2,090 research outputs found

    Spacecraft Dormancy Autonomy Analysis for a Crewed Martian Mission

    Get PDF
    Current concepts of operations for human exploration of Mars center on the staged deployment of spacecraft, logistics, and crew. Though most studies focus on the needs for human occupation of the spacecraft and habitats, these resources will spend most of their lifetime unoccupied. As such, it is important to identify the operational state of the unoccupied spacecraft or habitat, as well as to design the systems to enable the appropriate level of autonomy. Key goals for this study include providing a realistic assessment of what "dormancy" entails for human spacecraft, exploring gaps in state-of-the-art for autonomy in human spacecraft design, providing recommendations for investments in autonomous systems technology development, and developing architectural requirements for spacecraft that must be autonomous during dormant operations. The mission that was chosen is based on a crewed mission to Mars. In particular, this study focuses on the time that the spacecraft that carried humans to Mars spends dormant in Martian orbit while the crew carries out a surface mission. Communications constraints are assumed to be severe, with limited bandwidth and limited ability to send commands and receive telemetry. The assumptions made as part of this mission have close parallels with mission scenarios envisioned for dormant cis-lunar habitats that are stepping-stones to Mars missions. As such, the data in this report is expected to be broadly applicable to all dormant deep space human spacecraft

    SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security

    Get PDF
    Cyber situational awareness is an essential part of cyber defense that allows the cybersecurity operators to cope with the complexity of today's networks and threat landscape. Perceiving and comprehending the situation allow the operator to project upcoming events and make strategic decisions. In this paper, we recapitulate the fundamentals of cyber situational awareness and highlight its unique characteristics in comparison to generic situational awareness known from other fields. Subsequently, we provide an overview of existing research and trends in publishing on the topic, introduce front research groups, and highlight the impact of cyber situational awareness research. Further, we propose an updated taxonomy and enumeration of the components used for achieving cyber situational awareness. The updated taxonomy conforms to the widely-accepted three-level definition of cyber situational awareness and newly includes the projection level. Finally, we identify and discuss contemporary research and operational challenges, such as the need to cope with rising volume, velocity, and variety of cybersecurity data and the need to provide cybersecurity operators with the right data at the right time and increase their value through visualization

    Unmanned Aerial Systems: Research, Development, Education & Training at Embry-Riddle Aeronautical University

    Get PDF
    With technological breakthroughs in miniaturized aircraft-related components, including but not limited to communications, computer systems and sensors, state-of-the-art unmanned aerial systems (UAS) have become a reality. This fast-growing industry is anticipating and responding to a myriad of societal applications that will provide new and more cost-effective solutions that previous technologies could not, or will replace activities that involved humans in flight with associated risks. Embry-Riddle Aeronautical University has a long history of aviation-related research and education, and is heavily engaged in UAS activities. This document provides a summary of these activities, and is divided into two parts. The first part provides a brief summary of each of the various activities, while the second part lists the faculty associated with those activities. Within the first part of this document we have separated UAS activities into two broad areas: Engineering and Applications. Each of these broad areas is then further broken down into six sub-areas, which are listed in the Table of Contents. The second part lists the faculty, sorted by campus (Daytona Beach-D, Prescott-P and Worldwide-W) associated with the UAS activities. The UAS activities and the corresponding faculty are cross-referenced. We have chosen to provide very short summaries of the UAS activities rather than lengthy descriptions. If more information is desired, please contact me directly, or visit our research website (https://erau.edu/research), or contact the appropriate faculty member using their e-mail address provided at the end of this document

    Fit for Purpose Enterprise Architecture

    Get PDF
    Today’s enterprises are confronted with an ever-changing environment demanding continuous (digital) transformation. Currently enterprise architects tend to guide these changes with so called \u27one size fits all\u27 architectural approaches. However, tuning such approaches to a variety of change situations is difficult. There is a call for a more flexible instrument among practitioners that is designed to be tailored to the context of a specific situation. Such fit for purpose enterprise architecture approaches have the potential to play a key role in the current times of digital transformation. In this paper we present the first steps towards a situational enterprise architecture approach that is based on differentiating between subsystems within organizations, by defining which characteristics of subsystems are relevant to determining the correct enterprise architecture approach

