Junxian Liu

Junxian Liu
Key Laboratory of Information System Engineering · National University of Defense Technology, PRC

PhD

About

27
Publications
1,896
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
51
Citations

Publications

Publications (27)
Chapter
With the progress of science and technology and the change of combat environment, the single combat mode is no longer suitable for the present, and multi domain combat has gradually become the mainstream. However, compared with the effectiveness analysis of single domain operation, the effectiveness research of multi domain operation has just begun...
Chapter
In order to solve the problem of information sharing capability assessment of multi-domain battle command system, this paper studies the relevant theories of information quality, and proposes a multi-domain command system information sharing capability assessment method based on information exchange model. The method fully combines the command and...
Chapter
The current battlefield environment is no longer a single key operational area. In order to evaluate the requirement satisfaction of the existing equipment system of systems (SoS) in complex multi-domain operations (MDO), starting with the critical operational issues and considering the actual operational requirements, the operational task model re...
Article
The complexity of business and information systems (IS) alignment is a growing concern for researchers and practitioners alike. The extant research on alignment architecture fails to consider the human viewpoint, which makes it difficult to embrace emergent complexity. This paper contributes to the extant literature in the following ways. First, we...
Article
Full-text available
As one of the products in the US Department of Defense Architecture Framework version 2.0 (DoDAF 2.0), the Operational Activity to Services Traceability Matrix product (SvcV-5) links the operational viewpoint (OV) and service viewpoint (SvcV). SvcV-5 is an essential product for optimizing the design of other service view products; thus, it is neces...
Chapter
As the foundation and basis for developing architecture products and data, designing operational activities and processes is the key in architecture design. Current research lacks the optimization design method about them. To solve this problem. Firstly, this paper analyzed the data meta-models related to operational activities, proposed the proces...
Article
The issue of business and IT alignment (BITA) persists a top concern of researchers and practitioners alike. BITA has not been achieved yet due to dynamic changes in environments and organizations. This paper argues that the misalignment analysis of business and IT, which involves continuously misalignment detection, correction, and prevention, is...
Conference Paper
SIP (Session Initiation Protocol) is developed by IETF for creating and managing sessions such as Internet calls. The exchange of SIP messages is controlled by two types of transactions: INVITE transaction for session setup; non-INVITE transaction (NIT) for other purposes, e.g. canceling a session. NIT was identified to have a race condition under...
Article
Warfare of the information era is heading from platform-centered to network-centric, and the traditional command and control models are "Chimney" structure, which are incapable to meet the flexibility required in military actions of the 21st century [1-3]. The proposed networked C2 structure, which is composed of a C2 capacity array and a task arra...
Conference Paper
Synthesis integration of C4ISR system is being well studied in the field of military operational research. As current methodologies for integrating C4ISR system mostly focus on application integration and physical integration, while researches on business architecture integration mostly ignore important features of C4ISR system, e.g., Command and C...
Conference Paper
Complexity Cybernetics relating to Enterprise Architecture (EA) is a hot topic recently. Although many researchers, organizations made much progress in the past years, common understanding in this domain is still limited. In this paper, a systematic literature analysis on complexity cybernetics in relation to EA was presented, in order to chart a l...
Article
With the development of Service-oriented Architecture (SOA) architecture and Web Service technology, many countries and organizations consider service to be a necessary component of in developing architecture. Several problems have been discovered, including conceptual, ideological and design method concerns, when analyzing the SOA idea in DoD Arch...
Article
C4ISR system is a military information system with the function of command and control (C2), intelligence, surveillance, communication, etc. Business Process Management (BPR) becomes an important research content with the increasingly complex and huge business process in C4ISR system. In order to better manage business process, this survey aims to...
Chapter
Full-text available
With the increasing popularity of Voice over IP, the Session Initiation Protocol (SIP), a protocol for session creation and management, has become more and more important. This paper is focused on SIP non-INVITE transaction (NIT) and analyzes its functional correctness and performance. We firstly propose an extension to a Coloured Petri Net (CPN) b...
Conference Paper
The measurement of structure risk aims to analysis and evaluate the not occurred, potential, and the objectively exist risk in system structure. It is an essential way to validate system function and system quality. This paper proposes the risk metric model and algorithm based on information flow and analysis risk trend between traditional tree str...
Article
Möbius cube and deBruijn digraph have been proved to be two of the most popular interconnection architectures, due to their desirable properties. Some of the attractive properties of one, however, are not found in the other. The Möbius–deBruijn architecture, proposed in this paper, is the product of Möbius cube and deBruijn digraph, which is a comb...
Conference Paper
There is a growing need for enabling reprogramming in a working sensor network. We prefer to meet the requirements remotely instead of collecting all deployed sensors. Identifying the version difference of data items, having the same key, could significantly reduce the communication overhead, because only those out-of-date items should be updated a...
Chapter
The ICACTE 2009 was organized to gather members of the international community of Computer Theory and Engineering scientists so that researchers from around the world could present their leading-edge work, expanding our community's knowledge and insight into the significant challenges currently being addressed in that research.
Conference Paper
Architecture is defined as the structure of components, their relationships, and the principles and guidelines governing their design and evolution over time. Consistency checking is one important work in C<sup>4</sup>ISR system architecture designing. At present, there is a little of the research on the consistency checking of C<sup>4</sup>ISR arc...

Network

Cited By