29,455 research outputs found
Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph
Police SWAT teams and Military Special Forces face mounting pressure and
challenges from adversaries that can only be resolved by way of ever more
sophisticated inputs into tactical operations. Lethal Autonomy provides
constrained military/security forces with a viable option, but only if
implementation has got proper empirically supported foundations. Autonomous
weapon systems can be designed and developed to conduct ground, air and naval
operations. This monograph offers some insights into the challenges of
developing legal, reliable and ethical forms of autonomous weapons, that
address the gap between Police or Law Enforcement and Military operations that
is growing exponentially small. National adversaries are today in many
instances hybrid threats, that manifest criminal and military traits, these
often require deployment of hybrid-capability autonomous weapons imbued with
the capability to taken on both Military and/or Security objectives. The
Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of
Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that
required military response and police investigations against a fighting cell of
the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade
Reconfigurable Mobile Multimedia Systems
This paper discusses reconfigurability issues in lowpower hand-held multimedia systems, with particular emphasis on energy conservation. We claim that a radical new approach has to be taken in order to fulfill the requirements - in terms of processing power and energy consumption - of future mobile applications. A reconfigurable systems-architecture in combination with a QoS driven operating system is introduced that can deal with the inherent dynamics of a mobile system. We present the preliminary results of studies we have done on reconfiguration in hand-held mobile computers: by having reconfigurable media streams, by using reconfigurable processing modules and by migrating functions
The not so smart, smart grid - potential security risks associated with the deployment of smart grid technologies
The electricity grid has been up until now a relatively stable artifice of modern industrialized nations. The power grids are the most widespread wired networks in the world. They are heavily regulated and standardized to protect the integrity, stability and reliability of supply. The grids have been essentially closed systems, this is now rapidly changing with the introduction of the network enabled smart meter. These meters are âwebâ accessible, connect and interact directly with electrical appliances in domiciles and businesses. This move now brings a range of extreme risks and complexities into these stable networks. This paper explores the security issues and potential problems associated with current moves to provide these smart meters to existing grid connections
Development of Wireless Techniques in Data and Power Transmission - Application for Particle Physics Detectors
Wireless techniques have developed extremely fast over the last decade and
using them for data and power transmission in particle physics detectors is not
science- fiction any more. During the last years several research groups have
independently thought of making it a reality. Wireless techniques became a
mature field for research and new developments might have impact on future
particle physics experiments. The Instrumentation Frontier was set up as a part
of the SnowMass 2013 Community Summer Study [1] to examine the instrumentation
R&D for the particle physics research over the coming decades: {\guillemotleft}
To succeed we need to make technical and scientific innovation a priority in
the field {\guillemotright}. Wireless data transmission was identified as one
of the innovations that could revolutionize the transmission of data out of the
detector. Power delivery was another challenge mentioned in the same report. We
propose a collaboration to identify the specific needs of different projects
that might benefit from wireless techniques. The objective is to provide a
common platform for research and development in order to optimize effectiveness
and cost, with the aim of designing and testing wireless demonstrators for
large instrumentation systems
Development of a contra-rotating tidal current turbine and analysis of performance
A contra-rotating marine current turbine has a number of attractive features: nearzero reactive torque on the support structure, near-zero swirl in the wake, and high relative inter-rotor rotational speeds. Modified blade element modelling theory has been used to design and predict the characteristics of such a turbine, and a model turbine and test rig have been constructed. Tests in a towing tank demonstrated the feasibility of the concept. Power coefficients were high for such a small model and in excellent agreement with predictions, confirming the accuracy of the computational modelling procedures. Highfrequency blade loading data were obtained in the course of the experiments. These show the anticipated dynamic components for a contra-rotating machine. Flow visualization of the wake verified the lack of swirl behind the turbine. A larger machine is presently under construction for sea trials
An Integrated Framework for Sensing Radio Frequency Spectrum Attacks on Medical Delivery Drones
Drone susceptibility to jamming or spoofing attacks of GPS, RF, Wi-Fi, and
operator signals presents a danger to future medical delivery systems. A
detection framework capable of sensing attacks on drones could provide the
capability for active responses. The identification of interference attacks has
applicability in medical delivery, disaster zone relief, and FAA enforcement
against illegal jamming activities. A gap exists in the literature for solo or
swarm-based drones to identify radio frequency spectrum attacks. Any
non-delivery specific function, such as attack sensing, added to a drone
involves a weight increase and additional complexity; therefore, the value must
exceed the disadvantages. Medical delivery, high-value cargo, and disaster zone
applications could present a value proposition which overcomes the additional
costs. The paper examines types of attacks against drones and describes a
framework for designing an attack detection system with active response
capabilities for improving the reliability of delivery and other medical
applications.Comment: 7 pages, 1 figures, 5 table
Do hostile takeovers reduce extramarginal wage payments?
Hostile takeovers may have significant implications for long-term employment contracts if they facilitate the opportunistic expropriation of extramarginal wage payments. We test the expropriation hypothesis by studying the relationship between proxies for extramarginal wage payments and subsequent hostile takeover activity. This paper improves on existing research by using firm- and establishment-level data from a salary survey of employers. In addition, we observe characteristics of wage and employment structures both before and after the occurrence of a hostile takeover and hence can see whether the data are consistent with reductions in extramarginal wage payments following such takeovers. Results from this ex post experiment provide evidence consistent with the hypothesis that hostile takeovers result in reductions of extramarginal wage payments to more-tenured workers, mostly through cutbacks in senior positions at firms with relatively steep wage profiles.Consolidation and merger of corporations ; Wages
- âŚ