50,868 research outputs found

    Galileo and EGNOS as an asset for UTM safety and security

    Get PDF
    GAUSS (Galileo-EGNOS as an Asset for UTM Safety and Security) is a H2020 project1 that aims at designing and developing high performance positioning systems for drones within the U-Space framework focusing on UAS (Unmanned Aircraft System) VLL (Very Low Level) operations. The key element within GAUSS is the integration and exploitation of Galileo and EGNOS exceptional features in terms of accuracy, integrity and security, which will be key assets for the safety of current and future drone operations. More concretely, high accuracy, authentication, precise timing (among others) are key GNSS (Global Navigation Satellite System) enablers of future integrated drone operations under UTM (UAS Traffic Management) operations, which in Europe will be deployed under U-Space [1]. The U-Space concept helps control, manage and integrate all UAS in the VLL airspace to ensure the security and efficiency of UAS operations. GAUSS will enable not only safe, timely and efficient operations but also coordination among a higher number of RPAS (Remotely Piloted Aircraft System) in the air with the appropriate levels of security, as it will improve anti-jamming and anti-spoofing capabilities through a multi-frequency and multi-constellation approach and Galileo authentication operations. The GAUSS system will be validated with two field trials in two different UTM real scenarios (in-land and sea) with the operation of a minimum of four UTM coordinated UAS from different types (fixed and rotary wing), manoeuvrability and EASA (European Aviation Safety Agency) operational categories. The outcome of the project will consist of Galileo-EGNOS based technological solutions to enhance safety and security levels in both, current UAS and future UTM operations. Increased levels of efficiency, reliability, safety, and security in UAS operations are key enabling features to foster the EU UAS regulation, market development and full acceptance by the society.Peer ReviewedPostprint (author's final draft

    Thoughts about a General Theory of Influence in a DIME/PMESII/ASCOP/IRC2 Model

    Get PDF
    The leading question of this paper is: “How would influence warfare (“iWar”) work and how can we simulate it?” The paper discusses foundational aspects of a theory and model of influence warfare by discussing a framework built along the DIME/PMESII/ASCOP dimension forming a prism with three axes. The DIME concept groups the many instruments of power a nation state can muster into four categories: Diplomacy, Information, Military and Economy. PMESII describes the operational environment in six domains: Political, Military, Economic, Social, Information and Infrastructure. ASCOPE is used in counter insurgency (COIN) environments to analyze the cultural and human environment (aka the “human terrain”) and encompasses Areas, Structures, Capabilities, Organization, People and Events. In addition, the model reflects about aspects of information collection requirements (ICR) and information capabilities requirements (ICR) - hence DIME/PMESII/ASCOP/ICR2. This model was developed from an influence wargame that was conducted in October 2018. This paper introduces basic methodical questions around model building in general and puts a special focus on building a framework for the problem space of influence/information/hybrid warfare takes its shape in. The article tries to describe mechanisms and principles in the information/influence space using cross discipline terminology (e.g. physics, chemistry and literature). On a more advanced level this article contributes to the Human, Social, Culture, Behavior (HSCB) models and community. One goal is to establish an academic, multinational and whole of government influence wargamer community. This paper introduces the idea of the perception field understood as a molecule of a story or narrative that influences an observer. This molecule can be drawn as a selection of vectors that can be built inside the DIME/PMESII/ASCOP prism. Each vector can be influenced by a shielding or shaping action. These ideas were explored in this influence wargame

    Finding a needle in a haystack: toward a psychologically informed method for aviation security screening

    Get PDF
    Current aviation security systems identify behavioral indicators of deception to assess risks to flights, but they lack a strong psychological basis or empirical validation. We present a new method that tests the veracity of passenger accounts. In an in vivo double-blind randomized-control trial conducted in international airports, security agents detected 66% of deceptive passengers using the veracity test method compared with less than 5% using behavioral indicator recognition. As well as revealing advantages of veracity testing over behavioral indicator identification, the study provides the highest levels to date of deception detection in a realistic setting where the known base rate of deceptive individuals is low

    Pinocchio's Pupil: Using Eyetracking and Pupil Dilation to Understand Truth Telling and Deception in Sender-Receiver Games

