40,547 research outputs found

    Training and education for network centric warfare : issues for New Zealand's Defence Force : a thesis presented in partial fulfilment of the requirements for the degree of Master of Arts in Defence and Strategic Studies at Massey University

    Get PDF
    The concept of Network centric warfare (NCW) is viewed as the next revolution in military affairs. Its introduction globally will necessarily affect the way the New Zealand Armed Forces operates in future conflicts. With the increasing use of digital technology in the military environment the need for and degree of increasing knowledge of Network Centric Warfare and its concepts must be explored.This country will have to combine its own definition and understanding of NCW into the framework of its Armed Force if it wants to continue to remain interoperable with technologically advanced coalition forces. This thesis looks into the issues and solutions which have been considered by other countries in their attempts to implement the NCW concept. It examines in detail how issues and solutions could be applied to New Zealand's attempt at NCW. Chapters One and Two define the academic processes which have been used in this study. They also give a brief introduction to the broad idea of Network Centric Warfare and its origins. Chapter Three examines in detail the complex evolution of the concept of Network Centric Warfare to its present state. In particular, it looks at how the events of September 11th 2001 have redefined warfare and the impact of that revolution on the traditional NCW concept. This chapter also focuses on the advantages and disadvantages of NCW which have now been proven through the experiences of Operation Enduring Freedom and Operation Iraqi Freedom. These two conflicts have been described as the first information technology wars of the 21st century. Chapter Four focuses on how the concept of Network Centric Warfare has and will affect the specifics of personnel and make-up of the New Zealand Defence Force, as it makes the transition from a Platform centric to a Network Centric approach in warfare. The special focus in this chapter is on the New Zealand Army. The concepts of the ethos and cultural identity of a force are introduced here, with a view to revealing the influences that the adaptation of NCW methods and techniques can have on the organisation of that force. The discussion concludes that the introduction of NCW can have profound and permanent effect on a force's ethos and identity. This chapter also considers the influence of technology can help in the recruitment and retention of highly skilled people in the Army. Chapter Five shows how the adoption of the concept of Network Centric warfare also has the potential to fundamentally change the way in which higher level policy and doctrine are introduced and modified in the Armed Forces. This chapter looks at how future infrastructure and policies will need to have increased flexibility built into them from the start in order to embrace the demands of NCW for rapid developments in information technology and force-wide diffusion of such developments. Chapter Six discusses a third important consequence of adopting the concept of Network Centric Warfare. Namely, how the introduction of NCW will affect both training and education of service personnel. In particular, it examines how the change from Platform Centric to Network Centric forms of warfare puts changing demands on the skill sets and needs required of service personnel. Examples are given of the new skill sets needed in order for them to work effectively in a NCW environment. Chapter Seven discusses the formation of a new training branch of service which will need to be set up to accommodate the new methods and skills that NCW brings to the battlefield. Included in this chapter are the imperatives of Information Warfare, Electronic Warfare, and Computer Network Operations for such a branch. Alongside Air, Land, Sea and Space NCW brings with it the creation of a fifth battle space. This battle-space is cyberspace which encompasses the electromagnetic sphere, the Internet and all manner of Wide and Local Area Networks (WANs and LANs). Chapter Eight returns to the issue of training and education introduced in Chapter Six, but focuses specifically on the use of simulation techniques and technologies. Such techniques will be required in order to help train soldiers to work effectively and efficiently under NCW. Why other training methods won't work well given an NCW environment, and why simulation technologies will work, is explained with examples of each. This chapter argues in particular that simulation provides the most effective training in the unified data architecture that will be needed to provide cross platform capability and inter and intra service solutions in Network Centric Warfare. Examples of data solutions are provided to help explain the underlying simulation concepts and methods. Chapter Nine is the conclusion of this study. It reviews the results of this thesis and provides recommendations on the implementation of the Network Centric Warfare environment required in the New Zealand Armed Forces

    Transmission of cultural traits in layered ego-centric networks

    Full text link
    Although a number of models have been developed to investigate the emergence of culture and evolutionary phases in social systems, one important aspect has not yet been sufficiently emphasized. This is the structure of the underlaying network of social relations serving as channels in transmitting cultural traits, which is expected to play a crucial role in the evolutionary processes in social systems. In this paper we contribute to the understanding of the role of the network structure by developing a layered ego-centric network structure based model, inspired by the social brain hypothesis, to study transmission of cultural traits and their evolution in social network. For this model we first find analytical results in the spirit of mean-field approximation and then to validate the results we compare them with the results of extensive numerical simulations.Comment: 10 pages, 2 figure

    Simulation of the Long-Term Effects of Decentralized and Adaptive Investments in Cross-Agency Interoperable and Standard IT Systems

