Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Journal Issue Information

Archive

Year

Volume(Issue)

Issues

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Author(s): 

Bakhtiari Iraj

Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2020
  • Volume: 

    4
  • Issue: 

    2
  • Pages: 

    1-20
Measures: 
  • Citations: 

    0
  • Views: 

    166
  • Downloads: 

    0
Abstract: 

Command and control centers play a vital role in navigation and guidance of aerospace defense systems. Regarding the increasing trend of threats and changing the nature of the classic war, we will need to make arrangements to strengthen and resolve the vulnerabilities of these systems. In this study, the main objectives of the research are to explain the effective factors on the future of command and control in the field of aerospace defense. This research has been conducted in descriptive and mixed method. The statistical population of the research in the qualitative part consists of 20 aerospace experts, which were selected using Snowball method. In the quantitative section, 65 of the managers and officials of this area were selected objectivly as sample size and data collection was performed using a questionnaire with Likert spectrum and analized. The results of this research indicate that the amount of threats (4. 52) exceeds opportunities (4. 27) in foreign factors. The finding also suggests that, in the internal measures, weaknesses (3. 29) are more than strong points (3. 05) that will help to designe strategis for achiving ideale point. Also, according to the identified weaknesses and threats, five major challenges were identified, and finally, suggestions for overcoming these challenges were presented using opportunities and strengths.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 166

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2020
  • Volume: 

    4
  • Issue: 

    2
  • Pages: 

    21-36
Measures: 
  • Citations: 

    0
  • Views: 

    123
  • Downloads: 

    0
Abstract: 

Nowadays, cyberspace has affected on various areas. So, it is necessary to control the negative and the positive effects of this space. Social security mentioned to the feeling of risk of the collective identity and society. The present study investigates the cultural and social threats of cyberspace on security, considering the dimensions of cyberspace effects. Social security is one of the pillars of soft warfare, so it is important to identify and control the threats. In this study, first 35 threatening factors were identified based on literature review and completing them by interviews with experts. Based on fuzzy Delphi, factors have been prioritized and 12 main factors extracted. Then, based on interpretive structural modeling, the factors are classified and placed in three levels, the lower levels have high priority and the factors of emergence of social movements, diminishing religious beliefs, using cyberspace as a tool of domination and the possibility of creating social unrest have the highest level of threats. Then, the factors are clustered by Mikmak analysis. At the end some suggestions and policy recommendations for controlling these factors are presented.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 123

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2020
  • Volume: 

    4
  • Issue: 

    2
  • Pages: 

    37-62
Measures: 
  • Citations: 

    0
  • Views: 

    127
  • Downloads: 

    0
Abstract: 

In this paper, a cost-sensitive multi-agent approach for the command and control of web content surveillance is selected and its key functions are fully described; Based on these functions, a formal expression for cost-sensitive command and control is provided. The structure of a C4ISR system based on autonomous web surveillance agents is also presented, in which the intelligent components of text processing, image processing, and topical crawling are used. For the image processing component, a cost-sensitive learning method for deep convolutional neural networks and a method for cost-sensitive topical crawling have been proposed. In the proposed image processing method, the process is stopped when the middle classifiers, which have been added to the conventional CNN structure, reach the certainty necessary to determine the class of a sample; otherwise, the classification continues in the higher layers of the network. In this way, processing resources are managed and costs are reduced. In the proposed topical crawling method, instead of using only one link extraction method, the scores of a set of link extraction methods is used to increase the efficiency, which leads to the targeted use of bandwidth. The results of the experiments show the efficiency of the proposed methods in comparison with the stage of the art results. The cost-sensitive approach presented in this article, in addition to web content surveillance, can be used for command and control of other real-world problems.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 127

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2020
  • Volume: 

    4
  • Issue: 

    2
  • Pages: 

    63-83
Measures: 
  • Citations: 

    0
  • Views: 

    215
  • Downloads: 