    Adapting Columbus Operations and Providing a Basis for Future Endeavours

    Get PDF
    On 15th December 2015, Timothy Peake – the 4th ESA astronaut in 20 months – headed into orbit for a 6-month stay on the ISS. The British astronaut's "Principia" mission holds many interesting tasks, not only for Tim Peake himself (he performed an EVA on 15th January 2016) but also for the teams on the ground. One of the most exciting activities was the second session of the Airway Monitoring experiment, which again included an experiment run in the US airlock under coordination of the Columbus Control Centre (Col-CC). Besides that, there were many other experiments, such as EML, PK4, DOSIS and Meteron, and also the transition to new NASA tools (e.g. WebAD) was done in this period. Since the establishment of ESA's new setup in July 2015, Col-CC has been working together with all its partners to define the new interfaces, exploit new possibilities, and define in detail the tasks for the operations teams. Besides the ongoing work to monitor and command Columbus, support the ESA experiments on the ISS, as well as supporting the ESA astronaut himself, Col-CC is looking forward towards potential future tasks and challenges. Based on many years of experience in human space flight, an initial study was launched to investigate some of the challenges of human space flight activities beyond Earth orbit. One of these challenges is the delay of communication transmissions experienced over long distances. Until now, all our human space flight operations have been based on (near) real-time communications to monitor and control the spacecraft. This paper describes the results of our study investigating the necessary changes to current operations in the case of long-distance communications. Example procedures are assessed on their reliance on real-time communications and thus how current operations would be impacted by transmission delays. Methods are proposed to make the procedures tolerant to delays, and enable operations to use these procedures for deep space missions

    Latency in Visionic Systems: Test Methods and Requirements

    Get PDF
    A visionics device creates a pictorial representation of the external scene for the pilot. The ultimate objective of these systems may be to electronically generate a form of Visual Meteorological Conditions (VMC) to eliminate weather or time-of-day as an operational constraint and provide enhancement over actual visual conditions where eye-limiting resolution may be a limiting factor. Empirical evidence has shown that the total system delays or latencies including the imaging sensors and display systems, can critically degrade their utility, usability, and acceptability. Definitions and measurement techniques are offered herein as common test and evaluation methods for latency testing in visionics device applications. Based upon available data, very different latency requirements are indicated based upon the piloting task, the role in which the visionics device is used in this task, and the characteristics of the visionics cockpit display device including its resolution, field-of-regard, and field-of-view. The least stringent latency requirements will involve Head-Up Display (HUD) applications, where the visionics imagery provides situational information as a supplement to symbology guidance and command information. Conversely, the visionics system latency requirement for a large field-of-view Head-Worn Display application, providing a Virtual-VMC capability from which the pilot will derive visual guidance, will be the most stringent, having a value as low as 20 msec

    Product Development Process for Small Unmanned Aerial Systems

    Get PDF
    The DoD has recognized the need for persistent Intelligence, Surveillance and Reconnaissance (ISR) over the last two decades. Recent developments with commercial drones have changed the market structure; there is now a thriving and extensive market base for drone based remote sensing. This research provides system engineering methods to support the DoD use of this burgeoning market to meet operational ISR needs. The three contributions of this research are: a process to support Small Unmanned Aerial Systems (SUAS) design, tools to support the design process, and tools to support risk assessment and reduction for both design and operations. The process and tools are presented via an exemplar design for an ISR SUAS mission. The exemplar design flows from user needs through to an allocated baseline with an assessment of system reliability based on a compilation of commercial component reliability and failure modes

    Cybersecurity Acquisition Framework Based on Risk Management: Economics Perspective

    Get PDF
    Acquisition Research Program Sponsored Report SeriesSponsored Acquisition Research & Technical ReportsCyber attacks continuously target organizations, however, the mitigation actions taken for defense are not sufficiently effective. Ability to compute the cost of attacks is crucial to assess the effectiveness of countermeasure investments. In this study, we developed a framework to have a well-informed decision-making process in cybersecurity acquisition by evaluating the business impact caused by the operability losses of assets. We tested the developed framework using various attack and mitigation scenarios. The findings suggest that using a simulation approach to calculate the business impact of cyber attacks provides the ability to support decision-making process.Approved for public release; distribution is unlimited.Approved for public release; distribution is unlimited

    Mission Assurance: A Review of Continuity of Operations Guidance for Application to Cyber Incident Mission Impact Assessment (CIMIA)

    Get PDF
    Military organizations have embedded information technology (IT) into their core mission processes as a means to increase operational efficiency, improve decision-making quality, and shorten the sensor-to-shooter cycle. This IT-to-mission dependence can place the organizational mission at risk when an information incident (e.g., the loss or manipulation of a critical information resource) occurs. Non-military organizations typically address this type of IT risk through an introspective, enterprise-wide focused risk management program that continuously identifies, prioritizes, and documents risks so an economical set of control measures (e.g., people, processes, technology) can be selected to mitigate the risks to an acceptable level. The explicit valuation of information resources in terms of their ability to support the organizational mission objectives provides transparency and enables the creation of a continuity of operations plan and an incident recovery plan. While this type of planning has proven successful in static environments, military missions often involve dynamically changing, time-sensitive, complex, coordinated operations involving multiple organizational entities. As a consequence, risk mitigation efforts tend to be localized to each organizational entity making the enterprise-wide risk management approach to mission assurance infeasible. This thesis investigates the concept of mission assurance and presents a content analysis of existing continuity of operations elements within military and non-military guidance to assess the current policy landscape to highlight best practices and identify policy gaps in an effort to further enhance mission assurance by improving the timeliness and relevance of notification following an information incident
    • …
    corecore