As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholl...As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholly driven by the data consumer.Consumers must send Interest packets with the content name and not by the host’s network address.Its nature of in-network caching,Interest packets aggregation and hop-byhop communication poses unique challenges to provision of Internet applications,where traditional IP network no long works well.This paper presents a comprehensive survey of state-of-the-art application research activities related to CCN architecture.Our main aims in this survey are(a)to identify the advantages and drawbacks of CCN architectures for application provisioning;(b)to discuss the challenges and opportunities regarding service provisioning in CCN architectures;and(c)to further encourage deeper thinking about design principles for future Internet architectures from the perspective of upper-layer applications.展开更多
Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching metho...Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching methods with better cache hit rate and achieve allocating on-demand. Therefore, an in-network caching scheduling scheme for ICN was designed, distinguishing different kinds of contents and dynamically allocating the cache size on-demand. First discussing what was appropriated to be cached in nodes, and then a classification about the contents could be cached was proposed. Furthermore, we used AHP to weight different contents classes through analyzing users' behavior. And a distributed control process was built, to achieve differentiated caching resource allocation and management. The designed scheme not only avoids the waste of caching resource, but also further enhances the cache availability. Finally, the simulation results are illustrated to show that our method has the superior performance in the aspects of server hit rate and convergence.展开更多
Recently the content centric networks(CCNs) have been advocated as a new solution to design future networks. In the CCNs, content and its interest are delivered over the content store and pending interest table, respe...Recently the content centric networks(CCNs) have been advocated as a new solution to design future networks. In the CCNs, content and its interest are delivered over the content store and pending interest table, respectively, where both have limited capacities. Therefore, how to design the corresponding algorithms to efficiently deliver content and inertest over them becomes an important issue. In this paper, based on the analysis of content distribution, status of content store, and pending interest, we propose a novel caching algorithm with which the resources of content store and pending interest table can be efficiently used. Simulation results prove that the proposal can outperform the conventional methods.展开更多
NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward,which is a four levels system including the user ...NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward,which is a four levels system including the user level, the application level, the grid middleware layer and the resource level. In grid middleware layer,based on virtual hosting environment, a BEPL4WS grid service composition method is introduced. In addition, the NCW grid service model is built with the help of Eclipse-SDK-3.0.1 and Bpws4j.展开更多
The concept of Network Centric Therapy represents an amalgamation of wearable and wireless inertial sensor systems and machine learning with access to a Cloud computing environment. The advent of Network Centric Thera...The concept of Network Centric Therapy represents an amalgamation of wearable and wireless inertial sensor systems and machine learning with access to a Cloud computing environment. The advent of Network Centric Therapy is highly relevant to the treatment of Parkinson’s disease through deep brain stimulation. Originally wearable and wireless systems for quantifying Parkinson’s disease involved the use a smartphone to quantify hand tremor. Although originally novel, the smartphone has notable issues as a wearable application for quantifying movement disorder tremor. The smartphone has evolved in a pathway that has made the smartphone progressively more cumbersome to mount about the dorsum of the hand. Furthermore, the smartphone utilizes an inertial sensor package that is not certified for medical analysis, and the trial data access a provisional Cloud computing environment through an email account. These concerns are resolved with the recent development of a conformal wearable and wireless inertial sensor system. This conformal wearable and wireless system mounts to the hand with the profile of a bandage by adhesive and accesses a secure Cloud computing environment through a segmented wireless connectivity strategy involving a smartphone and tablet. Additionally, the conformal wearable and wireless system is certified by the FDA of the United States of America for ascertaining medical grade inertial sensor data. These characteristics make the conformal wearable and wireless system uniquely suited for the quantification