The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e...The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.展开更多
Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new...Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new HSR dispatching command system that integrates the widely used CTC in China with the practical service requirements of intelligent dispatching.This paper aims to propose key technologies and applications for intelligent dispatching command in HSR in China.Design/methodology/approach–This paper first briefly introduces the functions and configuration of the intelligent CTC system.Some new servers,terminals and interfaces are introduced,which are plan adjustment server/terminal,interface for automatic train operation(ATO),interface for Dynamic Monitoring System of Train Control Equipment(DMS),interface for Power Supervisory Control and Data Acquisition(PSCADA),interface for Disaster Monitoring,etc.Findings–The key technologies applied in the intelligent CTC system include automatic adjustment of train operation plans,safety control of train routes and commands,traffic information data platform,integrated simulation of traffic dispatching and ATO function.These technologies have been applied in the Beijing-Zhangjiakou HSR,which commenced operations at the end of 2019.Implementing these key intelligent functions has improved the train dispatching command capacity,ensured the safe operation of intelligent HSR,reduced the labor intensity of dispatching operators and enhanced the intelligence level of China’s dispatching system.Originality/value–This paper provides further challenges and research directions for the intelligent dispatching command of HSR.To achieve the objectives,new measures need to be conducted,including the development of advanced technologies for intelligent dispatching command,coping with new requirements with the development of China’s railway signaling system,the integration of traffic dispatching and train control and the application of AI and data-driven modeling and methods.展开更多
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor...Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.展开更多
The spectral analysis of simulated N-team of interacting decision makers with bounded rationality constraints of Oladejo, which assumes triangular probability density function of command inputs is hereby restructured ...The spectral analysis of simulated N-team of interacting decision makers with bounded rationality constraints of Oladejo, which assumes triangular probability density function of command inputs is hereby restructured and analysed, to have hierarchical command inputs that are predicated on order statistics distributions. The results give optimal distributions.展开更多
This study aims to analyze the influence of Human Resource Competence,Regulation,Information Technology,Reconciliation,and Internal Control System on Asset Management in Local Government Work Unit(abbreviated SKPD)of ...This study aims to analyze the influence of Human Resource Competence,Regulation,Information Technology,Reconciliation,and Internal Control System on Asset Management in Local Government Work Unit(abbreviated SKPD)of Central Java Provincial Government.This research is conducted because there is still record in the Final Report of Inspection by the Republic of Indonesia Audit Board(abbreviated BPK)concerning problem of asset management conducted by some SKPDs of Central Java Provincial Government,although in general the Local Government Financial Report of Central Java Province has got opinion“Reasonable Without Exception”.The data source of this research is primary data collected through interview method on asset management officers at the 48 SKPD in Central Java Provincial Government.Data analysis method used in this research is multiple regression analysis.This research finds that the Human Resource Competence,the Regulation,the Information Technology,the Reconciliation,and the Internal Control System have positive and significant effect on the Asset Management at the Local Government Work Unit of Central Java Provincial Government at level of significance 0.05.Ability to explain of the independent variables to the Asset Management variable is equal to 67.7%.展开更多
基金supported by the Natural Science Foundation Research Plan of Shanxi Province (2023JCQN0728)。
文摘The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
基金This work was supported in part by the National Natural Science Foundation of China under Grant 62203468Young Elite Scientist Sponsorship Program by CAST under Grant 2022QNRC001+1 种基金Foundation of China State Railway Group Co.,Ltd.under Grant K2021X001Foundation of China Academy of Railway Sciences Corporation Limited under Grant 2021YJ315.
文摘Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new HSR dispatching command system that integrates the widely used CTC in China with the practical service requirements of intelligent dispatching.This paper aims to propose key technologies and applications for intelligent dispatching command in HSR in China.Design/methodology/approach–This paper first briefly introduces the functions and configuration of the intelligent CTC system.Some new servers,terminals and interfaces are introduced,which are plan adjustment server/terminal,interface for automatic train operation(ATO),interface for Dynamic Monitoring System of Train Control Equipment(DMS),interface for Power Supervisory Control and Data Acquisition(PSCADA),interface for Disaster Monitoring,etc.Findings–The key technologies applied in the intelligent CTC system include automatic adjustment of train operation plans,safety control of train routes and commands,traffic information data platform,integrated simulation of traffic dispatching and ATO function.These technologies have been applied in the Beijing-Zhangjiakou HSR,which commenced operations at the end of 2019.Implementing these key intelligent functions has improved the train dispatching command capacity,ensured the safe operation of intelligent HSR,reduced the labor intensity of dispatching operators and enhanced the intelligence level of China’s dispatching system.Originality/value–This paper provides further challenges and research directions for the intelligent dispatching command of HSR.To achieve the objectives,new measures need to be conducted,including the development of advanced technologies for intelligent dispatching command,coping with new requirements with the development of China’s railway signaling system,the integration of traffic dispatching and train control and the application of AI and data-driven modeling and methods.
文摘Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.
文摘The spectral analysis of simulated N-team of interacting decision makers with bounded rationality constraints of Oladejo, which assumes triangular probability density function of command inputs is hereby restructured and analysed, to have hierarchical command inputs that are predicated on order statistics distributions. The results give optimal distributions.
文摘This study aims to analyze the influence of Human Resource Competence,Regulation,Information Technology,Reconciliation,and Internal Control System on Asset Management in Local Government Work Unit(abbreviated SKPD)of Central Java Provincial Government.This research is conducted because there is still record in the Final Report of Inspection by the Republic of Indonesia Audit Board(abbreviated BPK)concerning problem of asset management conducted by some SKPDs of Central Java Provincial Government,although in general the Local Government Financial Report of Central Java Province has got opinion“Reasonable Without Exception”.The data source of this research is primary data collected through interview method on asset management officers at the 48 SKPD in Central Java Provincial Government.Data analysis method used in this research is multiple regression analysis.This research finds that the Human Resource Competence,the Regulation,the Information Technology,the Reconciliation,and the Internal Control System have positive and significant effect on the Asset Management at the Local Government Work Unit of Central Java Provincial Government at level of significance 0.05.Ability to explain of the independent variables to the Asset Management variable is equal to 67.7%.