242 research outputs found

    Opening Autonomous Airspace–a Prologue

    Get PDF
    The proliferation of Unmanned Aerial Vehicles (UAV), and in particular small Unmanned Aerial Systems (sUAS), has significant operational implications for the Air Traffic Control (ATC) system of the future. Integrating unmanned aircraft safely presents long-standing challenges, especially during the lengthy transition period when unmanned vehicles will be mixed with piloted vehicles. Integration of dissimilar systems is not an easy, straight-forward task and in this case is complicated by the difficulty to truly know what is present in the airspace. Additionally, there are significant technology, security and liability issues that will need resolution to ensure property and life are protected and in loss, indemnified. The future of air traffic will be a fully networked environment, where the absence of participation on the network could connote a potential intruder and threat. This article explores a potential airspace structure, and conceptual air traffic management philosophy of self-separation that is inclusive of all participants. Additionally, the article acknowledges the significant cyber security, technological, societal trust, employment, policy, and liability implications of transition to a fully autonomous air transportation system. Each subject is described at a macro, operations analysis level verses a more detailed systems engineering level. The objective and potential value of such a treatment is to encourage industry dialog about possibilities and more importantly a focus toward workable future air traffic solutions

    Hyper-Spectral Networking Concept of Operations and Future Air Traffic Management Simulations

    Get PDF
    The NASA sponsored Hyper-Spectral Communications and Networking for Air Traffic Management (ATM) (HSCNA) project is conducting research to improve the operational efficiency of the future National Airspace System (NAS) through diverse and secure multi-band, multi-mode, and millimeter-wave (mmWave) wireless links. Worldwide growth of air transportation and the coming of unmanned aircraft systems (UAS) will increase air traffic density and complexity. Safe coordination of aircraft will require more capable technologies for communications, navigation, and surveillance (CNS). The HSCNA project will provide a foundation for technology and operational concepts to accommodate a significantly greater number of networked aircraft. This paper describes two of the HSCNA projects technical challenges. The first technical challenge is to develop a multi-band networking concept of operations (ConOps) for use in multiple phases of flight and all communication link types. This ConOps will integrate the advanced technologies explored by the HSCNA project and future operational concepts into a harmonized vision of future NAS communications and networking. The second technical challenge discussed is to conduct simulations of future ATM operations using multi-bandmulti-mode networking and technologies. Large-scale simulations will assess the impact, compared to todays system, of the new and integrated networks and technologies under future air traffic demand

    The Impact Of Unmanned Aircraft System Observations On Convection Initiation Along A Boundary In Numerical Weather Prediction

    Get PDF
    Executing meteorological research experiments that utilize Small Unmanned Aircraft Systems (sUASs) is difficult due to regulatory limitations, and knowledge regarding weather impacts is limited. To overcome these challenges, an Observing System Simulation Experiment (OSSE) is used herein as a relatively inexpensive method to evaluate how these platforms could hypothetically improve the development, progression, and characteristics of simulated meteorological phenomena in Numerical Weather Prediction (NWP). This OSSE is part of a case study of an event that occurred in southwestern Oklahoma in May 2016 to examine how sUAS observations impact Convection Initiation (CI) along a boundary in NWP. Synthetic observations of dew point, temperature, wind speed and wind direction were collected by a simulated sUAS, and were ingested into the Weather Research and Forecasting (WRF) model via WRF Data Assimilation (WRFDA). The Three-Dimensional Variational Data Assimilation (3DVAR) technique was used and four sensitivity tests were conducted. These sensitivity tests included how the type of flight pattern, sampling frequency, background error covariance length scale, and assimilated observations impacted convection initiation along a dry line. Results showed that the type of flight pattern, background error covariance length scale, and type of observations assimilated significantly impacted CI and dry line characteristics

    OPENING THE APERTURE: HOLISTIC MITIGATION OPTIONS IN RESPONSE TO UAS THREATS

    Get PDF
    A synchronized collection of intelligence and investigative capacities, such as would be required to holistically mitigate the emerging threat from unmanned aircraft systems, does not currently exist within the United States government. Furthermore, the entities that do possess the authority, knowledge, and experience to respond are working within largely independent environments. This thesis seeks to identify the best method to collectivize individual agency strengths, unifying intelligence and investigative capacities into one juggernaut-level response against UAS threats. To address this, working groups, task forces, and single agency designation were chosen as potential options specifically for their historical precedence and likelihood of success. Each was compared according to their ability to embrace two defining characteristics: collaboration and commitment. The outcome of the analysis determined that the task force model was ultimately the most effective means to address UAS threats holistically. It mitigates the challenges associated with current technology and legal restrictions by utilizing intelligence and investigative operational capabilities to properly address each of the six steps within the UAS kill chain, all within an environment of high collaboration and commitment. The conclusions and accompanying recommendations outlined in this thesis provide a definitive direction as well as a rational plan of implementation.Civilian, Federal Bureau of InvestigationApproved for public release. Distribution is unlimited

    Chapter Operational Validation of Search and Rescue Robots

    Get PDF
    This chapter describes how the different ICARUS unmanned search and rescue tools have been evaluated and validated using operational benchmarking techniques. Two large‐scale simulated disaster scenarios were organized: a simulated shipwreck and an earthquake response scenario. Next to these simulated response scenarios, where ICARUS tools were deployed in tight interaction with real end users, ICARUS tools also participated to a real relief, embedded in a team of end users for a flood response mission. These validation trials allow us to conclude that the ICARUS tools fulfil the user requirements and goals set up at the beginning of the project

