164 research outputs found

    Cyber-Physical Systems Can Make Emergency Response Smart

    Get PDF
    This paper from the Humanitarian Technology: Science, Systems and Global Impact 2015 conference proceedings discusses the Smart Emergency Response System prototype built in the context of the SmartAmerica Challenge 2013-2014 by a team of nine organizations led by MathWorks

    Ethical Control of Unmanned Systems: lifesaving/lethal scenarios for naval operations

    Get PDF
    Prepared for: Raytheon Missiles & Defense under NCRADA-NPS-19-0227This research in Ethical Control of Unmanned Systems applies precepts of Network Optional Warfare (NOW) to develop a three-step Mission Execution Ontology (MEO) methodology for validating, simulating, and implementing mission orders for unmanned systems. First, mission orders are represented in ontologies that are understandable by humans and readable by machines. Next, the MEO is validated and tested for logical coherence using Semantic Web standards. The validated MEO is refined for implementation in simulation and visualization. This process is iterated until the MEO is ready for implementation. This methodology is applied to four Naval scenarios in order of increasing challenges that the operational environment and the adversary impose on the Human-Machine Team. The extent of challenge to Ethical Control in the scenarios is used to refine the MEO for the unmanned system. The research also considers Data-Centric Security and blockchain distributed ledger as enabling technologies for Ethical Control. Data-Centric Security is a combination of structured messaging, efficient compression, digital signature, and document encryption, in correct order, for round-trip messaging. Blockchain distributed ledger has potential to further add integrity measures for aggregated message sets, confirming receipt/response/sequencing without undetected message loss. When implemented, these technologies together form the end-to-end data security that ensures mutual trust and command authority in real-world operational environments—despite the potential presence of interfering network conditions, intermittent gaps, or potential opponent intercept. A coherent Ethical Control approach to command and control of unmanned systems is thus feasible. Therefore, this research concludes that maintaining human control of unmanned systems at long ranges of time-duration and distance, in denied, degraded, and deceptive environments, is possible through well-defined mission orders and data security technologies. Finally, as the human role remains essential in Ethical Control of unmanned systems, this research recommends the development of an unmanned system qualification process for Naval operations, as well as additional research prioritized based on urgency and impact.Raytheon Missiles & DefenseRaytheon Missiles & Defense (RMD).Approved for public release; distribution is unlimited

    Crossbow Volume 1

    Get PDF
    Student Integrated ProjectIncludes supplementary materialDistributing naval combat power into many small ships and unmanned air vehicles that capitalize on emerging technology offers a transformational way to think about naval combat in the littorals in the 2020 time frame. Project CROSSBOW is an engineered systems of systems that proposes to use such distributed forces to provide forward presence to gain and maiantain access, to provide sea control, and to project combat power in the littoral regions of the world. Project CROSSBOW is the result of a yearlong, campus-wide, integrated research systems engineering effort involving 40 student researchers and 15 supervising faculty members. This report (Volume I) summarizes the CROSSBOW project. It catalogs the major features of each of the components, and includes by reference a separate volume for each of the major systems (ships, aircraft, and logistics). It also prresents the results of the mission and campaign analysis that informed the trade-offs between these components. It describes certain functions of CROSSBOW in detail through specialized supporting studies. The student work presented here is technologically feasible, integrated and imaginative. The student project cannot by itself provide definitive designs or analyses covering such a broad topic. It does strongly suggest that the underlying concepts have merit and deserve further serious study by the Navy as it transforms itself

    Exploring the use of crowdsourced geographic information in defence: challenges and opportunities