of Parkinson’s disease treatment through deep brain stimulation. Preliminary evaluation of the conformal wearable and wireless system is demonstrated through the differentiation of deep brain stimulation set to “On” and “Off” status. Based on the robustness of the acceleration signal, this signal was selected to quantify hand tremor for the prescribed deep brain stimulation settings. Machine learning classification using the Waikato Environment for Knowledge Analysis (WEKA) was applied using the multilayer perceptron neural network. The multilayer perceptron neural network achieved considerable classification accuracy for distinguishing between the deep brain stimulation system set to “On” and “Off” status through the quantified acceleration signal data obtained by this recently developed conformal wearable and wireless system. The research achievement establishes a progressive pathway to the future objective of achieving deep brain stimulation capabilities that promote closed-loop acquisition of configuration parameters that are uniquely optimized to the individual through extrinsic means of a highly conformal wearable and wireless inertial sensor system and machine learning with access to Cloud computing resources.展开更多
In the modern arena, the Information and Communication Technologies (ICTs) have been playing a vital role in every walks of our day to day life. In order to enhance the ICT capacity and align with the global technolog...In the modern arena, the Information and Communication Technologies (ICTs) have been playing a vital role in every walks of our day to day life. In order to enhance the ICT capacity and align with the global technology transformations, the developing countries have started introducing the computerization and automation processes at different levels of the governments. The several research studies revealed that the existing legacy of governance system and their services in current state have several issues and challenges in terms of timeliness, cost of services, delay in service delivery, time-bound availability of services (24/7/365), inefficiency services, ease of service and discomforts, poor service collaboration, absence of responsiveness, and limited security of sensitive information/documents. A significant question is still unanswered that how to bring the Citizens and Government bodies closer for alleviating the aforementioned issues and challenges of existing government system services. This research paper aims to investigate the issues and challenges in the current status of Governance and partial E-Governance systems which encompass the computerization or automation process. The research designs a cloud framework for effective delivery of citizen centric services in general and Ethiopia as a specific case study. After rigorous analysis of prior research efforts, along with primary survey and interview, it was clearly observed that cloud computing can be an alternative instrumental for significant transformation of governmental service delivery. The research paper used a mix of exploratory and constructive research design and methodology with qualitative & quantitative data analysis approach. Finally, a Cloud Based E-Governance (CBEG) Framework is designed for the delivery of Ethiopian Citizen Centric Services. The validation, evaluation and acceptance test of the framework proves that the revealed knowledge can provide a significant transformation towards the betterment of the E Governance Services Delivery Systems.展开更多
Data-centric modeling approach for workflow specification and design has received considerable attention from research and development communities.An architecture for a workflow management system named EZFLOWS was out...Data-centric modeling approach for workflow specification and design has received considerable attention from research and development communities.An architecture for a workflow management system named EZFLOWS was outlined.Key components and research issues associated with the development of EZFLOWS were discussed.展开更多
Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and...Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and improving users' experience. To analyse the requests' patterns and fully utilize the universal cached contents, a novel intelligent resources management system is proposed, which enables effi cient cache resource allocation in real time, based on changing user demand patterns. The system is composed of two parts. The fi rst part is a fi ne-grain traffi c estimation algorithm called Temporal Poisson traffi c prediction(TP2) that aims at analysing the traffi c pattern(or aggregated user requests' demands) for different contents. The second part is a collaborative cache placement algorithm that is based on traffic estimated by TP2. The experimental results show that TP2 has better performance than other comparable traffi c prediction algorithms and the proposed intelligent system can increase the utilization of cache resources and improve the network capacity.展开更多
