scholarly journals A new methodology for designing of tactical integrated telecommunications and computer networks for OPNET simulation

2020 ◽  
Vol 70 (2) ◽  
pp. 35-40
Author(s):  
Slobodan Miletić ◽  
Marjan Milošević ◽  
Vladimir Mladenović

This paper present a novel methodological approach in the design of integrated tactical telecommunications and computer networks for command information system and defining the elements for the OPNET simulation model. The elements proposed for design of network information architecture. For that purpose, the way established to set up relationships between elements that uses for network topologies design, building of network elements and network traffic. They are integrated with its parameters in the preliminary model defined by an OPNET simulation model. We propose the measure of efficiency for accomplishment of tactical command requirements to use the design model network. This measure of efficiency is mean time delay that described with mathematical relations, involving the communication parameters speed of generating traffic, packet size, link capacity and adequately reflects the projected network. Furthermore, the applications of the proposed approach and given instructions allow to designers full examination of the network architecture, and provide translation into preliminary model and design OPNET simulation model.

Author(s):  
Rachana Kamtekar

Chapter 1 lays out the methodological approach employed throughout the book, which is to pay attention to the dialectical dependence of what the main speaker in the dialogue says on the intellectual problem(s) set up in the dialogue both by himself and the other speakers. To illustrate, Chapter 1 describes Socrates’ use of the method of hypotheses from the Meno and Phaedo to answer questions that go beyond his claims to knowledge in the Republic.


Author(s):  
Donghui Zhang ◽  
Ruijie Liu

Abstract Orienteering has gradually changed from a professional sport to a civilian sport. Especially in recent years, orienteering has been widely popularized. Many colleges and universities in China have also set up this course. With the improvement of people’s living conditions, orienteering has really become a leisure sport in modern people’s life. The reduced difficulty of sports enables more people to participate, but it also exposes a series of problems. As the existing positioning technology is relatively backward, the progress in personnel tracking, emergency services, and other aspects is slow. To solve these problems, a new intelligent orienteering application system is developed based on the Internet of things. ZigBee network architecture is adopted in the system. ZigBee is the mainstream scheme in the current wireless sensor network technology, which has many advantages such as convenient carrying, low power consumption, and signal stability. Due to the complex communication environment in mobile signal, the collected information is processed by signal amplification and signal anti-interference technology. By adding anti-interference devices, video isolators and other devices, the signal is guaranteed to the maximum extent. In order to verify the actual effect of this system, through a number of experimental studies including the relationship between error and traffic radius and the relationship between coverage and the number of anchor nodes, the data shows that the scheme studied in this paper has a greater improvement in comprehensive performance than the traditional scheme, significantly improving the accuracy and coverage. Especially the coverage is close to 100% in the simulation experiment. This research has achieved good results and can be widely used in orienteering training and competition.


Information ◽  
2021 ◽  
Vol 12 (6) ◽  
pp. 248
Author(s):  
Simone Leonardi ◽  
Giuseppe Rizzo ◽  
Maurizio Morisio

In social media, users are spreading misinformation easily and without fact checking. In principle, they do not have a malicious intent, but their sharing leads to a socially dangerous diffusion mechanism. The motivations behind this behavior have been linked to a wide variety of social and personal outcomes, but these users are not easily identified. The existing solutions show how the analysis of linguistic signals in social media posts combined with the exploration of network topologies are effective in this field. These applications have some limitations such as focusing solely on the fake news shared and not understanding the typology of the user spreading them. In this paper, we propose a computational approach to extract features from the social media posts of these users to recognize who is a fake news spreader for a given topic. Thanks to the CoAID dataset, we start the analysis with 300 K users engaged on an online micro-blogging platform; then, we enriched the dataset by extending it to a collection of more than 1 M share actions and their associated posts on the platform. The proposed approach processes a batch of Twitter posts authored by users of the CoAID dataset and turns them into a high-dimensional matrix of features, which are then exploited by a deep neural network architecture based on transformers to perform user classification. We prove the effectiveness of our work by comparing the precision, recall, and f1 score of our model with different configurations and with a baseline classifier. We obtained an f1 score of 0.8076, obtaining an improvement from the state-of-the-art by 4%.


2014 ◽  
Vol 701-702 ◽  
pp. 919-922
Author(s):  
Hong Fei Xu ◽  
Si Rui Pang ◽  
Jian Wen Du ◽  
Xue Mei Li

A system includes three power information security defense line is constructed, to achieve the information network, information outside the network, scheduling data network depth protection. According to the information security protection requirements, starting from the overall structure of information systems, taking into account the information system to schedule production system as the core, based on independent research and development of core information security isolation unit, set up three lines of defense in the power of information systems, electricity secondary system, information network systems, information systems outside the network partition protection.


2021 ◽  
Vol 93 ◽  
pp. 01023
Author(s):  
Pavel Glukhikh ◽  
Alla Golovina

The demand for new industrialization makes the lack of innovation in Russia a topical issue. Serial entrepreneurs are a promising source of innovation. Basing on empirical data (SPARK database), we considered the hypothesis that mass strategies for establishing a technology business are less effective. The aim of the article is to develop a theoretical and methodological approach to serial technology entrepreneurship as a source of new industrialization. The authors identified 4 dominant strategies used by serial entrepreneurs to set up technology businesses. The necessity of a new term "serial potential" of an entrepreneur is substantiated. The research novelty refers to the development of the methodological approach "The Effect of serial technology entrepreneur", which allows evaluating the performance of serial technology entrepreneurs in setting up technology companies. It has been found that the strategy "From services in technology field to production" is the most advantageous in terms of total efficiency for new industrialization.


