17,786 research outputs found

    Complex Adaptive Systems of Systems: A Grounded Theory Approach

    Get PDF
    The article of record as published may be found at http://groundedtheoryreview.com/wp-content/uploads/2019/01/06-Johnson-Complex-GTR_Dec_2018.pdfThis paper details the classic grounded theory approach used in a research project to develop a conceptual theory for an engineering solution to address highly complex problems. Highly complex problem domains exist and are on the rise as we enter an Age of Interactions and Complexity. Our current world has been characterized by the plethora and ubiquity of information and global interconnections that link events and decisions to outcomes and effects that are often unpredictable and result in severe unforeseen and unintended consequences. Technological advances such as computers, the internet, Big Data, social media, artificial intelligence, and communication networks have expanded complex problem spaces. However, these same technologies present an opportunity to engineer a complex adaptive system of systems solution to address these challenging problems. This research project embarked on a classic grounded theory approach to study a number of knowledge domains and engineering processes, allowing a conceptual theory to emerge that offers an engineering solution to address highly complex problems. The project resulted in the emergence of a theory for a new class of engineered CASoS solutions. This paper details the classic grounded theory approach taken to conduct the research

    Artificial Intelligence — An Enabler of Naval Tactical Decision Superiority

    Get PDF
    The article of record as published may be located at https://doi.org/10.1609/aimag.v40i1.2852Artificial intelligence, as a capability enhancer, offers significant improve- ments to our tactical warfighting advantage. AI provides methods for fus- ing and analyzing data to enhance our knowledge of the tactical environment; it provides methods for generating and assessing decision options from multidi- mensional, complex situations; and it provides predictive analytics to identify and examine the effects of tactical courses of action. Machine learning can improve these processes in an evolution- ary manner. Advanced computing tech- niques can handle highly heterogeneous and vast datasets and can synchronize knowledge across distributed warfare assets. This article presents concepts for applying AI to various aspects of tacti- cal battle management and discusses their potential improvements to future warfare

    Integrating XML and RDF Concepts to Achieve Automation Within a Tactical Knowledge Management Environment

    Full text link

    Implication of FORCEnet on coalition forces

    Get PDF
    The coalition navies of Australia, Canada, New Zealand, United Kingdom and the United States (AUSCANNZUKUS) are in a period of transformation. They are stepping out of the Industrial Age of warfare and into the Informational Age of warfare. Network Centric Warfare (NCW) is the emerging theory to accomplish this undertaking. NCW describes "the combination of strategies, emerging tactics, techniques, and procedures, and organizations that a fully or even partially networked force can employ to create a decisive war fighting advantage." 1 This theory is turned into a concept through Network Centric Operations (NCO) and implemented through the FORCEnet operational construct and architectural framework. The coalition navies are moving in a direction to develop and leverage information more effectively and efficiently. This will lead to an informational advantage that can be used as a combat multiplier to shape and control the environment, so as to dissuade, deter, and decisively defeat any enemy. This analysis was comprised of defining three TTCP AG-6 provided vignettes into ARENA model that captured Coalition ESG configurations at various FORCEnet levels. The results of the analysis demonstrated that enhanced FORCEnet capabilities such as FORCEnet Levels 2 and 4 would satisfy the capability gap for a needed network-centric ESG force that can effectively counter insurgency operations in Maritime warfare. Furthermore, the participating allied navies in the Coalition ESG should pursue acquisition strategies to upgrade their ship platforms in accordance with our recommendation which indicates that FORCEnet Level 2 is the best value.http://archive.org/details/implicationoffor109456926N

    Ethical Control of Unmanned Systems: lifesaving/lethal scenarios for naval operations

    Get PDF
    Prepared for: Raytheon Missiles & Defense under NCRADA-NPS-19-0227This research in Ethical Control of Unmanned Systems applies precepts of Network Optional Warfare (NOW) to develop a three-step Mission Execution Ontology (MEO) methodology for validating, simulating, and implementing mission orders for unmanned systems. First, mission orders are represented in ontologies that are understandable by humans and readable by machines. Next, the MEO is validated and tested for logical coherence using Semantic Web standards. The validated MEO is refined for implementation in simulation and visualization. This process is iterated until the MEO is ready for implementation. This methodology is applied to four Naval scenarios in order of increasing challenges that the operational environment and the adversary impose on the Human-Machine Team. The extent of challenge to Ethical Control in the scenarios is used to refine the MEO for the unmanned system. The research also considers Data-Centric Security and blockchain distributed ledger as enabling technologies for Ethical Control. Data-Centric Security is a combination of structured messaging, efficient compression, digital signature, and document encryption, in correct order, for round-trip messaging. Blockchain distributed ledger has potential to further add integrity measures for aggregated message sets, confirming receipt/response/sequencing without undetected message loss. When implemented, these technologies together form the end-to-end data security that ensures mutual trust and command authority in real-world operational environments—despite the potential presence of interfering network conditions, intermittent gaps, or potential opponent intercept. A coherent Ethical Control approach to command and control of unmanned systems is thus feasible. Therefore, this research concludes that maintaining human control of unmanned systems at long ranges of time-duration and distance, in denied, degraded, and deceptive environments, is possible through well-defined mission orders and data security technologies. Finally, as the human role remains essential in Ethical Control of unmanned systems, this research recommends the development of an unmanned system qualification process for Naval operations, as well as additional research prioritized based on urgency and impact.Raytheon Missiles & DefenseRaytheon Missiles & Defense (RMD).Approved for public release; distribution is unlimited

    Some Observations Along the Road to “National Information Power”

    Get PDF
    This thesis consist of the following three papers. Convex hull of face vectors of colored complexes. In this paper we verify a conjecture by Kozlov (Discrete ComputGeom18(1997) 421–431), which describes the convex hull of theset of face vectors ofr-colorable complexes onnvertices. As partof the proof we derive a generalization of Turán’s graph theorem. Cellular structure for the Herzog–Takayama Resolution. Herzog and Takayama constructed explicit resolution for the ide-als in the class of so called ideals with a regular linear quotient.This class contains all matroidal and stable ideals. The resolu-tions of matroidal and stable ideals are known to be cellular. Inthis note we show that the Herzog–Takayama resolution is alsocellular. Clique Vectors ofk-Connected Chordal Graphs. The clique vectorc(G)of a graphGis the sequence(c1,c2,...,cd)inNd, whereciis the number of cliques inGwithivertices anddis the largest cardinality of a clique inG. In this note, we usetools from commutative algebra to characterize all possible cliquevectors ofk-connected chordal graphs.QC 20140513</p

    Putting Teeth into Open Architectures: Infrastructure for Reducing the Need for Retesting

    Get PDF
    Proceedings Paper (for Acquisition Research Program)The Navy is currently implementing the open-architecture framework for developing joint interoperable systems that adapt and exploit open-system design principles and architectures. This raises concerns about how to practically achieve dependability in software-intensive systems with many possible configurations when: 1) the actual configuration of the system is subject to frequent and possibly rapid change, and 2) the environment of typical reusable subsystems is variable and unpredictable. Our preliminary investigations indicate that current methods for achieving dependability in open architectures are insufficient. Conventional methods for testing are suited for stovepipe systems and depend strongly on the assumptions that the environment of a typical system is fixed and known in detail to the quality-assurance team at test and evaluation time. This paper outlines new approaches to quality assurance and testing that are better suited for providing affordable reliability in open architectures, and explains some of the additional technical features that an Open Architecture must have in order to become a Dependable Open Architecture.Naval Postgraduate School Acquisition Research ProgramApproved for public release; distribution is unlimited
    • …
    corecore