An integration-centric approach is proposed to handle inadequate information in the system readiness level (SRL) assessment using the evidential reasoning (ER) algorithm. Current SRL assessment approaches cannot b...An integration-centric approach is proposed to handle inadequate information in the system readiness level (SRL) assessment using the evidential reasoning (ER) algorithm. Current SRL assessment approaches cannot be applied to handle inadequate information as the input. The ER-based approach is proposed to synthesize inadequate input information and an integration-centric perspective is applied to reduce the computational complexity. Two case studies are performed to validate the efficiency of the proposed approach. And these studies are also performed to study how the inadequate information will affect the assessment result. And the differences caused by the system's structure. The importance of the system's structure in the SRL assessment is demonstrated and the contributions made in this study are summarized as conclusions.展开更多
This paper is the third part of the complex combat dynamics series, called tensor-centric warfare (for the first two parts, see [1] [2]). In the present paper, we extend the tensor combat model from [1] and [2] to mod...This paper is the third part of the complex combat dynamics series, called tensor-centric warfare (for the first two parts, see [1] [2]). In the present paper, we extend the tensor combat model from [1] and [2] to model the dynamics of delta-strikes/missiles , which are temporally confined strong kinetic effects . The scenarios analyzed here include both deterministic and random delta-strikes which mimic single, multiple and continuous-time missile attacks. We also look at the bidirectional random strike as well as the general Hamilton-Langevin dynamics framework and provide an interpretation of the results obtained through simulation.展开更多
We propose a global warfare model that integrates the models of the whole tensor-centric warfare series, represented as a high-dimensional entangled warfare category. Its underpinning metaphysics is “entangled fusion...We propose a global warfare model that integrates the models of the whole tensor-centric warfare series, represented as a high-dimensional entangled warfare category. Its underpinning metaphysics is “entangled fusion”: this is the macroscopic entanglement concept inspired by high-dimensional (HD) quantum computation (the “quantum brain”), in which any number of entangled wave-functions can be highly correlated, with neuron-like signaling among them. From this entangled perspective, war and battle is seen essentially as a holistic phenomenon: if any one of a set of mutually entangled warring parties is removed from the equation, then the war as it is instantly stops, possibly to be replaced by a new conflict between the remaining parties but distinct from that which it supplants. The formal global warfare framework developed in this paper expresses this fundamental idea of arbitrary many interrelated/entangled conflicts, each of them defined by its own battle-manifold (with warfighting tensor fields acting on it) and occurring (more-or-less) simultaneously on the planet;we call this entangled展开更多
In the first paper of the tensor-centric warfare (TCW) series [1], we proposed a tensor model of combat generalizing earlier Lanchester-type systems with a particular emphasis on contemporary military thinking, includ...In the first paper of the tensor-centric warfare (TCW) series [1], we proposed a tensor model of combat generalizing earlier Lanchester-type systems with a particular emphasis on contemporary military thinking, including the distributed C4ISR system (Command, Control, Communications, Computing, Intelligence, Surveillance and Reconnaissance). In the present paper, we extend this initial tensor combat model with entropic Lie-derivative machinery in order to capture some aspects of this deep uncertainty, while, in the process, formalizing into our model military notion of symmetry and asymmetry in warfare as a commutator, also known as a Lie bracket. In doing so, we have sought to shift the question from the prediction of outcomes of combat, upon which previous combat models such as the Lanchester-type equations have been typically constructed, towards determining the uncertainty outcomes, using a rigorous analytical basis.展开更多
In this paper, as a new contribution to the tensor-centric warfare (TCW) series [1] [2] [3] [4], we extend the kinetic TCW-framework to include non-kinetic effects, by addressing a general systems confrontation [5], w...In this paper, as a new contribution to the tensor-centric warfare (TCW) series [1] [2] [3] [4], we extend the kinetic TCW-framework to include non-kinetic effects, by addressing a general systems confrontation [5], which is waged not only in the traditional physical Air-Land-Sea domains, but also simultaneously across multiple non-physical domains, including cyberspace and social networks. Upon this basis, this paper attempts to address a more general analytical scenario using rigorous topological methods to introduce a two-level topological representation of modern armed conflict;in doing so, it extends from the