14,402 research outputs found

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    ERP implementation methodologies and frameworks: a literature review

    Get PDF
    Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history

    E-learning-based competence development in logistics

    Get PDF
    Die Logistik ist ein hochgradig interdisziplinäres, komplexes Wissensgebiet und Kompetenzfeld, das sich kontinuierlich und sehr dynamisch weiterentwickelt. Dies erfordert nicht nur eine fortgesetzte Anpassung von Ausbildungsangeboten, sondern auch die systematische Weiterbildung von Logistikern, um Defizite in der beruflichen Handlungskompetenz zu vermeiden oder abzubauen. Lernen am Arbeitsplatz, eventuell in Verbindung mit E-Learning, erscheint als geeigneter Weg, die Entwicklung von beruflicher Handlungskompetenz auch in der Logistik zu unterstützen. Der Beitrag stellt verschiedene Ansätze für die Kompetenzermittlung und –entwicklung speziell in der Logistik dar und leitet Schlussfolgerungen zu den heutigen Kompetenzanforderungen bei Logistikpraktikern ab. Dies bildet die Basis für einen Handlungsrahmen, der im EU-geförderten Projekt lot4eng.com entstanden ist und hilft, das logistische Kompetenzniveau einer Person zu spezifizieren, geeignete Lerneinheiten zu seiner Steigerung vorzuschlagen und die individuelle Kompetenzentwicklung zu unterstützen. Im Weiteren wird die Gestaltung von E-Learning zum Füllen der lot4eng.com-Plattform diskutiert, bevor Erfahrungen aus der Projektarbeit und Schlussfolgerungen für die weitere Arbeit abgeleitet werden. Damit möchte der Beitrag die laufende Forschung dazu, wie lebenslanges Lernen unterstützt werden kann, anreichern.The logistics field of knowledge and professional competence is highly multidisciplinary and complex but also continuously and very dynamically developing. This does not only require constant updating of educational programmes but also systematic training of logistics professionals in order to avoid or reduce professional competence gaps. Workplace learning amongst others in combination with e-learning methodology seems to be an appropriate way to support professional competence development in logistics, too. The paper presents some research aspects particularly related to logistics competence profiling and development and derives conclusions on nowadays competence requirements with logistics professionals. This forms the basis for introducing a framework to help in specifying a person’s level of logistics competence, recommending suitable learning units and supporting individual competence development as it results from the EU-funded lot4eng.com project. E-learning design to populate the lot4eng.com portal is discussed before lessons learned and conclusions on further work are derived. With this the paper wants to contribute to ongoing research on how to foster lifelong learning

    In the Battle for Reality: Social Documentaries in the U.S.

    Get PDF
    Provides an overview of documentaries that address social justice and democracy issues, and includes case studies of successful strategic uses of social documentaries

    Design and evaluation of an advanced air-ground data-link system for air traffic control

    Get PDF
    The design and evaluation of the ground-based portion of an air-ground data-link system for air traffic control (ATC) are described. The system was developed to support the 4D Aircraft/ATC Integration Study, a joint simulation experiment conducted at NASA's Ames and Langley Research Centers. The experiment focused on airborne and ground-based procedures for handling aircraft equipped with a 4D-Flight Management System (FMS) and the system requirements needed to ensure conflict-free traffic flow. The Center/TRACON Automation System (CTAS) at Ames was used for the ATC part of the experiment, and the 4D-FMS-equipped aircraft was simulated by the Transport Systems Research Vehicle (TSRV) simulator at Langley. The data-link system supported not only conventional ATC communications, but also the communications needed to accommodate the 4D-FMS capabilities of advanced aircraft. Of great significance was the synergism gained from integrating the data link with CTAS. Information transmitted via the data link was used to improve the monitoring and analysis capability of CTAS without increasing controller input workload. Conversely, CTAS was used to anticipate and create prototype messages, thus reducing the workload associated with the manual creation of data-link messages

    Modeling Adaptive Middleware and Its Applications to Military Tactical Datalinks

    Get PDF
    Open systems solutions and techniques have become the de facto standard for achieving interoperability between disparate, large-scale, legacy software systems. A key technology among open systems solutions and techniques is middleware. Middleware, in general, is used to isolate applications from dependencies introduced by hardware, operating systems, and other low-level aspects of system architectures. While middleware approaches are or will be integrated into operational military systems, many open questions exist about the appropriate areas to applying middleware. Adaptive middleware is middleware that provides an application with a run-time adaptation strategy, based upon system-level interfaces and properties. Adaptive middleware is an example of an active applied research area. Adaptive middleware is being developed and applied to meet the ever-increasing challenges set forth by the next generation of mission-critical distributed real-time and embedded (DRE) systems. The driving force behind many next-generation DRE systems is the establishment of QoS requirements typically associated with workloads that vary dynamically. The Weapon System Open Architecture (WSOA), an adaptive middleware platform developed by Boeing, is modeled as a part of this research to determine the scalability of the architecture. The WSOA adaptive middleware was previously flight-tested with one tactical node, and the test results represent the performance baseline the architecture. The WSOA adaptive middleware is modeled with 1, 2, 4, 8 and 16 tactical nodes. The results of the modeling and simulation is that the WSOA adaptive middleware can achieve the performance baseline achieved during the original flight-test, in the cases of 1, 2, and 4 tactical nodes. In addition, the results of the modeling and simulation also demonstrate that the WSOA adaptive middleware cannot achiev

    Cyber Security of Critical Infrastructures

    Get PDF
    Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods
    • …
    corecore