276 research outputs found

    Aeronautical life-cycle mission modelling framework for conceptual design

    No full text
    This thesis introduces a novel framework for life cycle mission modelling during conceptual aeronautical design. The framework supports object-oriented mission definition using Geographical Information System technology. Design concepts are defined generically, enabling simulation of most aeronautical vessels and many non-aeronautical vehicles. Moreover, the framework enables modelling of entire vessel fleets, business competitors and dynamic operational changes throughout a vessel life cycle. Vessels consist of components deteriorating over time. Vessels carry payload that operates within the vessel environment.An agent-based simulation model implements most framework features. It is the first use of an agent-based simulation utilising a Geographical Information System during conceptual aeronautical design. Two case studies for unmanned aircraft design apply the simulation. The first case study explores how the simulation supports conceptual design phase decisions. It simulates four different unmanned aircraft concepts in a search-and-rescue scenario including lifeboats. The goal is to learn which design best improves life cycle search performance. It is shown how operational and geographical impacts influence design decision making by generating novel performance information. The second case study studies the simulation optimisation capability: an existing aircraft design is modified manually based on simulation outputs. First, increasing the fuel tank capacity has a negative effect on life cycle performance due to mission constraints. Therefore, mission definition becomes an optimisation parameter. Changing mission flight speeds during specific segments leads to an overall improved design

    Design in Engineering: An Evaluation of Civilian and Military Unmanned Aerial Vehicle Platforms, Considering Smart Sensing with Ethical Design to Embody Mitigation Against Asymmetric Hostile Actor Exploitation

    Get PDF
    This report is written in part-fulfilment of personal output criteria for the Visiting Research Fellowship (Sir Richard Grenville Fellowship) at the Changing Character of War Centre, Pembroke College, Oxford, and the Centre for Sea Power and Strategy, Britannia Royal Naval College, Plymouth University at BRNC, Dartmouth. In this report I undertook an extensive analysis of the maritime UAV platform systems sector of a wide range of upstream manufacturing industry and downstream end user stakeholders. I consulted a global range of military and civilian users, to inform discussions around civilian UAV platforms which could be modified by hostile non-state actors, with emphasis on the littoral maritime region. This has strategic relevance to the United Kingdom, being an island-state with over 10,000 miles of coastline, c. 600 ports, and nearly 300 off-shore oil and gas platforms. In addition the UK has 14 dependencies together with a combined EEZ of 2.5 million square miles, the fifth largest in the world

    Composite event recognition for maritime monitoring

    Get PDF
    Τα συστήματα θαλάσσιας επιτήρησης υποστηρίζουν την ασφαλέστερη ναυτιλία, καθώς επιτρέπουν την ανίχνευση σε πραγματικό χρόνο, επικίνδυνες, ύποπτες και παράνομες δραστηριοτήτες σκαφών. Η πρόθεση αυτής της πτυχιακής είναι η ανάπτυξη μίας αρχιτεκτονικής συστημάτων εστιασμένη στην θαλάσσια επιτήρηση, καθώς και ενός συνόλου “μοτίβων”, ικανά να εφράσουν αποτελεσματικά ναυτιλιακές δραστηριότητες και συμβάντα. Σε αυτή την δουλεία χρησιμοποιούμε ως μήχανη αναγνωρίσης γεγονότων τον Λογισμό Γεγονότων Πραγματικού Χρόνου, μία σύγχρονη υλοποιήση σε γλώσσα Λογικού Προγραμματισμού, του Λογισμού Γεγονότων, καθώς επίσης ένα εργαλείο συμπίεσης τροχιών και ένα εργαλείο ευρέσης χωρικών σχέσεων. Για να βελτιώσουμε περαιτέρω την απόδοση της μηχανής αναγνωρίσης γεγονότων, δημιουργήσαμε ένα γενικό μηχανισμό δυναμικής θεμελίωσης ο οποίος φαίνεται να είναι αποτελεσματικός στα ναυτιλιακά δεδομένα. Επιπλεόν, μέσω της συνεργάσιας μας με τους ειδικούς του δημιουργήσαμε ένα σύνολο από μοτιβά ναυτιλιακής δραστηριότητας, τα οποία και χρησιμοποιούμε στην πειραματική ανάλυση του συστήματος. Για την αξιολόγηση της προτεινόμενης αρχιτεκτονικής εστιάζουμε σε απόδοση και σε ακρίβεια, χρησιμοποιώντας δύο μορφές ροών πραγματικών δεδομένων πλοιών.Maritime monitoring systems support safe shipping as they allow for the real-time detection of dangerous, suspicious and illegal vessel activities. The intent of this thesis was the development of a composite event recognition engine for maritime monitoring and the construction of a set of patterns expressing effectively maritime activities in the Event Calculus. In this work, we use the Run-Time Event Calculus, a modern Prolog implementation of the Event Calculus along with tools allowing the compression of data streams, and the spatio-temporal link discovery. Additionally, to further improve the performance of recognition engine we extended the Run-Time Event Calculus with a dynamic grounding mechanism. Moreover, to increase the accuracy of the proposed system, we have been collaborating with domain experts in order to construct effective patterns of maritime activity. We evaluated our system in terms of predictive accuracy and efficiency using real kinematic vessel data

