1,891 research outputs found

    Unmanned systems interoperability standards

    Get PDF
    Over the past several years, there has been rapid growth in the development and employment of unmanned systems in military and civilian endeavors. Some military organizations have expressed concern that these systems are being fielded without sufficient capabilities to interoperate with existing systems. Despite recognition of this requirement, interoperability efforts remain diverse and disjointed across the United States and internationally. The Naval Postgraduate School (NPS), Monterey, California, was sponsored by the U.S. Office of the Secretary of Defense (OSD) Joint Ground Robotics Enterprise (JGRE) in Fiscal Year 2016 (FY16) to explore (1) enhancement of robotics education; (2) improved representation of robotic systems in combat simulations; and (3) interoperability standards for military robotics systems. This report discusses work performed in FY16 to identify current and emerging interoperability standards for unmanned systems, including interactions of robotic systems with command and control (C2) and simulation systems. The investigation included assessment of the applicability of standardization activities in the Simulation Interoperability Standards Organization (SISO) in its development of the Phase 1 Coalition Battle Management Language (C-BML) and currently in-progress Command and Control Systems - Simulation Systems Interoperation (C2SIM) standardization efforts. The report provides a recommended approach, standards, activities, and timetable for a cross-system communications roadmap.Secretary of Defense Joint Ground Robotics Enterprise, 3090 Defense Pentagon, Room 5C756, Washington, DC 20301Office of the Secretary of Defense Joint Ground Robotics Enterprise.Approved for public release; distribution is unlimited

    Artificial intelligence and UK national security: Policy considerations

    Get PDF
    RUSI was commissioned by GCHQ to conduct an independent research study into the use of artificial intelligence (AI) for national security purposes. The aim of this project is to establish an independent evidence base to inform future policy development regarding national security uses of AI. The findings are based on in-depth consultation with stakeholders from across the UK national security community, law enforcement agencies, private sector companies, academic and legal experts, and civil society representatives. This was complemented by a targeted review of existing literature on the topic of AI and national security. The research has found that AI offers numerous opportunities for the UK national security community to improve efficiency and effectiveness of existing processes. AI methods can rapidly derive insights from large, disparate datasets and identify connections that would otherwise go unnoticed by human operators. However, in the context of national security and the powers given to UK intelligence agencies, use of AI could give rise to additional privacy and human rights considerations which would need to be assessed within the existing legal and regulatory framework. For this reason, enhanced policy and guidance is needed to ensure the privacy and human rights implications of national security uses of AI are reviewed on an ongoing basis as new analysis methods are applied to data

    Development of an Automated Cost Control System in Contractors Firms

    Get PDF
    There are still widespread use of papers as a medium to capture and exchange of information among participants in construction cost control process. Although there is a relatively little use of automation tools, there is a distinct word processing environment formats. Each package creates its own data files in different formats resulting in difficulties with exchanging data electronically. These difficulties lead to inefficient flow of information to control cost, and some feedback problems among sites and across organizational boundaries. This negatively affects the availability of cost historical database as well as data from projects at hand. This implies that, it is time to automate cost control to achieve some kind of uniformity and standardization. To effectively achieve this, one specific IT tool, namely shared databases through data accessibility capability, has been used. The automated cost control has been developed using the Entity-Relationship modeling (ERM) methodology. It started with a formal definition for the problem, and conceptually been designed. Then a logical refinement for the conceptual model is developed that lead to the physical implementation of the system. The resulted system. The resulted cost control system has been developed in a formal and systematic manner. It has used Microsoft Access as a target database Management System (DBMS), under windows environment. In addition, the cost control system has the capabilities to prepare cost reports, undergo different types of queries with users and update data. The cost control system described in this research represents a significant contribution in construction cost control, since it satisfies the condition of uniformity under windows environment. It is easy to use, since the user can interface it by just 'point and click', as it uses Query-By-Example (QBE) language

    Measures of Pleasures

    Get PDF
    Measuring culture originated in cultural anthropology, but all social sciences contributed to comparative cultural studies. Tracing critical approaches towards a measurement of cultural values one is bound to strip the biases and stereotypes bare and to invade numerous academic fiefs. Hofstede defined interdisciplinary cultural dimensions but failed to anchor studying of culture's consequences in the academia. Measuring culture (rituals, patterns, business recipes, symbols, standards) we end up measuring values and competence in management of knowledge and skills, of norms and behaviours, cutting many corners of established disciplines. Demanding, but should we fail to do so, our cross-cultural experiment with the European integration could result in the corrosion of character and bowling alone.integration;knowledge management;bias;cross-cultural measurements;learning standardscomparing values

