29,455 research outputs found

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    Reconfigurable Mobile Multimedia Systems

    Get PDF
    This paper discusses reconfigurability issues in lowpower hand-held multimedia systems, with particular emphasis on energy conservation. We claim that a radical new approach has to be taken in order to fulfill the requirements - in terms of processing power and energy consumption - of future mobile applications. A reconfigurable systems-architecture in combination with a QoS driven operating system is introduced that can deal with the inherent dynamics of a mobile system. We present the preliminary results of studies we have done on reconfiguration in hand-held mobile computers: by having reconfigurable media streams, by using reconfigurable processing modules and by migrating functions

    The not so smart, smart grid - potential security risks associated with the deployment of smart grid technologies

    Get PDF
    The electricity grid has been up until now a relatively stable artifice of modern industrialized nations. The power grids are the most widespread wired networks in the world. They are heavily regulated and standardized to protect the integrity, stability and reliability of supply. The grids have been essentially closed systems, this is now rapidly changing with the introduction of the network enabled smart meter. These meters are “web” accessible, connect and interact directly with electrical appliances in domiciles and businesses. This move now brings a range of extreme risks and complexities into these stable networks. This paper explores the security issues and potential problems associated with current moves to provide these smart meters to existing grid connections

    Development of Wireless Techniques in Data and Power Transmission - Application for Particle Physics Detectors

    Full text link
    Wireless techniques have developed extremely fast over the last decade and using them for data and power transmission in particle physics detectors is not science- fiction any more. During the last years several research groups have independently thought of making it a reality. Wireless techniques became a mature field for research and new developments might have impact on future particle physics experiments. The Instrumentation Frontier was set up as a part of the SnowMass 2013 Community Summer Study [1] to examine the instrumentation R&D for the particle physics research over the coming decades: {\guillemotleft} To succeed we need to make technical and scientific innovation a priority in the field {\guillemotright}. Wireless data transmission was identified as one of the innovations that could revolutionize the transmission of data out of the detector. Power delivery was another challenge mentioned in the same report. We propose a collaboration to identify the specific needs of different projects that might benefit from wireless techniques. The objective is to provide a common platform for research and development in order to optimize effectiveness and cost, with the aim of designing and testing wireless demonstrators for large instrumentation systems

    Development of a contra-rotating tidal current turbine and analysis of performance

    Get PDF
    A contra-rotating marine current turbine has a number of attractive features: nearzero reactive torque on the support structure, near-zero swirl in the wake, and high relative inter-rotor rotational speeds. Modified blade element modelling theory has been used to design and predict the characteristics of such a turbine, and a model turbine and test rig have been constructed. Tests in a towing tank demonstrated the feasibility of the concept. Power coefficients were high for such a small model and in excellent agreement with predictions, confirming the accuracy of the computational modelling procedures. Highfrequency blade loading data were obtained in the course of the experiments. These show the anticipated dynamic components for a contra-rotating machine. Flow visualization of the wake verified the lack of swirl behind the turbine. A larger machine is presently under construction for sea trials

    An Integrated Framework for Sensing Radio Frequency Spectrum Attacks on Medical Delivery Drones

    Full text link
    Drone susceptibility to jamming or spoofing attacks of GPS, RF, Wi-Fi, and operator signals presents a danger to future medical delivery systems. A detection framework capable of sensing attacks on drones could provide the capability for active responses. The identification of interference attacks has applicability in medical delivery, disaster zone relief, and FAA enforcement against illegal jamming activities. A gap exists in the literature for solo or swarm-based drones to identify radio frequency spectrum attacks. Any non-delivery specific function, such as attack sensing, added to a drone involves a weight increase and additional complexity; therefore, the value must exceed the disadvantages. Medical delivery, high-value cargo, and disaster zone applications could present a value proposition which overcomes the additional costs. The paper examines types of attacks against drones and describes a framework for designing an attack detection system with active response capabilities for improving the reliability of delivery and other medical applications.Comment: 7 pages, 1 figures, 5 table

    Do hostile takeovers reduce extramarginal wage payments?

    Get PDF
    Hostile takeovers may have significant implications for long-term employment contracts if they facilitate the opportunistic expropriation of extramarginal wage payments. We test the expropriation hypothesis by studying the relationship between proxies for extramarginal wage payments and subsequent hostile takeover activity. This paper improves on existing research by using firm- and establishment-level data from a salary survey of employers. In addition, we observe characteristics of wage and employment structures both before and after the occurrence of a hostile takeover and hence can see whether the data are consistent with reductions in extramarginal wage payments following such takeovers. Results from this ex post experiment provide evidence consistent with the hypothesis that hostile takeovers result in reductions of extramarginal wage payments to more-tenured workers, mostly through cutbacks in senior positions at firms with relatively steep wage profiles.Consolidation and merger of corporations ; Wages
    • …
    corecore