traditional red-blue model of conflict to a red-blue-green model, where green represents various neutral elements as active factions;indeed, green can effectively decide the outcomes from red-blue conflict. System confrontations at various stages of the scenario will be defined by the non-equilibrium phase transitions which are superficially characterized by sudden entropy growth. These will be shown to have the underlying topology changes of the systems-battlespace. The two-level topological analysis of the systems-battlespace is utilized to address the question of topology changes in the combined battlespace. Once an intuitive analysis of the combined battlespace topology is performed, a rigorous topological analysis follows using (co)homological invariants of the combined systems-battlespace manifold.展开更多
The concept of network centric warfare (NCW) and the distributed equal-node network architecture in NCW are introduced in this paper. The data flow requirement model in NCW is presented. Based on synthetic analysis ...The concept of network centric warfare (NCW) and the distributed equal-node network architecture in NCW are introduced in this paper. The data flow requirement model in NCW is presented. Based on synthetic analysis of network resource, the QOS (Quality of Service) parameters and their characters, the high requirement of real-time synchronization in NCW, the single QOS routing constraint, and the network latency between the detector and weapon control station, are presented. To take an example for 3-node brigade (regiment) level NCW demonstration platform, the algorithm of end-to-end network latency and path information in NCW are presented. The algorithm program based on Server/Client architecture is developed. The optimal path is the link whose latency between the detector and weapon control station is the smallest. This paper solves the key issue and satisfies the needs on network latency in NCW. The study results can be widely applied in the decision of the optimal path which is based on multiple service provision points.展开更多
Massive information flows are gen- erated from interactive processing and visua- lizations. To efficiently support information transmission over the Interact, information cen- tric architecture has been recently propo...Massive information flows are gen- erated from interactive processing and visua- lizations. To efficiently support information transmission over the Interact, information cen- tric architecture has been recently proposed. In this paper, we consider an information centric architecture, called the data centric networking architecture to provide communication servi- ces to big data, where a service identifier is used to name the data objects. We propose dif- ferent approaches for the dissemination of data objects in a large-scale data centric network. In particular, we propose various approaches to link the data dissemination approach with the topology of the Internet. Further, we eva- luate the proposed approaches with respect to data delivery efficiency, round-trip time imp- rovement, and deployment cost. Based on the results obtained from this study, it can be sh- own that by disseminating data objects to small ISPs, the data delivery efficiency can be significantly improved within an acceptable deployment cost.展开更多
The information centric network(ICN)has been widely discussed in current researches.The ICN interoperation with a traditional IP network and caching methods are one of the research topics of interest.For economic reas...The information centric network(ICN)has been widely discussed in current researches.The ICN interoperation with a traditional IP network and caching methods are one of the research topics of interest.For economic reasons,the capability of applying the ICN to internet service providers(ISPs)with various traditional IP protocols already implemented,especially IGP,MPLS,VRF,and TE,does not require any change on the IP network infrastructure.The biggest concern of ISPs is related to their customers’contents delivery speed.In this paper,we consider ICN caching locations in ISP by using the concept of locator/ID separation protocol(LISP)for interoperation between a traditional IP address and name-based ICN.To be more specific,we propose a new procedure to determine caching locations in the ICN by using the cuckoo search algorithm(CSA)for finding the best caching locations of information chunks.Moreover,we create the smart control plane(SCP)scheme which is an intelligent controlling,managing,and mapping system.Its function is similar to the software defined network concept.We show how the proposed SCP system works in both synthetic small network and real-world big network.Finally,we show and evaluate the performance of our algorithm comparison with the simple search method using the shortest path first algorithm.展开更多
