116 research outputs found

    REVISITING COORDINATED SUBMARINE TACTICS USING MODERN COMPUTATIONAL METHODS

    Get PDF
    Current doctrine has largely discarded the use of coordinated submarine tactics (known as Wolfpack tactics) due to the complexity of inter-pack and intra-pack coordination. However, recent advancements in technology may greatly increase the feasibility of secure communication between submarines operating in a Wolfpack. Agent-based modeling is used to simulate the behavior of submarines operating in a wartime environment at sea. Three secure communication availabilities are represented: no communication between submarines, communication every 10 hours, and constant secure communication. Three types of wartime environments are considered: submarines hunting transiting merchants, submarines hunting transiting warships in an environment with neutral shipping, and submarines hunting transiting warships operating as a Surface Action Group (SAG) with neutral shipping. Effectiveness is measured as “yield,” which is the average number of target kills as a function of the number of submarines in the Wolfpack. The simulation results stress that the success of Wolfpack tactics increasingly depends upon secure submarine communication and situational awareness with the growth of neutral shipping in the wartime environment.Outstanding ThesisLieutenant, United States NavyApproved for public release. Distribution is unlimited

    Enhanced cyberspace defense with real-time distributed systems using covert channel publish-subscribe broker pattern communications

    Get PDF
    In this thesis, we propose a novel cyberspace defense solution to the growing sophistication of threats facing networks within the Department of Defense. Current network defense strategies, including traditional intrusion detection and firewall-based perimeter defenses, are ineffective against increasingly sophisticated social engineering attacks such as spear-phishing which exploit individuals with targeted information. These asymmetric attacks are able to bypass current network defense technologies allowing adversaries extended and often unrestricted access to portions of the enterprise. Network defense strategies are hampered by solutions favoring network-centric designs which disregard the security requirements of the specific data and information on the networks. Our solution leverages specific technology characteristics from traditional network defense systems and real-time distributed systems using publish-subscribe broker patterns to form the foundation of a full-spectrum cyber operations capability. Building on this foundation, we present the addition of covert channel communications within the distributed systems framework to protect sensitive Command and Control and Battle Management messaging from adversary intercept and exploitation. Through this combined approach, DoD and Service network defense professionals will be able to meet sophisticated cyberspace threats head-on while simultaneously protecting the data and information critical to warfighting Commands, Services and Agencies.http://archive.org/details/enhancedcyberspa109454049US Air Force (USAF) author.Approved for public release; distribution is unlimited

    A Miniature Acoustic Device for Tracking Small Marine Animals or Submerged Drifters

    Get PDF
    This paper presents an acoustic archival tag capable of tracking small marine animals. It is also a technology that can be ported to other platforms, such as the next-generation acoustic and Argo floats as well as gliders. Tracking is achieved by standard RAFOS triangulation using the arrival times of unique sound signals emitted by moored sources. At the core of the tag is a custom microchip that controls all system operations. It incorporates the critical acoustic arrival time detector, a thermal sensor, and a pressure sensor interface. All the electronic components are housed inside a cylindrical hydrophone of 25.4-mm length and 10.7-mm diameter. The collected data are archived in nonvolatile memory chips with a total capacity of 4 Mb, sufficient storage to record position, temperature, and pressure on an hourly basis for 2 years. The tag consumes 4–5 μW in standby mode and between 60 and 90 μW while the sound arrival time detector is in operation. The power is provided by two button cell silver-oxide batteries, which enable an active tag lifetime of approximately 2 years

    Orbital transfer vehicle launch operations study: Automated technology knowledge base, volume 4

    Get PDF
    A simplified retrieval strategy for compiling automation-related bibliographies from NASA/RECON is presented. Two subsets of NASA Thesaurus subject terms were extracted: a primary list, which is used to obtain an initial set of citations; and a secondary list, which is used to limit or further specify a large initial set of citations. These subject term lists are presented in Appendix A as the Automated Technology Knowledge Base (ATKB) Thesaurus

    Full Spring 2006 Issue

    Get PDF

    Game Theory and U-Boats in the Bay of Biscay

    Get PDF
    Analysis of a large combat campaign using game theory is difficult due to non- linearities and other soft factors which exist in a complex system. However, game theory can give decision makers insight into strategies and outcomes that can be utilized to maximize one\u27s objective. Agent-based simulation provides the means to model complex systems with non-linearities, by allowing for interactions among independent agents. This thesis investigates game-theoretic strategies in agent-based simulation, modeled after the Allied search for U-boats in the Bay of Biscay during World War II (WWII). It also looks into the effects of adaptation on strategies by comparison to fixed-strategy results

