5,994 research outputs found

    Instructional Strategies for Scenario-Based Training of Human Behavior Cue Analysis with Robot-Aided Intelligence, Surveillance, Reconnaissance

    Get PDF
    The U.S. Army desires to improve safety during Intelligence, Surveillance, Reconnaissance (ISR) operations by removing Warfighters from direct line-of-fire by enhancing ISR operational capabilities with unmanned systems, also known as Robot-Aided ISR (RAISR) (DOD, 2013). Additionally, RAISR presents an opportunity to fulfill ISR capability requirements of modern combat environments including: detection of High-Value Individuals (HVI) from safer distances, identification of baseline behavior, and interpretation of adversarial intent (U.S. Army, 2008). Along with the demand and projected acquisition of RAISR technology, there is the added need to design training requirements for system operation and task execution instruction. While documentation identifying specific training standards and objectives for ISR tasks utilizing unmanned systems is limited (DOD, 2013), simulation-based training has been identified as a critical training medium for RAISR (U.S. Army, 2008). ISR analysts will primarily conduct RAISR tasks via Indirect Vision Displays (IVD) which transition well into multimodal simulations (Salcedo, Lackey, & Maraj, 2014). However, simulation alone may not fulfill the complex training needs of RAISR tasks, therefore, incorporating instructional support may improve the effectiveness of training (Oser, Gualtieri, Cannon-Bowers, & Salas, 1999). One method to accomplish this is to utilize a Scenario-Based Training (SBT) framework enhanced with instructional strategies to target specific training objectives. The purpose for the present experiment was to assess the effectiveness of SBT enhanced with selected instructional strategies for a PC-based RAISR training simulation. The specific task type was the identification of HVIs within a group through behavior cue analysis. The instructional strategies assessed in this experiment, Highlighting and Massed Exposure, have shown to improve attentional weighting, visual search, and pattern recognition skills, which are critical for successful behavior cue analysis. Training effectiveness was evaluated by analyzing the impact of the instructional strategies on performance outcomes, including detection accuracy, classification accuracy, and median response time, and perceptions of the level of engagement, immersion, and presence during training exercises. Performance results revealed that the Massed Exposure strategy produced significantly faster response times for one subtle and one familiar target behavior cue. Perception results indicated that Highlighting was the least challenging instructional strategy and the Control offered the preferred level of challenge. The relationships between performance and perception measures revealed that higher levels of engagement, immersion, and presence were associated with better performance in the Control, but this trend did not always hold for Massed Exposure and Highlighting. Furthermore, presence emerged as the primary predictor of performance for select target behavior cues in the Control and Massed Exposure conditions, while immersion and engagement predicted performance of select cues in the Highlighting condition. The findings of the present experiment point to the potential benefit of SBT instructional strategies to improve effectiveness of simulation-based training for behavior cue analysis during RAISR operations. Specifically, the findings suggest that the Massed Exposure strategy has the potential to improve response time when detecting both familiar and novel targets. The results also highlight directions for future research to investigate methods to alter instructional strategy design and delivery in order to improve trainee perceptions of the instruction

    MISSION ENGINEERING METHODOLOGY FOR REALIZATION OF UNMANNED SURFACE VESSEL OPERATIONS

    Get PDF
    The Navy has included unmanned systems as a key enabler for the future fleet. Congress has mandated that the Navy (PMS 406) provide demonstrated testing and documentation sufficient to support transition of Unmanned Surface Vessels (USVs) from prototype to operational. Commercial USV certification examples only address safety of navigation and do not provide certification requirements for autonomy, nor do they consider the operational mission context or requirements for the USVs. No current methodology exists that decomposes the certification metrics and standards, including the complexity of the intended USV missions. Mission engineering (ME) provides the systems engineering rigor and methodology to ensure that the USV prototypes are evaluated in their intended missions. The mission objectives were captured in Design Reference Missions (DRMs). The DRMs provided the operational sequence of events for the USVs to accomplish their mission in support of commander's intent. The DRMs decomposed into mission essential tasks (METs). The METs were mapped to the critical systems performing the METs. This methodology can be further analyzed to produce the complete complement of certification requirements for PMS 406. Analysis revealed several gaps. The communications systems and the human-in-the-loop interaction with the USVs need to be reevaluated based upon the mission analysis.Civilian, Department of the NavyApproved for public release. Distribution is unlimited