2020 ◽  
Author(s):  
Chu Ann Chai ◽  
W.S Yeoh ◽  
A.N Fadzli ◽  
T.A Ong ◽  
S Kuppusamy ◽  
...  

Abstract Background: To explore the use of an automated needle targeting (ANT) device as an assistive intraoperative navigation modality during PCNL for the treatment of large renal stones, with the aim of reducing surgical durations and radiation exposure.Methods: This open-label, single-surgeon clinical trial included patients with a diagnosis of renal stones for whom PCNL using the ANT device via the percutaneous access technique was indicated. Ethical approval was obtained from the UMMC ethics review board (Ref. 20118105-6740). The ANT was assembled after an initial motor calibration, and the image calibration was performed using the patient’s fluoroscopic images. Subsequently, the ANT software calculated a bullseye alignment before percutaneous puncture. Accurate renal access was confirmed by the efflux of urine in the Chiba biopsy needle, as well as by imaging with the C-arm intensifier at different angles. The primary endpoints were the time to successful renal access (from ANT set-up to urine efflux) and adverse events.Results: In all cases, successful renal access was achieved with a single attempt. The mean time to renal access was 6 minutes, 8 seconds. The mean fluoroscopy duration was 101 seconds, with a mean radiation dose of 23.46 mGy. No adverse events were documented.Conclusion: The ANT device enabled successful, safe and efficient renal access for PCNL in this study. Further research is needed to justify the effectiveness of this device in terms of enabling accurate renal access while reducing the surgical duration and radiation exposure to both surgeons and patients.


Author(s):  
Davide Nunes ◽  
Luis Antunes

In real world scenarios, the formation of consensus is a self-organisation process by which actors have to make a joint assessment about a target subject, be it a decision making problem or the formation of a collective opinion. In social simulation, models of opinion dynamics tackle the opinion formation phenomena. These models try to make an assessment, for instance, of the ideal conditions that lead an interacting group of agents to opinion consensus, polarisation or fragmentation. This chapter investigates the role of social relation structure in opinion dynamics and consensus formation. The authors present an agent-based model that defines social relations as multiple concomitant social networks and explore multiple interaction games in this structural set-up. They discuss the influence of complex social network topologies where actors interact in multiple distinct networks. The chapter builds on previous work about social space design with multiple social relations to determine the influence of such complex social structures in a process such as opinion formation.


Author(s):  
S.N. John ◽  
A.A. Anoprienko ◽  
C.U. Ndujiuba

This chapter provides solutions for increasing the efficiency of data transfer in modern computer network applications and computing network environments based on the TCP/IP protocol suite. In this work, an imitation model and simulation was used as the basic method in the research. A simulation model was developed for designing and analyzing the computer networks based on TCP/IP protocols suite which fully allows the exact features in realizing the protocols and their impact on increasing the efficiency of data transfer in local and corporate networks. The method of increasing efficiency in the performance of computer networks was offered, based on the TCP/IP protocols by perfection of the modes of data transfer in them. This allows an increased efficient usage of computer networks and network applications without additional expenditure on infrastructure of the network. Practically, the results obtained from this research enable significant increase in the performance efficiency of data transfer in the computer networks environment. An example is the “Donetsk National Technical University” network.


Author(s):  
Miguel Jose Hernandez y Lopez ◽  
Carlos Francisco Lerma Resendez

This chapter discusses the basic aspects of Honeypots, how they are implemented in modern computer networks, as well as their practical uses and implementation in educational environments, providing the reader with the most important points regarding the main characteristics of Honeypots and Honeynets. Honeypots are defined as “closely monitored network decoys” that can be set by network administrators to deal with a wide variety of attacks and interact with users in different levels (Provos, 2004). The implementation of Honeypots provides an answer to a common question posted by the field of information security and forensics: How to dissect the elements that make up an attack against a computer system. The chapter will summarizes the different features and capabilities of Honeypots once they are set up in a production environment to clarify the elements that are needed to be configured in order for a Honeypot to accomplish its main tasks and in order for it to be considered an effective tool. The end of the chapter will shift towards the analysis of virtualization as an important tool that maximizes the practical use of Honeypots in controlled environments that are focused towards the study of attacks, responses and analysis methods.


1972 ◽  
Vol 6 (1) ◽  
pp. 9-18 ◽  
Author(s):  
A. Eastcott

A system for breeding from obese male mice ( ob/ob) by restricting food intake is described. It is shown that a 40% reduction in food intake at 6½-8½ weeks of age is optimal in the colony under review. Males on restricted diet did not mate immediately but went through a period of adaptation; the mean time before vaginal plugs were observed was 30 days. Subsequent vaginal plugs occurred on average every 17 days and 69% of these matings resulted in litters. Under optimal conditions over 90% of all obese males set up on restricted diets mated and sired young.


Sign in / Sign up

Export Citation Format

Share Document