10,334 research outputs found

    EYECOM: an innovative approach for computer interaction

    Get PDF
    The world is innovating rapidly, and there is a need for continuous interaction with the technology. Sadly, there do not exist promising options for paralyzed people to interact with the machines i.e., laptops, smartphones, and tabs. A few commercial solutions such as Google Glasses are costly and cannot be afforded by every paralyzed person for such interaction. Towards this end, the thesis proposes a retina-controlled device called EYECOM. The proposed device is constructed from off-the-shelf cost-effective yet robust IoT devices (i.e., Arduino microcontrollers, Xbee wireless sensors, IR diodes, and accelerometer). The device can easily be mounted on to the glasses; the paralyzed person using this device can interact with the machine using simple head movement and eye blinks. The IR detector is located in front of the eye to illuminate the eye region. As a result of illumination, the eye reflects IR light which includes electrical signals and as the eyelids close, the reflected light over eye surface is disrupted, and such change in reflected value is recorded. Further to enable cursor movement onto the computer screen for the paralyzed person a device named accelerometer is used. The accelerometer is a small device, with the size of phalanges, a human thumb bone. The device operates on the principle of axis-based motion sensing and it can be worn as a ring by a paralyzed person. A microcontroller processes the inputs from the IR sensors, accelerometer and transmits them wirelessly via Xbee wireless sensor (i.e., a radio) to another microcontroller attached to the computer. With the help of a proposed algorithm, the microcontroller attached to the computer, on receiving the signals moves cursor onto the computer screen and facilitate performing actions, as simple as opening a document to operating a word-to-speech software. EYECOM has features which can help paralyzed persons to continue their contributions towards the technological world and become an active part of the society. Resultantly, they will be able to perform number of tasks without depending upon others from as simple as reading a newspaper on the computer to activate word-to-voice software

    ENHANCING MARITIME DOMAIN AWARENESS (MDA) THROUGH THE DEPLOYMENT OF INTELLIGENT AUTONOMOUS SYSTEMS (IAS) USING COMMERCIAL 5G TECHNOLOGY

    Get PDF
    The United States Navy has been the dominate force of the sea in the last half century, but advancements in technology have given other nations the ability to narrow the gap and, in some cases, threaten U.S. superiority. The U.S. Navy, Marine Corps, and the Coast Guard are the triad forces for maritime domain protection. One area of potential vulnerability is in the littoral environment. However, emerging commercial technologies, like 5G, can expand the footprint of systems and capabilities within that environment for naval services to utilize. The private sector already has the lead in developing 5G state-of-the-art resources, which has enabled manned and unmanned systems to accomplish more tasks. One long-standing obstacle for the naval services to implement commercially available systems was the Department of Defense’s desire to be the owner and operator of any systems it employed. One benefit of utilizing existing commercial systems in naval operations would be to enhance capabilities without developing a completely new system. This thesis explores current and projected abilities of a commercial 5G technology for employment by U.S. naval services. Testing of 5G millimeter wave was conducted for this research. This thesis also examines a theorized new system that integrates commercial systems to satisfy naval requirements.Lieutenant Commander, United States NavyApproved for public release. Distribution is unlimited

    A SYSTEMS ANALYSIS OF ENERGY USAGE AND EFFECTIVENESS OF A COUNTER-UNMANNED AERIAL SYSTEM USING A CYBER-ATTACK APPROACH

    Get PDF
    Existing counter-unmanned aerial systems (C-UAS) rely heavily on radio frequency (RF) jamming techniques that require a large amount of energy. RF jamming results in undesirable consequences such as jamming nearby friendly devices as well as increasing RF footprint of local operators. Current cybersecurity analysis of commercial-off-the shelf (COTS) UASs have revealed vulnerabilities that can be used to conduct C-UAS operations in the cyber domain via cyber-attacks that hijack device-specific communication links on narrow RF bands. This thesis validates the cyber-attack C-UAS (CyC-UAS) concept through reviewing recent C-UAS operational experimental scenarios and conducting analysis on the collected data. Then, a model of a defense facility is constructed to analyze and validate specific mission scenarios and several proposed concepts of operation. A comparison of the energy requirements between CyC-UAS and existing C-UAS techniques is performed to assess energy efficiency and trade-offs of different C-UAS approaches. The comparison of energy requirements between the CyC-UAS prototype and existing C-UAS RF jamming products shows CyC-UAS has significant energy savings while not affecting other telecommunication devices operating at the same frequencies. CyC-UAS is able to achieve the same mission by consuming much less energy and shows promise as a new, lower energy, and lower collateral damage approach to defending against UASs.Outstanding ThesisMajor, Republic of Singapore Air ForceApproved for public release. Distribution is unlimited