Content-centric Networking(CCN) is progressively flattering the substitutable approach to the Internet architecture through illuminating information(content) dissemination on the Internet with content forenames.The em...Content-centric Networking(CCN) is progressively flattering the substitutable approach to the Internet architecture through illuminating information(content) dissemination on the Internet with content forenames.The emergent proportion of Internet circulation has expectant adjusting Content-centric architecture to enhance serve the user prerequisites of accessing content.In recent years,one of the key aspects of CCN is ubiquitous in-network caching,which has been widely received great attention in research interest.One foremost shortcoming of in-network caching is that content producers have no awareness about where their content is put in storage.Because routers in CCN have caching capabilities,therefore,each and every content router can cache the content item in its storage capacity.This is problematic in the case in which a producer wishes to update or make the changes in its content item.In this paper,we present an approach regarding how to address this issue with a scheme called efficient content update(ECU).Our proposed ECU scheme achieves content update via trifling packets that resemble contemporary CCN communication messages with the use of additional table.We measure the performance of ECU scheme by means of simulations and make available a comprehensive exploration of its results.展开更多
基金supported in part by the National Natural Science Foundation of China (NSFC) under Grant 61671081in part by the Funds for International Cooperation and Exchange of NSFC under Grant 61720106007+2 种基金in part by the 111 Project under Grant B18008in part by the Beijing Natural Science Foundation under Grant 4172042in part by the Fundamental Research Funds for the Central Universities under Grant 2018XKJC01
文摘As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholly driven by the data consumer.Consumers must send Interest packets with the content name and not by the host’s network address.Its nature of in-network caching,Interest packets aggregation and hop-byhop communication poses unique challenges to provision of Internet applications,where traditional IP network no long works well.This paper presents a comprehensive survey of state-of-the-art application research activities related to CCN architecture.Our main aims in this survey are(a)to identify the advantages and drawbacks of CCN architectures for application provisioning;(b)to discuss the challenges and opportunities regarding service provisioning in CCN architectures;and(c)to further encourage deeper thinking about design principles for future Internet architectures from the perspective of upper-layer applications.
基金supported in part by The National High Technology Research and Development Program of China (863 Program) under Grant No. 2015AA016101The National Natural Science Foundation of China under Grant No. 61501042+1 种基金Beijing Nova Program under Grant No. Z151100000315078BUPT Special Program for Youth Scientific Research Innovation under Grant No. 2015RC10
文摘Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching methods with better cache hit rate and achieve allocating on-demand. Therefore, an in-network caching scheduling scheme for ICN was designed, distinguishing different kinds of contents and dynamically allocating the cache size on-demand. First discussing what was appropriated to be cached in nodes, and then a classification about the contents could be cached was proposed. Furthermore, we used AHP to weight different contents classes through analyzing users' behavior. And a distributed control process was built, to achieve differentiated caching resource allocation and management. The designed scheme not only avoids the waste of caching resource, but also further enhances the cache availability. Finally, the simulation results are illustrated to show that our method has the superior performance in the aspects of server hit rate and convergence.
基金supported in part by the fundamental key research project of Shanghai Municipal Science and Technology Commission under grant 12JC1404201the Ministry of Education Research Fund-China Mobile(2012) MCM20121032
文摘Recently the content centric networks(CCNs) have been advocated as a new solution to design future networks. In the CCNs, content and its interest are delivered over the content store and pending interest table, respectively, where both have limited capacities. Therefore, how to design the corresponding algorithms to efficiently deliver content and inertest over them becomes an important issue. In this paper, based on the analysis of content distribution, status of content store, and pending interest, we propose a novel caching algorithm with which the resources of content store and pending interest table can be efficiently used. Simulation results prove that the proposal can outperform the conventional methods.
文摘NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward,which is a four levels system including the user level, the application level, the grid middleware layer and the resource level. In grid middleware layer,based on virtual hosting environment, a BEPL4WS grid service composition method is introduced. In addition, the NCW grid service model is built with the help of Eclipse-SDK-3.0.1 and Bpws4j.