    Get PDF
    Geographic data are used by United Kingdom (UK) defence for purposes including peacekeeping, humanitarian aid and disaster relief, and fighting wars. The geographic extent of defence data covers the world, with greater focus directed towards areas considered to be of current interest. Traditionally, these data have been officially sourced, e.g. via National Mapping Agencies, but there is now increasing interest in the potential of crowdsourced geographic data to supplement authoritative data where they are not available, outdated or incomplete. Volunteered geographic information (VGI) and social media have the potential to provide this needed missing information. This paper presents initial work carried out in identifying the potential of crowdsourced geographic information in defence. We first provide a short description of the role of UK defence and review the existing literature on crowdsourced geographic information in defence, as well as generic VGI quality assessment methods. We then explore the potential of crowdsourced data in real-world applications: the conflation of VGI and social media with official data for effective decision-making in war zones, and the potential for crowdsourcing to increase effective collaboration between machines and humans in disaster situations. Based on our review, we outline specific research challenges for deploying crowdsourced geographic information in defence, focussing on data quality and fitness-for-purpose assessment. Defence-specific constraints include the need for rapid quality assessment processes and the need to communicate high-quality information effectively in situations where rapid decision-making is required. Ethical issues are also of fundamental importance

    The Covering-Assignment Problem for Swarm-powered Ad-hoc Clouds: A Distributed 3D Mapping Use-case

    Full text link
    The popularity of drones is rapidly increasing across the different sectors of the economy. Aerial capabilities and relatively low costs make drones the perfect solution to improve the efficiency of those operations that are typically carried out by humans (e.g., building inspection, photo collection). The potential of drone applications can be pushed even further when they are operated in fleets and in a fully autonomous manner, acting de facto as a drone swarm. Besides automating field operations, a drone swarm can serve as an ad-hoc cloud infrastructure built on top of computing and storage resources available across the swarm members and other connected elements. Even in the absence of Internet connectivity, this cloud can serve the workloads generated by the swarm members themselves, as well as by the field agents operating within the area of interest. By considering the practical example of a swarm-powered 3D reconstruction application, we present a new optimization problem for the efficient generation and execution, on top of swarm-powered ad-hoc cloud infrastructure, of multi-node computing workloads subject to data geolocation and clustering constraints. The objective is the minimization of the overall computing times, including both networking delays caused by the inter-drone data transmission and computation delays. We prove that the problem is NP-hard and present two combinatorial formulations to model it. Computational results on the solution of the formulations show that one of them can be used to solve, within the configured time-limit, more than 50% of the considered real-world instances involving up to two hundred images and six drones

    A Data Fusion System for Simulation of Critical Scenarios and Decision-Making

    Get PDF
    The decision-making (DM) process in critical environments is a complex process that can be simulated due to current telematic capabilities, which allow the real time interaction of large amounts of data. This document describes the proposed architecture from a research process, developed by the FAC Aerospace Technology Development Center (CETAD), where using computational and expert system tools, allowed to create a computational environment for decision maker evaluated his options to prepares for real events, simulating characteristics, resources and strategies in a real time environment. This document describes an investigation product resulted in a simulation system, based on a combination of fuzzy logic, genetic algorithms and decision trees which let modelled and simulated various entities and their automatic response according to simulated patterns and situations, in which, through operators, decision maker can modify entities behaviour, according to parameterized restrictions and physical conditions. Also based on business intelligence tools, reports are generated to evaluate the decisions made. This type of technologies improves planning capacity and facilitate the decision-making process. System allows simulating any media deployment in national security and critical events context. Thus, a case study was developed for implementation of a support in natural disaster scenario simulatio

    Data-driven maintenance of military systems:Potential and challenges

    Get PDF
    The success of military missions is largely dependent on the reliability and availability of the systems that are used. In modern warfare, data is considered as an important weapon, both in offence and defence. However, collection and analysis of the proper data can also play a crucial role in reducing the number of system failures, and thus increase the system availability and military performance considerably. In this chapter, the concept of data-driven maintenance will be introduced. First, the various maturity levels, ranging from detection of failures and automated diagnostics to advanced condition monitoring and predictive maintenance are introduced. Then, the different types of data and associated decisions are discussed. And finally, six practical cases from the Dutch MoD will be used to demonstrate the benefits of this concept and discuss the challenges that are encountered in applying this in military practice
    • …
    corecore