    AN INTERNET OF THINGS–BASED APPROACH TO INNOVATE CANTEEN STORES DEPARTMENT’S RETAIL OPERATIONS

    Get PDF
    In a competitive business environment, retail organizations in the Western world are capitalizing on technological tools and solutions to enhance customer experience and boost sales. Specifically, retailers that adopt Internet of Things (IoT) technologies improve customer experience and achieve cost savings. Yet such innovation is rare outside the Western world. Hence, early adopters of IoT technologies in retail operations in Pakistan could gain a competitive advantage. This study aims to create a deeper understanding of how Pakistan-based Canteen Stores Department (CSD), a retail chain mainly serving service members and their families, can use IoT technologies to significantly modernize and improve its operations and distinguish itself from competitors. To do so, this study conducts a qualitative analysis of scholarly articles on the relevant technologies and on IoT-based products offered by commercial companies. The authors also include findings from discussions with CSD customers and management. The results of the study indicate CSD can use IoT technologies to optimize store layout, offer interactive in-store mapping, automate checkout systems, implement smart shelving and digital price tagging, improve in-store promotions, enhance customer relationship management, and modernize distribution, transportation, and warehousing. The study also offers CSD management guidance on how to implement IoT technologies into retail operations at one location as a pilot.Outstanding ThesisLieutenant Commander, Pakistan NavyWing Commander, Pakistan Air ForceLieutenant Colonel, Pakistan ArmyApproved for public release. Distribution is unlimited

    Cross Domain IW Threats to SOF Maritime Missions: Implications for U.S. SOF

    Get PDF
    As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable

    Coalitions of things: supporting ISR tasks via Internet of Things approaches

    Get PDF
    In the wake of rapid maturing of Internet of Things (IoT) approaches and technologies in the commercial sector, the IoT is increasingly seen as a key ‘disruptive’ technology in military environments. Future operational environments are expected to be characterized by a lower proportion of human participants and a higher proportion of autonomous and semi-autonomous devices. This view is reflected in both US ‘third offset’ and UK ‘information age’ thinking and is likely to have a profound effect on how multinational coalition operations are conducted in the future. Much of the initial consideration of IoT adoption in the military domain has rightly focused on security concerns, reflecting similar cautions in the early era of electronic commerce. As IoT approaches mature, this initial technical focus is likely to shift to considerations of interactivity and policy. In this paper, rather than considering the broader range of IoT applications in the military context, we focus on roles for IoT concepts and devices in future intelligence, surveillance and reconnaissance (ISR) tasks, drawing on experience in sensor-mission resourcing and human-computer collaboration (HCC) for ISR. We highlight the importance of low training overheads in the adoption of IoT approaches, and the need to balance proactivity and interactivity (push vs pull modes). As with sensing systems over the last decade, we emphasize that, to be valuable in ISR tasks, IoT devices will need a degree of mission-awareness in addition to an ability to self-manage their limited resources (power, memory, bandwidth, computation, etc). In coalition operations, the management and potential sharing of IoT devices and systems among partners (e.g., in cross-coalition tactical-edge ISR teams) becomes a key issue due heterogeneous factors such as language, policy, procedure and doctrine. Finally, we briefly outline a platform that we have developed in order to experiment with human-IoT teaming on ISR tasks, in both physical and virtual settings

    SERENITY: THE FUTURE OF COGNITIVE MODULATION FOR THE HYPER ENABLED OPERATOR

    Get PDF
    In the Special Operations community, cognitive enhancement and resilience is at the forefront of the 2035 Hyper Enabled Operator Program (HEO). The United States Special Operations Command’s vision is to combine cutting-edge communications and data capabilities into a next generation tactical system for the end user. Using algorithms and autonomous systems to enhance the ability to make rational decisions faster can ultimately determine life or death on the battlefield. Over the past several years, cognitive enhancement with the introduction of brain computer interface (BCI) technology has had major breakthroughs in the medical and science fields. This thesis looks to analyze BCI technology for future cognitive dominance and cognitive overmatch in the Hyper Enabled Operator. Machine-assisted cognitive enhancement is not beyond reach for special operations; throughout the research and after multiple interviews with subject matter experts, it has been concluded that interfaces using transcranial alternating current stimulation (tACS), median nerve stimulation (MNS), or several other exploratory procedures have been successful with enhancing cognition and reducing cognitive load. Special Operations should not shy away from transformational innovative technology or wait for commercial or lab-tested solutions. To start, Special Operations should foster avant-garde theories that provide solutions and evolve ideas into unsophisticated prototypes that can be fielded immediately.Major, United States ArmyApproved for public release. Distribution is unlimited
    • …
    corecore