    Military mimicry:the art of concealment, deception, and imitation

    Get PDF
    Three dominant thematics emerge from the biological mimicry and camouflage literature, namely, concealment, deception, and imitation. These phenomena are interesting in their own right, but conceptually have similar analogs in the military context that have attracted only minimal intellectual curiosity. Accordingly, the purpose of this paper is to apply biological mimicry and camouflage concepts to the military environment. Concealment in the form of camouflage is traced from its nineteenth century origins to the military's imminent twenty-first century perfection of an “invisibility cloak”. Military deception is the art of duping enemies with fakes and dummies. Finally, imitation is examined from three perspectives: firstly, replacement of military personnel with animals; secondly, exploration of bioengineering, including exploitation of avian aerodynamics, insect biophysical structures, and mammal sonar attributes; and, thirdly, Artificial Intelligence that is driving military mimicry along an evolutionary path towards robots, swarms, and avatars in an emerging and novel military technology revolutio

    Monitoring dugongs within the Reef 2050 Integrated Monitoring and Reporting Program: final report of the dugong team in the megafauna expert group

    Get PDF
    The objectives of this report are to determine for the dugong: An assessment of the current status of the relevant elements of the Great Barrier Reef (the Reef), including an evaluation of primary drivers, pressures and responses using the Driving Forces, Pressures, States, Impacts, Responses (DPSIR) Framework; Identification of priority indicators for monitoring the key values associated with these elements; Summary of potential sources of data; Evaluation of adequacy of existing monitoring activities within each theme to achieve the objectives and requirements of RIMReP; Recommendations for the design of an integrated monitoring program as a component of RIMReP, specifically considering: The information requirements for each key element of the Reef to ensure that appropriate data and information are being collected to meet the fundamental objectives of RIMReP; The spatial and temporal sampling design to ensure that greatest value can be extracted from the data collected; The logistics of the design to ensure that it can be implemented efficiently; Likely funding required to implement the recommended monitoring design.An accessible copy of this report is not yet available from this repository, please contact [email protected] for more information

    The Anthropology of Security

    Get PDF
    In a post-Cold War world of political unease and economic crisis, processes of securitisation are transforming nation-states, their citizens and non-citizens in profound ways. The book shows how contemporary Europe is now home to a vast security industry which uses biometric identification systems, CCTV and quasi-military techniques to police migrants and disadvantaged neighbourhoods. This is the first collection of anthropological studies of security with a particular but not exclusive emphasis on Europe. The Anthropology of Security draws together studies on the lived experiences of security and policing from the perspective of those most affected in their everyday lives. The anthropological perspectives in this volume stretch from the frontlines of policing and counter-terrorism to border control
    corecore