文摘The concept of Network Centric Therapy represents an amalgamation of wearable and wireless inertial sensor systems and machine learning with access to a Cloud computing environment. The advent of Network Centric Therapy is highly relevant to the treatment of Parkinson’s disease through deep brain stimulation. Originally wearable and wireless systems for quantifying Parkinson’s disease involved the use a smartphone to quantify hand tremor. Although originally novel, the smartphone has notable issues as a wearable application for quantifying movement disorder tremor. The smartphone has evolved in a pathway that has made the smartphone progressively more cumbersome to mount about the dorsum of the hand. Furthermore, the smartphone utilizes an inertial sensor package that is not certified for medical analysis, and the trial data access a provisional Cloud computing environment through an email account. These concerns are resolved with the recent development of a conformal wearable and wireless inertial sensor system. This conformal wearable and wireless system mounts to the hand with the profile of a bandage by adhesive and accesses a secure Cloud computing environment through a segmented wireless connectivity strategy involving a smartphone and tablet. Additionally, the conformal wearable and wireless system is certified by the FDA of the United States of America for ascertaining medical grade inertial sensor data. These characteristics make the conformal wearable and wireless system uniquely suited for the quantification of Parkinson’s disease treatment through deep brain stimulation. Preliminary evaluation of the conformal wearable and wireless system is demonstrated through the differentiation of deep brain stimulation set to “On” and “Off” status. Based on the robustness of the acceleration signal, this signal was selected to quantify hand tremor for the prescribed deep brain stimulation settings. Machine learning classification using the Waikato Environment for Knowledge Analysis (WEKA) was applied using the multilayer perceptron neural network. The multilayer perceptron neural network achieved considerable classification accuracy for distinguishing between the deep brain stimulation system set to “On” and “Off” status through the quantified acceleration signal data obtained by this recently developed conformal wearable and wireless system. The research achievement establishes a progressive pathway to the future objective of achieving deep brain stimulation capabilities that promote closed-loop acquisition of configuration parameters that are uniquely optimized to the individual through extrinsic means of a highly conformal wearable and wireless inertial sensor system and machine learning with access to Cloud computing resources.
文摘In the modern arena, the Information and Communication Technologies (ICTs) have been playing a vital role in every walks of our day to day life. In order to enhance the ICT capacity and align with the global technology transformations, the developing countries have started introducing the computerization and automation processes at different levels of the governments. The several research studies revealed that the existing legacy of governance system and their services in current state have several issues and challenges in terms of timeliness, cost of services, delay in service delivery, time-bound availability of services (24/7/365), inefficiency services, ease of service and discomforts, poor service collaboration, absence of responsiveness, and limited security of sensitive information/documents. A significant question is still unanswered that how to bring the Citizens and Government bodies closer for alleviating the aforementioned issues and challenges of existing government system services. This research paper aims to investigate the issues and challenges in the current status of Governance and partial E-Governance systems which encompass the computerization or automation process. The research designs a cloud framework for effective delivery of citizen centric services in general and Ethiopia as a specific case study. After rigorous analysis of prior research efforts, along with primary survey and interview, it was clearly observed that cloud computing can be an alternative instrumental for significant transformation of governmental service delivery. The research paper used a mix of exploratory and constructive research design and methodology with qualitative & quantitative data analysis approach. Finally, a Cloud Based E-Governance (CBEG) Framework is designed for the delivery of Ethiopian Citizen Centric Services. The validation, evaluation and acceptance test of the framework proves that the revealed knowledge can provide a significant transformation towards the betterment of the E Governance Services Delivery Systems.
基金Project supported by the NSF(No.IIS-0812578),the Grant from IBM to UCSB,and the Grant from China Scholarship Council
文摘Data-centric modeling approach for workflow specification and design has received considerable attention from research and development communities.An architecture for a workflow management system named EZFLOWS was outlined.Key components and research issues associated with the development of EZFLOWS were discussed.
基金supported by the National High Technology Research and Development Program(863)of China(No.2015AA016101)the National Natural Science Fund(No.61300184)Beijing Nova Program(No.Z151100000315078)
文摘Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and improving users' experience. To analyse the requests' patterns and fully utilize the universal cached contents, a novel intelligent resources management system is proposed, which enables effi cient cache resource allocation in real time, based on changing user demand patterns. The system is composed of two parts. The fi rst part is a fi ne-grain traffi c estimation algorithm called Temporal Poisson traffi c prediction(TP2) that aims at analysing the traffi c pattern(or aggregated user requests' demands) for different contents. The second part is a collaborative cache placement algorithm that is based on traffic estimated by TP2. The experimental results show that TP2 has better performance than other comparable traffi c prediction algorithms and the proposed intelligent system can increase the utilization of cache resources and improve the network capacity.