    Get PDF
    Governments have come under increasing pressure to promote horizontal flows of information across agencies, but investment in cross-agency interoperable and standard systems have been minimally made since it seems to require government agencies to give up the autonomies in managing own systems and its outcomes may be subject to many external and interaction risks. By producing an agent-based model using 'Blanche' software, this study provides policy-makers with a simulation-based demonstration illustrating how government agencies can autonomously and interactively build, standardize, and operate interoperable IT systems in a decentralized environment. This simulation designs an illustrative body of 20 federal agencies and their missions. A multiplicative production function is adopted to model the interdependent effects of heterogeneous systems on joint mission capabilities, and six social network drivers (similarity, reciprocity, centrality, mission priority, interdependencies, and transitivity) are assumed to jointly determine inter-agency system utilization. This exercise simulates five policy alternatives derived from joint implementation of three policy levers (IT investment portfolio, standardization, and inter-agency operation). The simulation results show that modest investments in standard systems improve interoperability remarkably, but that a wide range of untargeted interoperability with lagging operational capabilities improves mission capability less remarkably. Nonetheless, exploratory modeling against the varying parameters for technology, interdependency, and social capital demonstrates that the wide range of untargeted interoperability responds better to uncertain future states and hence reduces the variances of joint mission capabilities. In sum, decentralized and adaptive investments in interoperable and standard systems can enhance joint mission capabilities substantially and robustly without requiring radical changes toward centralized IT management.Public IT Investment, Interoperability, Standardization, Social Network, Agent-Based Modeling, Exploratory Modeling

    Biology of Applied Digital Ecosystems

    Full text link
    A primary motivation for our research in Digital Ecosystems is the desire to exploit the self-organising properties of biological ecosystems. Ecosystems are thought to be robust, scalable architectures that can automatically solve complex, dynamic problems. However, the biological processes that contribute to these properties have not been made explicit in Digital Ecosystems research. Here, we discuss how biological properties contribute to the self-organising features of biological ecosystems, including population dynamics, evolution, a complex dynamic environment, and spatial distributions for generating local interactions. The potential for exploiting these properties in artificial systems is then considered. We suggest that several key features of biological ecosystems have not been fully explored in existing digital ecosystems, and discuss how mimicking these features may assist in developing robust, scalable self-organising architectures. An example architecture, the Digital Ecosystem, is considered in detail. The Digital Ecosystem is then measured experimentally through simulations, with measures originating from theoretical ecology, to confirm its likeness to a biological ecosystem. Including the responsiveness to requests for applications from the user base, as a measure of the 'ecological succession' (development).Comment: 9 pages, 4 figure, conferenc

    VANET Applications: Hot Use Cases

    Get PDF
    Current challenges of car manufacturers are to make roads safe, to achieve free flowing traffic with few congestions, and to reduce pollution by an effective fuel use. To reach these goals, many improvements are performed in-car, but more and more approaches rely on connected cars with communication capabilities between cars, with an infrastructure, or with IoT devices. Monitoring and coordinating vehicles allow then to compute intelligent ways of transportation. Connected cars have introduced a new way of thinking cars - not only as a mean for a driver to go from A to B, but as smart cars - a user extension like the smartphone today. In this report, we introduce concepts and specific vocabulary in order to classify current innovations or ideas on the emerging topic of smart car. We present a graphical categorization showing this evolution in function of the societal evolution. Different perspectives are adopted: a vehicle-centric view, a vehicle-network view, and a user-centric view; described by simple and complex use-cases and illustrated by a list of emerging and current projects from the academic and industrial worlds. We identified an empty space in innovation between the user and his car: paradoxically even if they are both in interaction, they are separated through different application uses. Future challenge is to interlace social concerns of the user within an intelligent and efficient driving

    Random walk on temporal networks with lasting edges

    Get PDF
    We consider random walks on dynamical networks where edges appear and disappear during finite time intervals. The process is grounded on three independent stochastic processes determining the walker's waiting-time, the up-time and down-time of edges activation. We first propose a comprehensive analytical and numerical treatment on directed acyclic graphs. Once cycles are allowed in the network, non-Markovian trajectories may emerge, remarkably even if the walker and the evolution of the network edges are governed by memoryless Poisson processes. We then introduce a general analytical framework to characterize such non-Markovian walks and validate our findings with numerical simulations.Comment: 18 pages, 18 figure

    Swarm-based Intelligent Routing (SIR) - a new approach for efficient routing in content centric delay tolerant networks

    Get PDF
    This paper introduces Swarm-based Intelligent Routing (SIR), a swarm intelligence based approach used for routing content in content centric Pocket Switched Networks. We first formalize the notion of optimal path in DTN, then introduce a swarm intelligence based routing protocol adapted to content centric DTN that use a publish/subscribe communication paradigm. The protocol works in a fully decentralized way in which nodes do not have any knowledge about the global topology. Nodes, via opportunistic contacts, update utility functions which synthesizes their spatio-temporal proximity from the content subscribers. This individual behavior applied by each node leads to the collective formation of gradient fields between content subscribers and content providers. Therefore, content routing simply sums up to follow the steepest slope along these gradient fields to reach subscribers who are located at the minima of the field. Via real traces analysis and simulation, we demonstrate the existence and relevance of such gradient field and show routing performance improvements when compared to classical routing protocols previously defined for information routing in DTN
    corecore