452 research outputs found

    The Arctic Regional Communications Small SATellite (ARCSAT)

    Get PDF
    Traditional satellite missions are extremely complex and expensive to design, build, test, launch and operate. Consequently many complementary operational, exploration and research satellite missions are being formulated as a growing part of the future space community capabilities using formations of small, distributed, simple to launch and inexpensive highly capable small scale satellites. The Arctic Regional Communications small SATellite (ARCSAT) initiative would launch a Mini-Satellite "Mothership" into Polar or Sun Sync low-earth-orbit (LEO). Once on orbit, the Mothership would perform orbital insertion of four internally stored independently maneuverable nanosatellites, each containing electronically steerable antennas and reconfigurable software-defined radios. Unlike the traditional geostationary larger complex satellite communication systems, this LEO communications system will be comprised of initially a five small satellite formation that can be later incrementally increased in the total number of satellites for additional data coverage. ARCSAT will provide significant enabling capabilities in the Arctic for autonomous voice and data communications relay, Maritime Domain Awareness (MDA), data-extraction from unattended sensors, and terrestrial Search & Rescue (SAR) beacon detection missions throughout the "data starved desert" of the Arctic Region

    Enhanced cyberspace defense with real-time distributed systems using covert channel publish-subscribe broker pattern communications

    Get PDF
    In this thesis, we propose a novel cyberspace defense solution to the growing sophistication of threats facing networks within the Department of Defense. Current network defense strategies, including traditional intrusion detection and firewall-based perimeter defenses, are ineffective against increasingly sophisticated social engineering attacks such as spear-phishing which exploit individuals with targeted information. These asymmetric attacks are able to bypass current network defense technologies allowing adversaries extended and often unrestricted access to portions of the enterprise. Network defense strategies are hampered by solutions favoring network-centric designs which disregard the security requirements of the specific data and information on the networks. Our solution leverages specific technology characteristics from traditional network defense systems and real-time distributed systems using publish-subscribe broker patterns to form the foundation of a full-spectrum cyber operations capability. Building on this foundation, we present the addition of covert channel communications within the distributed systems framework to protect sensitive Command and Control and Battle Management messaging from adversary intercept and exploitation. Through this combined approach, DoD and Service network defense professionals will be able to meet sophisticated cyberspace threats head-on while simultaneously protecting the data and information critical to warfighting Commands, Services and Agencies.http://archive.org/details/enhancedcyberspa109454049US Air Force (USAF) author.Approved for public release; distribution is unlimited

    Context-based Information Fusion: A survey and discussion

    Get PDF
    This survey aims to provide a comprehensive status of recent and current research on context-based Information Fusion (IF) systems, tracing back the roots of the original thinking behind the development of the concept of \u201ccontext\u201d. It shows how its fortune in the distributed computing world eventually permeated in the world of IF, discussing the current strategies and techniques, and hinting possible future trends. IF processes can represent context at different levels (structural and physical constraints of the scenario, a priori known operational rules between entities and environment, dynamic relationships modelled to interpret the system output, etc.). In addition to the survey, several novel context exploitation dynamics and architectural aspects peculiar to the fusion domain are presented and discussed

    Unmanned Systems Sentinel / 3 June 2016

    Get PDF
    Approved for public release; distribution is unlimited

    Research Naval Postgraduate School, v.12, no.3, October 2002

    Get PDF
    NPS Research is published by the Research and Sponsored Programs, Office of the Vice President and Dean of Research, in accordance with NAVSOP-35. Views and opinions expressed are not necessarily those of the Department of the Navy.Approved for public release; distribution is unlimited

    Marine Robots for Underwater Surveillance

    Get PDF
    Abstract Purpose of Review The paper reviews the role of marine robots, in particular unmanned vehicles, in underwater surveillance, i.e. the control and monitoring of an area of competence aimed at identifying potential threats in support of homeland defence, antiterrorism, force protection and Explosive Ordnance Disposal (EOD). Recent Findings The paper explores separately robotic missions for identification and classification of threats lying on the seabed (e.g. EOD) and anti-intrusion robotic systems. The current main scientific challenge is identified in terms of enhancing autonomy and team/swarm mission capabilities by improving interoperability among robotic vehicles and providing communication networking capabilities, a non-trivial task, giving the severe limitations in bandwidth and latency of acoustic underwater messaging. Summary The work is intended to be a critical guide to the recent prolific bibliography on the topic, providing pointers to the main recent advancements in the field, and to give also a set of references in terms of mission and stakeholders' requirements (port authorities, coastal guards, navies)

    Fuzzy Human Reliability Analysis: Applications and Contributions Review

    Get PDF
    The applications and contributions of fuzzy set theory to human reliability analysis (HRA) are reassessed. The main contribution of fuzzy mathematics relies on its ability to represent vague information. Many HRA authors have made contributions developing new models, introducing fuzzy quantification methodologies. Conversely, others have drawn on fuzzy techniques or methodologies for quantifying already existing models. Fuzzy contributions improve HRA in five main aspects: (1) uncertainty treatment, (2) expert judgment data treatment, (3) fuzzy fault trees, (4) performance shaping factors, and (5) human behaviour model. Finally, recent fuzzy applications and new trends in fuzzy HRA are herein discussed

    The cloud-to-edge-to-IoT continuum as an enabler for search and rescue operations

    Get PDF
    When a natural or human disaster occurs, time is critical and often of vital importance. Data from the incident area containing the information to guide search and rescue (SAR) operations and improve intervention effectiveness should be collected as quickly as possible and with the highest accuracy possible. Nowadays, rescuers are assisted by different robots able to fly, climb or crawl, and with different sensors and wireless communication means. However, the heterogeneity of devices and data together with the strong low-delay requirements cause these technologies not yet to be used at their highest potential. Cloud and Edge technologies have shown the capability to offer support to the Internet of Things (IoT), complementing it with additional resources and functionalities. Nonetheless, building a continuum from the IoT to the edge and to the cloud is still an open challenge. SAR operations would benefit strongly from such a continuum. Distributed applications and advanced resource orchestration solutions over the continuum in combination with proper software stacks reaching out to the edge of the network may enhance the response time and effective intervention for SAR operation. The challenges for SAR operations, the technologies, and solutions for the cloud-to-edge-to-IoT continuum will be discussed in this paper
    • …
    corecore