65 research outputs found

    INFORMATIONAL AND EDUCATIONAL COLLEGE ENVIRONMENT AS A PHENOMEN: CONCEPT, STRUCTURE, FIXING AND REALISATION

    Full text link
    The article considers with the phenomenon of the informational and educational college environment concept in its science-based aspects. The author discusses justification of net-centric system application as informational and educational college environmentСтатья посвящена рассмотрению информационной образовательной среды колледжа как феномена в различных научных аспектах. Обосновывается применение сетецентрической системы управления как примера реализации информационной образовательной среды колледж

    Modeling Net-Centric System of Systems using the Dystems Modeling Language SysML

    Get PDF
    Understanding the operations of a large \u27net-centric system-of-systems requires in-depth knowledge of the interfaces among the various systems, sub-systems and components. Architectural modeling can help in reducing the complexity involved in designing such large networked systems. An example of such a complex system is the Global Earth Observation System of Systems (GEOSS) - a system for monitoring and collecting information related to Earth\u27s resources. This paper demonstrates the use of Systems Modeling Language (SysML), which supports specification, analysis, design, verification and validation of a broad range of complex systems, to model some aspects of the GEOSS. The paper discusses issues related to architecture description, development, presentation, and integration for the chosen domain. The paper discusses issues related to model evaluation and how architectures can be simulated to better understand their efficacy

    Towards a Work Breakdown Structure for Net Centric System of Systems Engineering and Management

    Get PDF
    As the system engineering industry sees an increasing focus on the lifecycle development, acquisition, and sustainment of net-centric Systems of Systems (SoS), organizations find that current processes and tools need to evolve to handle the increased scope, scale, and complexity of these efforts. One such tool, the Work Breakdown Structure (WBS) is important in planning, monitoring, and re-focusing of program activities as requirements and goals of the program evolve. This paper provides an overview of the limitations of current standard WBSs with respect to SoS efforts and presents a proposed WBS structure that more adequately reflects the evolving processes and cross-organizational complexities

    Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    Get PDF
    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are necessary. AIU achieves fine-grain data access and user control, reducing the security risk significantly, simplifying the complexity of various security operations, and providing the high information assurance across different network domains

    Implementing an Architectural Framework to Define and Deliver Net-Centric Capability to Legacy Military Air Assets Operating within a System of Systems

    Get PDF
    The United States Air Force (USAF) is implementing an integrated net-centric system of systems for airborne operations in support of the global war on terror (GWOT). The GWOT demands that a successful architecture framework transforms and delivers net-centric assets to the war-fighter in a timely manner. A critical component of this implementation is the transformation of legacy strategic air platforms into net-centric air power assets operating within a system of systems. The System Architectural (SA) framework, and the Department of Defense Architectural Framework (DoDAF) are ways of managing complexity and organizing information within a system of systems network. This paper will explore and compare these architectural frameworks; show examples used in a system of systems network; and illustrate how the DoDAF can successfully define the transformation of a legacy weapon system into a net-centric asset

    THE ROLE OF EDUCATIONAL PORTAL WITH FORMING THE INFORMATIONAL EDUCATIONAL ENVIRONMENT IN THE UNIVERSITY

    Full text link
    This article describes the goals and objectives of the educational portal of the university, a common classification of web-portals, determined that an educational portal in this classification is most appropriate for the type of corporate knowledge management portal, also substantiates the need for an educational portal in the development of the information educational environment of the universityВ данной статье описываются цели и задачи образовательного портала вуза, представлена общая классификация web-порталов, определено, что образовательный портал в данной классификации соответствует типу корпоративного портала управления знаниями; также обосновывается необходимость разработки образовательного портала в рамках развития информационной образовательной среды вуз

    RF communication between surface and underwater robotic swarms

    Full text link
    In order for underwater robots to communicate with land and air based robots on an equal basis, high speed communications is required. If the robots are not to be tethered then wireless communications is the only possibility. Sonar communications is too slow. Unfortunately radio waves are rapidly attenuated under water due to phenomena such as skin depth. These experiments attempt to extend the range of underwater radio communications.<br /

    Security architecture methodology for large net-centric systems

    Get PDF
    This thesis describes an over-arching security architecture methodology for large network enabled systems that can be scaled down for smaller network centric operations such as present at the University of Missouri-Rolla. By leveraging the five elements of security policy & standards, security risk management, security auditing, security federation and security management, of the proposed security architecture and addressing the specific needs of UMR, the methodology was used to determine places of improvement for UMR --Abstract, page iii

    Cooperative Pursuit with Multi-Pursuer and One Faster Free-moving Evader

    Full text link
    This paper addresses a multi-pursuer single-evader pursuit-evasion game where the free-moving evader moves faster than the pursuers. Most of the existing works impose constraints on the faster evader such as limited moving area and moving direction. When the faster evader is allowed to move freely without any constraint, the main issues are how to form an encirclement to trap the evader into the capture domain, how to balance between forming an encirclement and approaching the faster evader, and what conditions make the capture possible. In this paper, a distributed pursuit algorithm is proposed to enable pursuers to form an encirclement and approach the faster evader. An algorithm that balances between forming an encirclement and approaching the faster evader is proposed. Moreover, sufficient capture conditions are derived based on the initial spatial distribution and the speed ratios of the pursuers and the evader. Simulation and experimental results on ground robots validate the effectiveness and practicability of the proposed method

    Applications and prototype for systems of systems swarm robotics

    Full text link
    In order to develop a robotic system of systems the robotic platforms must be designed and built. For this to happen, the type of application involved should be clear. Swarm robots need to be self contained and powered. They must also be self governing. Here the authors examine various applications and a prototype robot that may be useful in these scenarios. <br /
    corecore