    Get PDF
    We report experiments on sender-receiver games with an incentive for senders to exaggerate. Subjects "overcommunicate" -- messages are more informative of the true state than they should be, in equilibrium. Eyetracking shows that senders look at payoffs in a way that is consistent with a level-k model. A combination of sender messages and lookup patterns predicts the true state about twice as often as predicted by equilibrium. Using these measures to infer the state would enable receiver subjects to hypothetically earn 16-21 percent more than they actually do, an economic value of 60 percent of the maximum increment

    Trust and Fiscal Performance: A Panel Analysis with Swiss Data

    Get PDF
    Citizens are willing to abandon their short-term financial interest in free-riding considerably, if governments act in their interest, if procedures of the public decisions-making process are felt to be fair and if other fellow-citizens have to contribute also an adequate share to the community. In such a situation trustworthiness of a government and trust in a government is high. This paper provides empirical evidence that trust is crucial for fiscal performance using data for the full sample of Swiss cantons over the 1981-2001 period. In cantons with high levels of trust, the level of indebtedness is significantly lower. Trust supports fiscal discipline. In order to get a useful approximation for mutual trust among citizens and between citizens and their representatives, we use information from direct voter participation on political issues (initiatives and public referenda) held in Swiss state (cantonal) governments. Electoral support of government proposals reveals an important aspect of trust in a real world setting. Hence, our trust variable measures the behavior at the ballots thereby reducing possible subjective biases derived from surveys and questionnaires.Trust, Social capital, Fiscal performance, Indebtedness

    Data and Predictive Analytics Use for Logistics and Supply Chain Management

    Get PDF
    Purpose The purpose of this paper is to explore the social process of Big Data and predictive analytics (BDPA) use for logistics and supply chain management (LSCM), focusing on interactions among technology, human behavior and organizational context that occur at the technology’s post-adoption phases in retail supply chain (RSC) organizations. Design/methodology/approach The authors follow a grounded theory approach for theory building based on interviews with senior managers of 15 organizations positioned across multiple echelons in the RSC. Findings Findings reveal how user involvement shapes BDPA to fit organizational structures and how changes made to the technology retroactively affect its design and institutional properties. Findings also reveal previously unreported aspects of BDPA use for LSCM. These include the presence of temporal and spatial discontinuities in the technology use across RSC organizations. Practical implications This study unveils that it is impossible to design a BDPA technology ready for immediate use. The emergent process framework shows that institutional and social factors require BDPA use specific to the organization, as the technology comes to reflect the properties of the organization and the wider social environment for which its designers originally intended. BDPA is, thus, not easily transferrable among collaborating RSC organizations and requires managerial attention to the institutional context within which its usage takes place. Originality/value The literature describes why organizations will use BDPA but fails to provide adequate insight into how BDPA use occurs. The authors address the “how” and bring a social perspective into a technology-centric area

    Vulnerability of the agricultural sector to climate change: The development of a pantropical Climate Risk Vulnerability Assessment to inform sub-national decision making

    Get PDF
    As climate change continues to exert increasing pressure upon the livelihoods and agricultural sector of many developing and developed nations, a need exists to understand and prioritise at the sub national scale which areas and communities are most vulnerable. The purpose of this study is to develop a robust, rigorous and replicable methodology that is flexible to data limitations and spatially prioritizes the vulnerability of agriculture and rural livelihoods to climate change. We have applied the methodology in Vietnam, Uganda and Nicaragua, three contrasting developing countries that are particularly threatened by climate change. We conceptualize vulnerability to climate change following the widely adopted combination of sensitivity, exposure and adaptive capacity. We used Ecocrop and Maxent ecological models under a high emission climate scenario to assess the sensitivity of the main food security and cash crops to climate change. Using a participatory approach, we identified exposure to natural hazards and the main indicators of adaptive capacity, which were modelled and analysed using geographic information systems. We finally combined the components of vulnerability using equal-weighting to produce a crop specific vulnerability index and a final accumulative score. We have mapped the hotspots of climate change vulnerability and identified the underlying driving indicators. For example, in Vietnam we found the Mekong delta to be one of the vulnerable regions due to a decline in the climatic suitability of rice and maize, combined with high exposure to flooding, sea level rise and drought. However, the region is marked by a relatively high adaptive capacity due to developed infrastructure and comparatively high levels of education. The approach and information derived from the study informs public climate change policies and actions, as vulnerability assessments are the bases of any National Adaptation Plans (NAP), National Determined Contributions (NDC) and for accessing climate finance
    • 

    corecore