The concept of unmanned weapon system-of-systems(UWSoS)involves a collection of various unmanned systems to achieve or accomplish a specific goal or mission.The mission reliability of UWSoS is represented by its abili...The concept of unmanned weapon system-of-systems(UWSoS)involves a collection of various unmanned systems to achieve or accomplish a specific goal or mission.The mission reliability of UWSoS is represented by its ability to finish a required mission above the baselines of a given mission.However,issues with heterogeneity,cooperation between systems,and the emergence of UWSoS cannot be effectively solved by traditional system reliability methods.This study proposes an effective operation-loop-based mission reliability evaluation method for UWSoS by analyzing dynamic reconfiguration.First,we present a new connotation of an effective operation loop by considering the allocation of operational entities and physical resource constraints.Then,we propose an effective operationloop-based mission reliability model for a heterogeneous UWSoS according to the mission baseline.Moreover,a mission reliability evaluation algorithm is proposed under random external shocks and topology reconfiguration,revealing the evolution law of the effective operation loop and mission reliability.Finally,a typical 60-unmanned-aerial-vehicle-swarm is taken as an example to demonstrate the proposed models and methods.The mission reliability is achieved by considering external shocks,which can serve as a reference for evaluating and improving the effectiveness of UWSoS.展开更多
Software operational profile (SOP) is used in software reliability prediction, software quality assessment, performance analysis of software, test case allocation, determination of "when to stop testing," etc. Due...Software operational profile (SOP) is used in software reliability prediction, software quality assessment, performance analysis of software, test case allocation, determination of "when to stop testing," etc. Due to the limited data resources and large efforts required to collect and convert the gathered data into point estimates, reluctance is observed by the software professionals to develop the SOP. A framework is proposed to develop SOP using fuzzy logic, which requires usage data in the form of linguistics. The resulting profile is named fuzzy software operational profile (FSOP). Based on this work, this paper proposes a generalized approach for the allocation of test cases, in which occurrence probability of operations obtained from FSOP are combined with the criticality of the operations using fuzzy inference system (FIS). Traditional methods for the allocation of test cases do not consider the application in which software operates. This is intuitively incorrect. To solve this problem, allocation of test cases with respect to software application using the FIS model is also proposed in this paper.展开更多
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under s...Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical e military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical e military experts.Both the design and the results of the evaluation are revealed in this article.展开更多
基金supported by the National Natural Science Foundation of China(72101270,72001213).
文摘The concept of unmanned weapon system-of-systems(UWSoS)involves a collection of various unmanned systems to achieve or accomplish a specific goal or mission.The mission reliability of UWSoS is represented by its ability to finish a required mission above the baselines of a given mission.However,issues with heterogeneity,cooperation between systems,and the emergence of UWSoS cannot be effectively solved by traditional system reliability methods.This study proposes an effective operation-loop-based mission reliability evaluation method for UWSoS by analyzing dynamic reconfiguration.First,we present a new connotation of an effective operation loop by considering the allocation of operational entities and physical resource constraints.Then,we propose an effective operationloop-based mission reliability model for a heterogeneous UWSoS according to the mission baseline.Moreover,a mission reliability evaluation algorithm is proposed under random external shocks and topology reconfiguration,revealing the evolution law of the effective operation loop and mission reliability.Finally,a typical 60-unmanned-aerial-vehicle-swarm is taken as an example to demonstrate the proposed models and methods.The mission reliability is achieved by considering external shocks,which can serve as a reference for evaluating and improving the effectiveness of UWSoS.
文摘Software operational profile (SOP) is used in software reliability prediction, software quality assessment, performance analysis of software, test case allocation, determination of "when to stop testing," etc. Due to the limited data resources and large efforts required to collect and convert the gathered data into point estimates, reluctance is observed by the software professionals to develop the SOP. A framework is proposed to develop SOP using fuzzy logic, which requires usage data in the form of linguistics. The resulting profile is named fuzzy software operational profile (FSOP). Based on this work, this paper proposes a generalized approach for the allocation of test cases, in which occurrence probability of operations obtained from FSOP are combined with the criticality of the operations using fuzzy inference system (FIS). Traditional methods for the allocation of test cases do not consider the application in which software operates. This is intuitively incorrect. To solve this problem, allocation of test cases with respect to software application using the FIS model is also proposed in this paper.
文摘Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical e military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical e military experts.Both the design and the results of the evaluation are revealed in this article.