基金supported by the National Natural Science Foundation of China (70901074 71001104)
文摘An integration-centric approach is proposed to handle inadequate information in the system readiness level (SRL) assessment using the evidential reasoning (ER) algorithm. Current SRL assessment approaches cannot be applied to handle inadequate information as the input. The ER-based approach is proposed to synthesize inadequate input information and an integration-centric perspective is applied to reduce the computational complexity. Two case studies are performed to validate the efficiency of the proposed approach. And these studies are also performed to study how the inadequate information will affect the assessment result. And the differences caused by the system's structure. The importance of the system's structure in the SRL assessment is demonstrated and the contributions made in this study are summarized as conclusions.
文摘This paper is the third part of the complex combat dynamics series, called tensor-centric warfare (for the first two parts, see [1] [2]). In the present paper, we extend the tensor combat model from [1] and [2] to model the dynamics of delta-strikes/missiles , which are temporally confined strong kinetic effects . The scenarios analyzed here include both deterministic and random delta-strikes which mimic single, multiple and continuous-time missile attacks. We also look at the bidirectional random strike as well as the general Hamilton-Langevin dynamics framework and provide an interpretation of the results obtained through simulation.
文摘We propose a global warfare model that integrates the models of the whole tensor-centric warfare series, represented as a high-dimensional entangled warfare category. Its underpinning metaphysics is “entangled fusion”: this is the macroscopic entanglement concept inspired by high-dimensional (HD) quantum computation (the “quantum brain”), in which any number of entangled wave-functions can be highly correlated, with neuron-like signaling among them. From this entangled perspective, war and battle is seen essentially as a holistic phenomenon: if any one of a set of mutually entangled warring parties is removed from the equation, then the war as it is instantly stops, possibly to be replaced by a new conflict between the remaining parties but distinct from that which it supplants. The formal global warfare framework developed in this paper expresses this fundamental idea of arbitrary many interrelated/entangled conflicts, each of them defined by its own battle-manifold (with warfighting tensor fields acting on it) and occurring (more-or-less) simultaneously on the planet;we call this entangled
文摘In the first paper of the tensor-centric warfare (TCW) series [1], we proposed a tensor model of combat generalizing earlier Lanchester-type systems with a particular emphasis on contemporary military thinking, including the distributed C4ISR system (Command, Control, Communications, Computing, Intelligence, Surveillance and Reconnaissance). In the present paper, we extend this initial tensor combat model with entropic Lie-derivative machinery in order to capture some aspects of this deep uncertainty, while, in the process, formalizing into our model military notion of symmetry and asymmetry in warfare as a commutator, also known as a Lie bracket. In doing so, we have sought to shift the question from the prediction of outcomes of combat, upon which previous combat models such as the Lanchester-type equations have been typically constructed, towards determining the uncertainty outcomes, using a rigorous analytical basis.
文摘In this paper, as a new contribution to the tensor-centric warfare (TCW) series [1] [2] [3] [4], we extend the kinetic TCW-framework to include non-kinetic effects, by addressing a general systems confrontation [5], which is waged not only in the traditional physical Air-Land-Sea domains, but also simultaneously across multiple non-physical domains, including cyberspace and social networks. Upon this basis, this paper attempts to address a more general analytical scenario using rigorous topological methods to introduce a two-level topological representation of modern armed conflict;in doing so, it extends from the traditional red-blue model of conflict to a red-blue-green model, where green represents various neutral elements as active factions;indeed, green can effectively decide the outcomes from red-blue conflict. System confrontations at various stages of the scenario will be defined by the non-equilibrium phase transitions which are superficially characterized by sudden entropy growth. These will be shown to have the underlying topology changes of the systems-battlespace. The two-level topological analysis of the systems-battlespace is utilized to address the question of topology changes in the combined battlespace. Once an intuitive analysis of the combined battlespace topology is performed, a rigorous topological analysis follows using (co)homological invariants of the combined systems-battlespace manifold.