    0
Abstract: 

Changes in consumption load in power networks are inevitable with the increasing population and the growth of industrial societies, and it is necessary to forecast the required load of networks. The forecasting of the hourly load in the medium term can be a good measure for evaluating load and energy. This process will also be a good example for short-term forecasting. In this paper, a new method is presented for hourly load forecasting in the short and medium-term load using rough neural networks and the grasshopper mutation algorithm. An improved rough neural network is also presented. Rough neural networks are a type of neural structures designed based on rough neurons. A rough neuron is a pair of neurons that are conventional to upper and lower boundary neurons, similar to multilayer neural perceptron networks. The rough neural network can be trained using a descending-based gradient error post-propagation algorithm. However, this algorithm has certain problems such as being trapped in local minima, a shortcoming which has been overcome in this paper with the help of the grasshopper jump algorithm. The Dobie power global network is proposed to apply the rough neural network and its combination with the grasshopper mutation algorithm to simulate the proposed method in daily load forecasting, and the results indicate the success of the proposed methods.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 215

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2020
  • Volume: 

    4
  • Issue: 

    2
  • Pages: 

    84-101
Measures: 
  • Citations: 

    0
  • Views: 

    122
  • Downloads: 

    0
Abstract: 

In a process of producing electronic components, the components are never exactly the same. This causes the output signal from radio transmitters (even similar ones) to be different. The differences are negligible, so it does not violate telecommunications standards. But these inherent and unique differences can be considered as physical layer features and used to authenticate radio transmitters. Normally, authentications based on software can be forged. Forgery based on the inherent characteristics of radios is very difficult or impossible. Because it requires a lot of knowledge, money, and time. The power amplifier is the last part of the transmitter. So it has the most effect on the transmitter output signal. In previous researches, the receiver assuming to have the SNR value of the received signal, used the coefficients of the power amplifier nonlinear model to classify the transmitters. In this paper, a new feature is provided to perform authentication operations independently of the SNR value of the received signal. The simulation results show that using the proposed new feature, the radio transmitter authentication process from low SNR values (at least 15dB) to high ones, without the need for SNR measurement, is performed well with a likelihood of more than 80% success.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 122

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

C4I JOURNAL

Issue Info: 
  • Year: 

    2020
  • Volume: 

    4
  • Issue: 

    2
  • Pages: 

    102-131
Measures: 
  • Citations: 

    0
  • Views: 

    395
  • Downloads: 

    0
Abstract: 

This article is based on a research project "Investigating the Defense (Land-to-Air and Radar System) Performance in the Years of Holy Defense and Comparing It with Iraqi Air Defense and Lessons Learned to Improve the Organizationchr('39')s Combat Capacity. " The above research project is based on the documentation available at the Army, Corps, Air Defense Headquarters, and using oral history and participation and interviews with air defense commanders in the years of holy defense. The qualitative method was used in the writing of this article, which was produced by the authors at Khatam al-Anbia Air Defense Base (AJA). Interviewing aviation veterans, using translated foreign books and sources, using handwritten notes and notes by air defense commanders and combatants to fill in the gaps and respond to ambiguities in the documents. This article examines the performance of the Islamic Republic of Iran Air Defense in the Air and Radar Sections during the years of Holy Defense, the performance of the Iraqi Air Force and the Iraqi Air Defense. Iran Air Defense Command and Control Network during the war with Iraq and initiatives undertaken by Air Defense in particular Martyr Major General Mansour Sattari, the role of air defense in some major operations and the role of air defense in the war of cities and. . ., Iraqi air defense performance In the field of radar, land and air, etc., are some of the issues discussed in this article. Also in this paper, the evolution of Iranchr('39')s air defense center of gravity from air defense to ground air defense was investigated. At the end of the paper, researcherschr('39') suggestions for improving the organizationchr('39')s combat capability as well as continuing the research path are presented by other researchers. The main issue in this article was: "What are the lessons learned from the Air Defense Command and Control (GAF) operation in Holy Defense Operations? » The variables considered in this project are: Independent Variable (Macro): Air Force Command and Air Defense Control Lessons Learned Independent variable (component): Earth-to-air systems Independent Variable (component): Radar systems Function variable: Holy Defense operations.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 395

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button