the robustness of the solutions produced. Finally, we used our dataset to illustrate the differences between both variants and their use in practice.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132344743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Command and control in the Afghan desert: a field study at a NATO headquarters 阿富汗沙漠中的指挥与控制:北约总部的实地研究
Int. J. Intell. Def. Support Syst. Pub Date : 2011-04-10 DOI: 10.1504/IJIDSS.2011.039545
C. Davids, R. Beeres, T. Grant
{"title":"Command and control in the Afghan desert: a field study at a NATO headquarters","authors":"C. Davids, R. Beeres, T. Grant","doi":"10.1504/IJIDSS.2011.039545","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.039545","url":null,"abstract":"Managers gather information about the organisation and its environment to ensure that an organisation remains viable. The management of military units during deployment is known as command and control (C2). The C2 literature has focussed on applying technology to gain advantage over potential opponents. However, in today’s military mission landscape other information is also needed. This article combines a technical and managerial perspective to analyse the operational management of a NATO headquarters in Afghanistan. \u0000 \u0000Our research indicates that current C2 systems are not yet suited for delivering the required new intelligence because they emphasise the measurement of daily operations. C2 should bridge the gap between strategy and daily operations. Management tools drawn from the private sector, such as strategy maps and balanced scorecards, may be applied to enhance C2 systems to bridge operations and strategy. Furthermore, we argue that these management tools can adopt the operational measurement possibilities of C2 technologies to enhance their practical relevance.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132575698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cooperation in distributed surveillance systems for dense regions 密集地区分布式监测系统的合作
Int. J. Intell. Def. Support Syst. Pub Date : 2011-01-03 DOI: 10.1504/IJIDSS.2011.037806
A. Benaskeur, A. Khamis, H. Irandoust
{"title":"Cooperation in distributed surveillance systems for dense regions","authors":"A. Benaskeur, A. Khamis, H. Irandoust","doi":"10.1504/IJIDSS.2011.037806","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.037806","url":null,"abstract":"In this paper, we envision a distributed surveillance system where spatially distributed sensors of different modalities can sense collaboratively and continuously large-scale, dynamic, dense and semi-structured environments. The paper discusses surveillance operations in complex and dense environments, such as littoral regions, and describes the key features of distributed surveillance systems. Effective and robust cooperation among the artificial and/or the human agents can synergistically improve the performance of these systems and can endow them with higher-level faculties, such as cooperative target detection and tracking. Different forms of cooperative activities in distributed surveillance systems are mentioned. The paper focuses on intra and inter-platform target cueing and handoff as augmentative forms of cooperation in distributed surveillance.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122132103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信