47 research outputs found

    Defensive swarm: an agent-based modeling analysis

    Get PDF
    Security at remote military bases is a difficult, yet critical, mission. Remote locations are generally closer to enemy combatants and farther from supporting forces; the individuals charged with defending the bases do so with less equipment. These locations are also usually reliant on air-resupply missions to maintain mission readiness and effectiveness. This thesis analyzes how swarms of small autonomous unmanned aerial vehicles (UAVs) could assist in defensive operations. To accomplish this, I created an agent-based computer simulation model, which creates a tactical problem (enemies attempting to attack or infiltrate a notional base) that a swarm of UAVs attempts to defend against. Results indicate that a swarm can effectively deter 95% of attackers if each UAV is responsible for covering no more than 0.18 square miles and at least 40% of the UAVs are armed. I conclude that UAVs are an excellent addition to base defense and are particularly helpful at remote outposts with less organic capability (limited field of view, defensive assets, etc.). While this research deals specifically with countering a threat to a central base, the algorithms for swarm dynamics could be applied to future problems in mobile convoy or aircraft defense, and even peacetime applications like search and rescue.http://archive.org/details/defensiveswarmng1094556777Major, United States Air ForceApproved for public release; distribution is unlimited

    Unmanned Vehicle Systems & Operations on Air, Sea, Land

    Get PDF
    Unmanned Vehicle Systems & Operations On Air, Sea, Land is our fourth textbook in a series covering the world of Unmanned Aircraft Systems (UAS) and Counter Unmanned Aircraft Systems (CUAS). (Nichols R. K., 2018) (Nichols R. K., et al., 2019) (Nichols R. , et al., 2020)The authors have expanded their purview beyond UAS / CUAS systems. Our title shows our concern for growth and unique cyber security unmanned vehicle technology and operations for unmanned vehicles in all theaters: Air, Sea and Land – especially maritime cybersecurity and China proliferation issues. Topics include: Information Advances, Remote ID, and Extreme Persistence ISR; Unmanned Aerial Vehicles & How They Can Augment Mesonet Weather Tower Data Collection; Tour de Drones for the Discerning Palate; Underwater Autonomous Navigation & other UUV Advances; Autonomous Maritime Asymmetric Systems; UUV Integrated Autonomous Missions & Drone Management; Principles of Naval Architecture Applied to UUV’s; Unmanned Logistics Operating Safely and Efficiently Across Multiple Domains; Chinese Advances in Stealth UAV Penetration Path Planning in Combat Environment; UAS, the Fourth Amendment and Privacy; UV & Disinformation / Misinformation Channels; Chinese UAS Proliferation along New Silk Road Sea / Land Routes; Automaton, AI, Law, Ethics, Crossing the Machine – Human Barrier and Maritime Cybersecurity.Unmanned Vehicle Systems are an integral part of the US national critical infrastructure The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. Unmanned Vehicle (UV) Systems & Operations On Air, Sea, Land discusses state-of-the-art technology / issues facing U.S. UV system researchers / designers / manufacturers / testers. We trust our newest look at Unmanned Vehicles in Air, Sea, and Land will enrich our students and readers understanding of the purview of this wonderful technology we call UV.https://newprairiepress.org/ebooks/1035/thumbnail.jp

    Disruptive Technologies with Applications in Airline & Marine and Defense Industries

    Get PDF
    Disruptive Technologies With Applications in Airline, Marine, Defense Industries is our fifth textbook in a series covering the world of Unmanned Vehicle Systems Applications & Operations On Air, Sea, and Land. The authors have expanded their purview beyond UAS / CUAS / UUV systems that we have written extensively about in our previous four textbooks. Our new title shows our concern for the emergence of Disruptive Technologies and how they apply to the Airline, Marine and Defense industries. Emerging technologies are technologies whose development, practical applications, or both are still largely unrealized, such that they are figuratively emerging into prominence from a background of nonexistence or obscurity. A Disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry.That is what our book is about. The authors think we have found technology trends that will replace the status quo or disrupt the conventional technology paradigms.The authors have collaborated to write some explosive chapters in Book 5:Advances in Automation & Human Machine Interface; Social Media as a Battleground in Information Warfare (IW); Robust cyber-security alterative / replacement for the popular Blockchain Algorithm and a clean solution for Ransomware; Advanced sensor technologies that are used by UUVs for munitions characterization, assessment, and classification and counter hostile use of UUVs against U.S. capital assets in the South China Seas. Challenged the status quo and debunked the climate change fraud with verifiable facts; Explodes our minds with nightmare technologies that if they come to fruition may do more harm than good; Propulsion and Fuels: Disruptive Technologies for Submersible Craft Including UUVs; Challenge the ammunition industry by grassroots use of recycled metals; Changing landscape of UAS regulations and drone privacy; and finally, Detailing Bioterrorism Risks, Biodefense, Biological Threat Agents, and the need for advanced sensors to detect these attacks.https://newprairiepress.org/ebooks/1038/thumbnail.jp

