Go to content Go to navigation Go to search

Special Using of Knowledge Systems

Jaromir HOSEK, Vaclav KRIVANEK

Abstract


This article deals with special using of the knowledge systems as leader or very important assistant for solving of problems during extreme situations. The knowledge system is not only system with much information, but we can use it like active system that takes over part of mechanical activities during solving of extreme problems.

Keywords


Knowledge system, expert system, solving problem.
Full paper

2012-12-31 09:59

Air Base Simulation Technology Focusing on Flow Capacity Solutions

Miloslav BAUER

Abstract


Air Traffic Flow Management is fundamental subject to be solved within next several years by using a modern approach. The capacity of the airspace as well as workload of Air Traffic Controllers, are fundamental pillars of present Air traffic. To develop the possible solution how to deal with both environment mentioned above the aviation community is focusing more and more on the Information technology. As good results of experimentation, research by means of CASS (Connective Autonomous Surveillance System), inside Air Force department of University of Defence should be mentioned. By using this simulation tool we are able to present new ideas how to solve capacity of any military Air base. The main outcome of this article is proposal of the simulation tool by means of which users are able to check or solve specific area capacity for the traffic flow.

Keywords


Air traffic capacity, workload, airbase, information technology.
Full paper

2012-12-31 08:20

Cyber Attack Targets

Petr HRUZA, Kamil HALOUZKA

Abstract


The aim of this article “Cyber Attack targets” is to analyse cyber-attacks in the way of risks concerned information technologies and network. Nowadays we have a possibility to use IT and network for our own utilization and of course we make use of that, but unfortunately we have to face to attackers who want to use information which are not dedicated to them. These attackers are called cyber attackers. What kinds of targets are attackers interested in, what cyber-attack is and how we can secure our assets? These are questions that this article tries to find.

Keywords


Cyber Attack, Cyber Security, Scenario and Target of Cyber Attack.
Full paper

2012-10-26 08:18

Transfer of the project MENTAL research results into practice and their further extension

Ladislav BURITA

Abstract


The article is based on the outcomes of the project MENTAL which was put into practice in the defence sector of the Czech Republic. It has been implemented into the Staff Information System of the Czech Army and followed by a search for other suitable application areas for the knowledge systems based on the theory of Topic Maps. The choice fell on the issues of Lessons Learned from military missions abroad, as shown hereinafter. The paper presents the results of documents analysis related to ontology design and creation (classes and their attributes, relationships between classes and occurrence of classes). The article further presents the decomposition of documents into parts in ATOM2 software environment and indicates additional steps to creating a knowledge base.

Keywords


Knowledge system, MENTAL, implementation, ACR, Lessons Learned.
Full paper

2012-10-26 08:14

MVC Framework Utilization in Development of Web Application

Vojtech ONDRYHAL

Abstract


The System for Scientific Information Division is a Web Based Client-Server application build mostly on top of non-commercial components with students’ participation. The development is based on iterative approach with Unified Modeling Language (UML) support.
The paper provides a case study implementation of MVC (Model-View-Controller) framework in real project. The paper discusses in detail MVC framework implementation, the approach utilized for controller, model and view implementation on the webserver. At the end of the paper the advantage of MVC framework utilization is described together with Use Case realization.

Keywords


MVC, Software architecture, Web application, AJAX.
Full paper

2012-10-26 08:07

The need of knowledge management for the security management

Oldrich LUNACEK

Abstract


The aim of this article is to perform an analysis of the information resources in support of activities of security management. The current situation is marked by information overload, which can cause confusion. It is imperative to identify information sources and then sort. Aspects for sorting sources may be different and therefore it is proper to compare them and select the one that most affects the solved area. Persons holding management roles in the security they need to support their decisions adequate information support.

Keywords


Information, Protection, Security, Support, Secrecy.
Full paper

2012-10-26 08:04

Knowledge system for Lessons Learned documents analysis

Vlastimil MALY

Abstract


The paper deals with the knowledge system development and processing aimed to the particular area of the Lessons Learned. Lessons Learned is a process which is managed by the military community to be able to adapt rapidly its tactics and equipment to the opponents and to correct the identified shortfalls. In most armies there are special departments collecting critical information and data as an experience from military missions and tasks performed.
In the introductory part of the paper we deal with knowledge system principles. We show briefly main terms, as information and context, dictionary, thesaurus, metadata, taxonomy development and ontology development.
Information support for Lessons Learned process is a typical task of unstructured content analysis and processing. Our aim is to introduce some new tools, new methods, new processes and new strategies that enabled us to think, for the first time, very differently about knowledge in the Lessons Learned area. A key question will be how to design a better “business cycle” (i.e. in terms of anticipation of changes by the S&T and military communities) than that of our opponents (enemies). We use during our solution knowledge system technology developed during Research Project “Mental”, finished recently at our university.

Keywords


Lessons Learned, NEC, Information Management, Document Analysis, Information Sharing, Ontology, Taxonomy, AtoM, MENTAL.

Full paper

2012-10-26 08:02

Knowledge Management System based on NATO Military Universities’ cooperation for educational and research support

Ladislav BURITA, Nicolas BROCHETON, Kevin BRUGET, Mathieu FERNANDES LOPES

Abstract


The paper describes the creation of the Knowledge Management System (KMS) about military universities in NATO countries. The goal of the system is to support the cooperation among universities in education, research, and staff and students exchange. The system is based on Topic Maps theory by using the AToM software developed by AION CS. Special attention is given to the ontology design and application processing when using the KMS. Applied components are specified, as well as the architecture of the KMS. Some examples of the outcome application are presented.

Keywords


Knowledge management system, military university, cooperation, ontology, Topic Maps, AION, AToM.

Full paper

2012-10-26 07:57