13,660 research outputs found

    Overview of contextual tracking approaches in information fusion

    Get PDF
    Proceedings of: Geospatial InfoFusion III. 2-3 May 2013 Baltimore, Maryland, United States.Many information fusion solutions work well in the intended scenarios; but the applications, supporting data, and capabilities change over varying contexts. One example is weather data for electro-optical target trackers of which standards have evolved over decades. The operating conditions of: technology changes, sensor/target variations, and the contextual environment can inhibit performance if not included in the initial systems design. In this paper, we seek to define and categorize different types of contextual information. We describe five contextual information categories that support target tracking: (1) domain knowledge from a user to aid the information fusion process through selection, cueing, and analysis, (2) environment-to-hardware processing for sensor management, (3) known distribution of entities for situation/threat assessment, (4) historical traffic behavior for situation awareness patterns of life (POL), and (5) road information for target tracking and identification. Appropriate characterization and representation of contextual information is needed for future high-level information fusion systems design to take advantage of the large data content available for a priori knowledge target tracking algorithm construction, implementation, and application.Publicad

    The University Defence Research Collaboration In Signal Processing

    Get PDF
    This chapter describes the development of algorithms for automatic detection of anomalies from multi-dimensional, undersampled and incomplete datasets. The challenge in this work is to identify and classify behaviours as normal or abnormal, safe or threatening, from an irregular and often heterogeneous sensor network. Many defence and civilian applications can be modelled as complex networks of interconnected nodes with unknown or uncertain spatio-temporal relations. The behavior of such heterogeneous networks can exhibit dynamic properties, reflecting evolution in both network structure (new nodes appearing and existing nodes disappearing), as well as inter-node relations. The UDRC work has addressed not only the detection of anomalies, but also the identification of their nature and their statistical characteristics. Normal patterns and changes in behavior have been incorporated to provide an acceptable balance between true positive rate, false positive rate, performance and computational cost. Data quality measures have been used to ensure the models of normality are not corrupted by unreliable and ambiguous data. The context for the activity of each node in complex networks offers an even more efficient anomaly detection mechanism. This has allowed the development of efficient approaches which not only detect anomalies but which also go on to classify their behaviour

    Army Global Missile Defense Operations

    Get PDF
    Army Global Missile Defense Operations, United States Army Field Manual FM 3-2

    COUNTER-UXS ENERGY AND OPERATIONAL ANALYSIS

    Get PDF
    At present, there exists a prioritization of identifying novel and innovative approaches to managing the small Unmanned Aircraft Systems (sUAS) threat. The near-future sUAS threat to U.S. forces and infrastructure indicates that current Counter-UAS (C-UAS) capabilities and tactics, techniques, and procedures (TTPs) need to evolve to pace the threat. An alternative approach utilizes a networked squadron of unmanned aerial vehicles (UAVs) designed for sUAS threat interdiction. This approach leverages high performance and Size, Weight, and Power (SWaP) conformance to create less expensive, but more capable, C-UAS devices to augment existing capabilities. This capstone report documents efforts to develop C-UAS technologies to reduce energy consumption and collaterally disruptive signal footprint while maintaining operational effectiveness. This project utilized Model Based System Engineering (MBSE) techniques to explore and assess these technologies within a mission context. A Concept of Operations was developed to provide the C-UAS Operational Concept. Operational analysis led to development of operational scenarios to define the System of Systems (SoS) concept, operating conditions, and required system capabilities. Resource architecture was developed to define the functional behaviors and system performance characteristics for C-UAS technologies. Lastly, a modeling and simulation (M&S) tool was developed to evaluate mission scenarios for C-UAS.Outstanding ThesisCivilian, Department of the NavyCivilian, Department of the NavyCivilian, Department of the NavyCivilian, Department of the NavyCivilian, Department of the NavyApproved for public release. Distribution is unlimited

    Implication of FORCEnet on coalition forces

    Get PDF
    The coalition navies of Australia, Canada, New Zealand, United Kingdom and the United States (AUSCANNZUKUS) are in a period of transformation. They are stepping out of the Industrial Age of warfare and into the Informational Age of warfare. Network Centric Warfare (NCW) is the emerging theory to accomplish this undertaking. NCW describes "the combination of strategies, emerging tactics, techniques, and procedures, and organizations that a fully or even partially networked force can employ to create a decisive war fighting advantage." 1 This theory is turned into a concept through Network Centric Operations (NCO) and implemented through the FORCEnet operational construct and architectural framework. The coalition navies are moving in a direction to develop and leverage information more effectively and efficiently. This will lead to an informational advantage that can be used as a combat multiplier to shape and control the environment, so as to dissuade, deter, and decisively defeat any enemy. This analysis was comprised of defining three TTCP AG-6 provided vignettes into ARENA model that captured Coalition ESG configurations at various FORCEnet levels. The results of the analysis demonstrated that enhanced FORCEnet capabilities such as FORCEnet Levels 2 and 4 would satisfy the capability gap for a needed network-centric ESG force that can effectively counter insurgency operations in Maritime warfare. Furthermore, the participating allied navies in the Coalition ESG should pursue acquisition strategies to upgrade their ship platforms in accordance with our recommendation which indicates that FORCEnet Level 2 is the best value.http://archive.org/details/implicationoffor109456926N
    • …
    corecore