文摘The concept of network centric warfare (NCW) and the distributed equal-node network architecture in NCW are introduced in this paper. The data flow requirement model in NCW is presented. Based on synthetic analysis of network resource, the QOS (Quality of Service) parameters and their characters, the high requirement of real-time synchronization in NCW, the single QOS routing constraint, and the network latency between the detector and weapon control station, are presented. To take an example for 3-node brigade (regiment) level NCW demonstration platform, the algorithm of end-to-end network latency and path information in NCW are presented. The algorithm program based on Server/Client architecture is developed. The optimal path is the link whose latency between the detector and weapon control station is the smallest. This paper solves the key issue and satisfies the needs on network latency in NCW. The study results can be widely applied in the decision of the optimal path which is based on multiple service provision points.
基金supported by the National Science and Technology Major Projects of the Ministry of Science and Technology of China under Grant No.2012ZX03005003the State Key Program of National Natural Science of China under Grant No.61232017+3 种基金the National Basic Research Program of China(973 Program)under Grant No.2013CB329101the National Natural Science Foundation of China under Grants No.61102049,No.61271202the Beijing Natural Science Foundation underGrants No.4132053,No.4122060the Scientific Research Foundation of the Returned Overseas Chinese Scholars of State Education Ministry under Grant No.W13C300010
文摘Massive information flows are gen- erated from interactive processing and visua- lizations. To efficiently support information transmission over the Interact, information cen- tric architecture has been recently proposed. In this paper, we consider an information centric architecture, called the data centric networking architecture to provide communication servi- ces to big data, where a service identifier is used to name the data objects. We propose dif- ferent approaches for the dissemination of data objects in a large-scale data centric network. In particular, we propose various approaches to link the data dissemination approach with the topology of the Internet. Further, we eva- luate the proposed approaches with respect to data delivery efficiency, round-trip time imp- rovement, and deployment cost. Based on the results obtained from this study, it can be sh- own that by disseminating data objects to small ISPs, the data delivery efficiency can be significantly improved within an acceptable deployment cost.
文摘The information centric network(ICN)has been widely discussed in current researches.The ICN interoperation with a traditional IP network and caching methods are one of the research topics of interest.For economic reasons,the capability of applying the ICN to internet service providers(ISPs)with various traditional IP protocols already implemented,especially IGP,MPLS,VRF,and TE,does not require any change on the IP network infrastructure.The biggest concern of ISPs is related to their customers’contents delivery speed.In this paper,we consider ICN caching locations in ISP by using the concept of locator/ID separation protocol(LISP)for interoperation between a traditional IP address and name-based ICN.To be more specific,we propose a new procedure to determine caching locations in the ICN by using the cuckoo search algorithm(CSA)for finding the best caching locations of information chunks.Moreover,we create the smart control plane(SCP)scheme which is an intelligent controlling,managing,and mapping system.Its function is similar to the software defined network concept.We show how the proposed SCP system works in both synthetic small network and real-world big network.Finally,we show and evaluate the performance of our algorithm comparison with the simple search method using the shortest path first algorithm.
文摘Content-centric Networking(CCN) is progressively flattering the substitutable approach to the Internet architecture through illuminating information(content) dissemination on the Internet with content forenames.The emergent proportion of Internet circulation has expectant adjusting Content-centric architecture to enhance serve the user prerequisites of accessing content.In recent years,one of the key aspects of CCN is ubiquitous in-network caching,which has been widely received great attention in research interest.One foremost shortcoming of in-network caching is that content producers have no awareness about where their content is put in storage.Because routers in CCN have caching capabilities,therefore,each and every content router can cache the content item in its storage capacity.This is problematic in the case in which a producer wishes to update or make the changes in its content item.In this paper,we present an approach regarding how to address this issue with a scheme called efficient content update(ECU).Our proposed ECU scheme achieves content update via trifling packets that resemble contemporary CCN communication messages with the use of additional table.We measure the performance of ECU scheme by means of simulations and make available a comprehensive exploration of its results.