    Bayesian Search Under Dynamic Disaster Scenarios

    Get PDF
    Search and Rescue (SAR) is a hard decision making context where there is available a limited amount of resources that should be strategically allocated over the search region in order to find missing people opportunely. In this thesis, we consider those SAR scenarios where the search region is being affected by some type of dynamic threat such as a wilder or a hurricane. In spite of the large amount of SAR missions that consistently take place under these circumstances, and being Search Theory a research area dating back from more than a half century, to the best of our knowledge, this kind of search problem has not being considered in any previous research. Here we propose a bi-objective mathematical optimization model and three solution methods for the problem: (1) Epsilon-constraint; (2) Lexicographic; and (3) Ant Colony based heuristic. One of the objectives of our model pursues the allocation of resources in riskiest zones. This objective attempts to find victims located at the closest regions to the threat, presenting a high risk of being reached by the disaster. In contrast, the second objective is oriented to allocate resources in regions where it is more likely to find the victim. Furthermore, we implemented a receding horizon approach oriented to provide our planning methodology with the ability to adapt to disaster's behavior based on updated information gathered during the mission. All our products were validated through computational experiments.MaestríaMagister en Ingeniería Industria

    LOGISTICS IN CONTESTED ENVIRONMENTS

    Get PDF
    This report examines the transport and delivery of logistics in contested environments within the context of great-power competition (GPC). Across the Department of Defense (DOD), it is believed that GPC will strain our current supply lines beyond their capacity to maintain required warfighting capability. Current DOD efforts are underway to determine an appropriate range of platforms, platform quantities, and delivery tactics to meet the projected logistics demand in future conflicts. This report explores the effectiveness of various platforms and delivery methods through analysis in developed survivability, circulation, and network optimization models. Among other factors, platforms are discriminated by their radar cross-section (RCS), noise level, speed, cargo capacity, and self-defense capability. To maximize supply delivered and minimize the cost of losses, the results of this analysis indicate preference for utilization of well-defended convoys on supply routes where bulk supply is appropriate and smaller, and widely dispersed assets on shorter, more contested routes with less demand. Sensitivity analysis on these results indicates system survivability can be improved by applying RCS and noise-reduction measures to logistics assets.Director, Warfare Integration (OPNAV N9I)Major, Israel Defence ForcesCivilian, Singapore Technologies Engineering Ltd, SingaporeCommander, Republic of Singapore NavyCommander, United States NavyCaptain, Singapore ArmyLieutenant, United States NavyLieutenant, United States NavyMajor, Republic of Singapore Air ForceCaptain, United States Marine CorpsLieutenant, United States NavyLieutenant, United States NavyLieutenant, United States NavyLieutenant, United States NavyLieutenant, United States NavyCaptain, Singapore ArmyLieutenant Junior Grade, United States NavyCaptain, Singapore ArmyLieutenant Colonel, Republic of Singapore Air ForceApproved for public release. distribution is unlimite

    Development Approaches Coupled with Verification and Validation Methodologies for Agent-Based Mission-Level Analytical Combat Simulations

    Get PDF
    This research investigated the applicability of agent-based combat simulations to real-world combat operations. An agent-based simulation of the Allied offensive search for German U-Boats in the Bay of Biscay during World War II was constructed, extending the state-of-the-art in agent-based combat simulations, bridging the gap between the current level of agent-like combat simulations and the concept of agent-based simulations found in the broader literature. The proposed simulation advances agent-based combat simulations to “validateable” mission-level military operations. Simulation validation is a complex task with numerous, diverse techniques available and levels of validation differing significantly among simulations and applications. This research presents a verification and validation taxonomy based on face validity, empirical validity, and theoretical validity, extending the verification and validation knowledge-base to include techniques specific to agent-based models. The verification and validation techniques are demonstrated in a Bay of Biscay case study. Validating combat operations pose particular problems due to the infrequency of real-world occurrences to serve as simulation validation cases; often just a single validation comparison can be made. This means comparisons to the underlying stochastic process are not possible without significant loss of statistical confidence. This research also presents a statistical validation methodology based on re-sampling historical outcomes, which when coupled with the traditional nonparametric sign test, allows comparison between a simulation and historic operation providing an improved validation indicator beyond the single pass or fail test
    corecore