    Operational Validation of Search and Rescue Robots

    Get PDF
    This chapter describes how the different ICARUS unmanned search and rescue tools have been evaluated and validated using operational benchmarking techniques. Two large‐scale simulated disaster scenarios were organized: a simulated shipwreck and an earthquake response scenario. Next to these simulated response scenarios, where ICARUS tools were deployed in tight interaction with real end users, ICARUS tools also participated to a real relief, embedded in a team of end users for a flood response mission. These validation trials allow us to conclude that the ICARUS tools fulfil the user requirements and goals set up at the beginning of the project

    Expanding alliance: ANZUS cooperation and Asia–Pacific security

    Get PDF
    Is an alliance conceived as a bulwark against a resurgence of Japanese militarism and which cut its military and intelligence teeth in the Cold War is still relevant to today’s strategic concerns? Overview The alliance between Australia and the US, underpinned by the formal ANZUS Treaty of 1951, continues to be a central part of Australian defence and security thinking and an instrument of American policy in the Asia–Pacific. How is it that an alliance conceived as a bulwark against a resurgence of Japanese militarism and which cut its military and intelligence teeth in the Cold War is still relevant to today’s strategic concerns? The answer is partly—and importantly—that the core values of the ANZUS members are strongly aligned, and successive Australian governments and American presidential administrations have seen great value in working with like-minded partners to ensure Asia–Pacific security. Far from becoming a historical curiosity, today it’s not just relevant, but of greater importance than has been the case in the past few decades. To explore new ideas on how to strengthen the US–Australia alliance, ASPI conducted a high-level strategic dialogue in Honolulu in July this year. Discussions canvassed the future strategic environment; the forthcoming Australian Defence White Paper; budget, sovereignty and expectation risks; and cooperation in the maritime, land, air, cyber, space and intelligence domains. A key purpose of the Honolulu dialogue was to help ASPI develop policy recommendations on the alliance relationship for government. This report is the product of those discussions

    Evaluating the Autonomous Flying Qualities of a Simulated Variable Stability Aircraft

    Get PDF
    Delivering communications from high altitudes, at airspeeds of just 30 knots, gathering data from active volcanoes and forming hurricanes, and collecting ISR over hostile territories, UAVs are at the ready to perform those missions that are too dull, dirty, or dangerous for manned aircraft. However, the proliferation of this new technology has its fair share of challenges. Over 460 DoD UAV mishaps have occurred since 2001, with almost half resulting in damages of $2M or more. One incident almost ended in fatalities, when a UAV, suffering from loss of control, collided with a C-130. That loss of control is what this undertaking aims to address toward establishing design criteria for UAV stability and control characteristics, or flying qualities. The JSBSim flight simulation software was used to investigate the correlation between the flying qualities of an F-16, and its workload and performance, while executing a set of precision-aggressive tasks under autopilot command. The results suggest techniques and metrics that can be used to specify design requirements for UAVs. This research effort is intended to serve as a precursor for real-world flight testing using the NF-16D VISTA

    U.S. Unmanned Aerial Vehicles (UAVS) and Network Centric Warfare (NCW) impacts on combat aviation tactics from Gulf War I through 2007 Iraq

    Get PDF
    Unmanned, aerial vehicles (UAVs) are an increasingly important element of many modern militaries. Their success on battlefields in Afghanistan, Iraq, and around the globe has driven demand for a variety of types of unmanned vehicles. Their proven value consists in low risk and low cost, and their capabilities include persistent surveillance, tactical and combat reconnaissance, resilience, and dynamic re-tasking. This research evaluates past, current, and possible future operating environments for several UAV platforms to survey the changing dynamics of combat-aviation tactics and make recommendations regarding UAV employment scenarios to the Turkish military. While UAVs have already established their importance in military operations, ongoing evaluations of UAV operating environments, capabilities, technologies, concepts, and organizational issues inform the development of future systems. To what extent will UAV capabilities increasingly define tomorrow's missions, requirements, and results in surveillance and combat tactics? Integrating UAVs and concepts of operations (CONOPS) on future battlefields is an emergent science. Managing a transition from manned- to unmanned and remotely piloted aviation platforms involves new technological complexity and new aviation personnel roles, especially for combat pilots. Managing a UAV military transformation involves cultural change, which can be measured in decades.http://archive.org/details/usunmannedaerial109454211Turkish Air Force authors.Approved for public release; distribution is unlimited

    Detection and control of small civilian UAVs

    Get PDF
    With the increasing proliferation of small civilian Unmanned Aerial Vehicles (UAVs), the threat to critical infrastructure (CI) security and privacy is now widely recognised and must be addressed. These devices are easily available at a low cost, with their usage largely unrestricted allowing users to have no accountability. Further, current implementations of UAVs have little to no security measures applied to their control interfaces. To combat the threat raised by small UAVs, being aware of their presence is required, a task that can be challenging and often requires customised hardware. This thesis aimed to address the threats posed by the Parrot AR Drone v2, by presenting a data link signature detection method which provides the characteristics needed to implement a mitigation method, capable of stopping a UAVs movement and video stream. These methods were developed using an experimental procedure and are packaged as a group of Python scripts. A suitable detection method was developed, capable of detecting and identifying a Parrot AR Drone v2 within WiFi operational range. A successful method of disabling the controls and video of a Parrot AR Drone in the air was implemented, with collection of video and control commands also achieved, for after-the-event reconstruction of the video stream. Real-time video monitoring is achievable, however it is deemed detrimental to the flight stability of the Parrot, reducing the effectiveness of monitoring the behaviour of an unidentified Parrot AR Drone v2. Additionally, implementing a range of mitigations for continued monitoring of Parrot AR Drones proved ineffectual, given that the mitigations applied were found to be non-persistent, with the mitigations reverting after control is returned to the controller. While the ability to actively monitor and manipulate Parrot AR Drones was successful, it was not to the degree believed possible during initial research
    corecore