    Effective Virtual Teams for New Product Development

    Get PDF
    At present, the existing literature shows that the factors which influence the effectiveness of virtual teams for new product development are still ambiguous. To address this problem, a research design was developed, which includes detailed literature review, preliminary model and field survey. From literature review, the factors which influence the effectiveness of virtual teams are identified and these factors are modified using a field survey. The relationship between knowledge workers (people), process and technology in virtual teams is explored in this study. The results of the study suggest that technology and process are tightly correlated and need to be considered early in virtual teams. The use of software as a service, web solution, report generator and tracking system should be incorporated for effectiveness virtual teams

    Service development success: a contingent approach by knowledge strategy

    Get PDF
    Purpose – Contingency theory suggests that effective strategies and structures are not universal but dependant upon situational factors. The purpose of this paper is to explore how the way service firms compete acts as a strategic contingency, moderating the effect of a new service development (NSD) system on innovation performance. Two knowledge‐based strategies are tested as contingency factors. One strategy adds value for customers via the delivery of personalized knowledge‐based services; the other strategy adds value by services exploiting codified knowledge. Design/methodology/approach – A sample of 70 large service enterprises is used to test a contingency model of service innovation. The NSD system is a synergistic meld of basic building blocks of NSD systems: people organized cross‐functionally, the discipline of formal processes for guiding development activities, and the deployment of enabling tools/technologies. Regression analysis is used to test the relative impact of these three elements on innovation performance contingent on the type of knowledge strategy employed. Findings – While each element of the NSD system has an effect on performance, the optimal design is contingent on the strategy the firm employs. If firms enact a personalization strategy, NSD systems that score high in the deployment of cross‐functional organization and disciplined processes are higher performers. If firms emphasize a codification strategy, NSD systems that score high in the deployment of tools/technologies are higher performers. Combinations of the two kinds of strategy permit the construction of a four‐cell classification of service firms. This typology is used to further explore the implications for how managers design NSD systems to optimize performance. Originality/value – This paper uses a contingency approach to demonstrate that an optimal NSD system is dependent upon the type of knowledge strategy firms deploy. The impact on performance of three components of NSD depends on the degree of either codification and/or personalization in the service offering. A novel approach based on the knowledge management literature is employed creating a typology of service firm strategies. This is the first time such a typology has been postulated

    Cognitive Machine Individualism in a Symbiotic Cybersecurity Policy Framework for the Preservation of Internet of Things Integrity: A Quantitative Study

    Get PDF
    This quantitative study examined the complex nature of modern cyber threats to propose the establishment of cyber as an interdisciplinary field of public policy initiated through the creation of a symbiotic cybersecurity policy framework. For the public good (and maintaining ideological balance), there must be recognition that public policies are at a transition point where the digital public square is a tangible reality that is more than a collection of technological widgets. The academic contribution of this research project is the fusion of humanistic principles with Internet of Things (IoT) technologies that alters our perception of the machine from an instrument of human engineering into a thinking peer to elevate cyber from technical esoterism into an interdisciplinary field of public policy. The contribution to the US national cybersecurity policy body of knowledge is a unified policy framework (manifested in the symbiotic cybersecurity policy triad) that could transform cybersecurity policies from network-based to entity-based. A correlation archival data design was used with the frequency of malicious software attacks as the dependent variable and diversity of intrusion techniques as the independent variable for RQ1. For RQ2, the frequency of detection events was the dependent variable and diversity of intrusion techniques was the independent variable. Self-determination Theory is the theoretical framework as the cognitive machine can recognize, self-endorse, and maintain its own identity based on a sense of self-motivation that is progressively shaped by the machine’s ability to learn. The transformation of cyber policies from technical esoterism into an interdisciplinary field of public policy starts with the recognition that the cognitive machine is an independent consumer of, advisor into, and influenced by public policy theories, philosophical constructs, and societal initiatives

    Reform of United States Weapons Acquisition Policy: Competition, Teaming Agreements, and Dual- Sourcing

    Get PDF
    Attaining an adequate level of defense at an acceptable cost is as vital and elusive a goal as any the United States has pursued since World War II. No aspect of this goal has proven more vexing than the search for an effective process for purchasing armaments of reasonable price, satisfactory performance, and timely delivery. News accounts abound with reports of serious deficiencies in weapons projects that are central to this country\u27s defense. Recently, the Department of Defense (DOD) and the supplier community have been shaken by a flurry of disclosures and the first indictments emanating from the Department of Justice\u27s investigation of allegations of corruption in weapons acquisition- Operation Ill Wind. \u27 Accounts of inefficiency, poor system performance, and misconduct in individual programs are becoming so common that they obscure what is at stake. Quite simply, failure to solve the problems of weapons procurement will put both the country\u27s economic well-being and its physical security at risk
    corecore