    The Next Familiar

    Get PDF
    Using a speculative design foresight approach, this study explores the rapidly developing area of wearable, implantable and ingestible technologies, and how they might influence us over the next several decades. The authors have combined traditional research methods such as literature review and expert interviews; foresight methods, such as environmental scanning, trends analysis and scenario creation; and narrative, imagery and conjecture to produce an evocative account of future possibilities in the realm of the tools we keep and use close to and inside our bodies

    Strategic Latency Unleashed: The Role of Technology in a Revisionist Global Order and the Implications for Special Operations Forces

    Get PDF
    The article of record may be found at https://cgsr.llnl.govThis work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory in part under Contract W-7405-Eng-48 and in part under Contract DE-AC52-07NA27344. The views and opinions of the author expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC. ISBN-978-1-952565-07-6 LCCN-2021901137 LLNL-BOOK-818513 TID-59693This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory in part under Contract W-7405-Eng-48 and in part under Contract DE-AC52-07NA27344. The views and opinions of the author expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC. ISBN-978-1-952565-07-6 LCCN-2021901137 LLNL-BOOK-818513 TID-5969

    European Perspectives on the Information Society: Annual Monitoring Synthesis and Emerging Trend Updates

    Get PDF
    This report is one of the outcomes of the EPIS06 Project Âż European Perspectives on the Information Society Âż carried out by the ETEPS (European Techno-Economic Policy Support) network in cooperation with the Joint Research Centre Institute for Prospective Technological Studies (JRC IPTS) with the aim of providing strategic intelligence to policy makers by taking a prospective view on the evolution of ICT. This report combines the Annual Monitoring Synthesis (AMS) Report and five Emerging Trend Updates (ETU). It forms one of the main building blocks of the project, establishing an observatory of trends in technology and business evolutions of ICT. More particularly, the Annual Monitoring Synthesis Report (AMS Report) aims to identify new ICT-related developments likely to have a significant impact on the future of the Information Society, both in terms of growth and jobs for Europe and R&D policy prioritisation. By scanning and monitoring recent major foresight exercises and industrial technology roadmaps, as well as other future-oriented analysis and policy papers, the AMS attempts to detect early signals and possible disruptive forces so as to enable timely policy responses and anticipate potential challenges for policy makers. The AMS is structured along six main themes which emerged as a result of the analysis: - Convergence of infrastructures, - Human-computer convergence Âż technologies for direct human computer interaction, - Pervasive or ubiquitous computing and ambient intelligence, - The future of the Internet, - CitizensÂż concerns, - Working life. A structured overview with a summary of each of the foresights, roadmaps and other sources studied is presented in the AMS report annex. In addition, five Emerging Trends Updates (ETU) present the results of focused briefs on emerging themes of interest for policy making, covering the following topics: - ETU1 on the state-of-the-art of the creative content sector, - ETU2 on ICT and the offshoring of services, - ETU3 on ICT and the role of ICTs as enablers for energy efficiency, - ETU4 on ICT tools and services in intelligent domestic and personal environments, - ETU5 on ICT and privacy in the Knowledge Society Âż the case of search engines.JRC.J.4-Information Societ

    Technology and Australia's Future: New technologies and their role in Australia's security, cultural, democratic, social and economic systems

    Get PDF
    Chapter 1. Introducing technology -- Chapter 2. The shaping of technology -- Chapter 3. Prediction of future technologies -- Chapter 4. The impacts of technology -- Chapter 5. Meanings, attitudes and behaviour -- Chapter 6. Evaluation -- Chapter 7. Intervention -- Conclusion - adapt or wither.This report was commisioned by Australian Council of Learned Academies

    European Avant-Garde: Art, Borders and Culture in Relationship to Mainstream Cinema and New Media

    Full text link
    This research analyses the impact of transformation and hybridization processes at the intersection of art, science and technology. These forms of transformation and hybridization are the result of contemporary interactions between classic and digital media. It discusses the concept of 'remediation' presented by Bolter and proposes the concept of 'digital ekphrasis,' which is based on Manovich' s analyses of the interactions between classic and digital media. This is a model which, borrowed from semiotic structures, encompasses the technical as well as aesthetic and philosophical transformations of contemporary media. The thesis rejects Baudrillard's and Virilio's proposed concepts of 'digital black hole' as the only possible form of evolution of contemporary digital media. It proposes a different concept for the evolutionary model of contemporary hybridization processes based on contemporary forms of hybridizations that are rooted in aesthetic, philosophical and technological developments. This concept is argued as emancipated from the 'religious' idea of a 'divine originated' perfect image that Baudrillard and Virilio consider to be deteriorated from contemporary hybridization experimentation. The thesis proposes, through historical examples in the fine arts, the importance of transmedia migrations and experimentations as the framework for a philosophical, aesthetic and technological evolutionary concept of humanity freed from the restrictions of religious imperatives
    corecore