    USMC VERTICAL TAKEOFF AND LANDING AIRCRAFT: HUMAN–MACHINE TEAMING FOR CONTROLLING UNMANNED AERIAL SYSTEMS

    Get PDF
    The United States Marine Corps (USMC) is investing in aviation technologies through its Vertical Takeoff and Landing (VTOL) aircraft program that will enhance mission superiority and warfare dominance against both conventional and asymmetric threats. One of the USMC program initiatives is to launch unmanned aerial systems (UAS) from future human-piloted VTOL aircraft for collaborative hybrid (manned and unmanned) missions. This hybrid VTOL-UAS capability will support USMC intelligence, surveillance, and reconnaissance (ISR), electronic warfare (EW), communications relay, and kinetic strike air to ground missions. This capstone project studied the complex human-machine interactions involved in the future hybrid VTOL-UAS capability through model-based systems engineering analysis, coactive design interdependence analysis, and modeling and simulation experimentation. The capstone focused on a strike coordination and reconnaissance (SCAR) mission involving a manned VTOL platform, a VTOL-launched UAS, and a ground control station (GCS). The project produced system requirements, a system architecture, a conceptual design, and insights into the human-machine teaming aspects of this future VTOL capability.Major, United States ArmyMajor, United States ArmyMajor, United States ArmyMajor, United States ArmyMajor, United States ArmyApproved for public release. Distribution is unlimited

    Networking and Application Interface Technology for Wireless Sensor Network Surveillance and Monitoring

    Get PDF
    Distributed unattended ground sensor networks used in battlefield surveillance and monitoring missions, have proven to be valuable in providing a tactical information advantage required for command and control, intelligence, surveillance, and reconnaissance planning. Operational effectiveness for surveillance missions can be enhanced further through network centric capability, where distributed UGS networks have the ability to perform surveillance operations autonomously. NCC operation can be enhanced through UGSs having the ability to evaluate their awareness of the current joint surveillance environment, in order to provide the necessary adaptation to dynamic changes. NCC can also provide an advantage for UGS networks to self-manage their limited operational resources efficiently, according to mission objective priority. In this article, we present a cross-layer approach and highlight techniques that have potential to enable NCC operation within a mission-orientated UGS surveillance setting

    PlaceRaider: Virtual Theft in Physical Spaces with Smartphones

    Full text link
    As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites. A new strain of sensor malware has been developing that leverages these sensors to steal information from the physical environment (e.g., researchers have recently demonstrated how malware can listen for spoken credit card numbers through the microphone, or feel keystroke vibrations using the accelerometer). Yet the possibilities of what malware can see through a camera have been understudied. This paper introduces a novel visual malware called PlaceRaider, which allows remote attackers to engage in remote reconnaissance and what we call virtual theft. Through completely opportunistic use of the camera on the phone and other sensors, PlaceRaider constructs rich, three dimensional models of indoor environments. Remote burglars can thus download the physical space, study the environment carefully, and steal virtual objects from the environment (such as financial documents, information on computer monitors, and personally identifiable information). Through two human subject studies we demonstrate the effectiveness of using mobile devices as powerful surveillance and virtual theft platforms, and we suggest several possible defenses against visual malware

    INCORPORATING RADIO FREQUENCY MESH NETWORKS TO LINK LIVE, VIRTUAL, CONSTRUCTIVE TRAINING

    Get PDF
    Given the importance of modeling and simulation (M&S) for creating realistic training environments and employing or developing tactical systems for warfighters, the Department of Defense is turning toward live, virtual, constructive (LVC) simulations as a means to prepare and equip our military for the next war. M&S offers a unique competency for modeling emergent enemy behaviors in constructive simulations on virtual battlefields across the globe. Transferring these dynamic tactical actions to live command and control (C2) systems used during training can create decision-making opportunities for distributed units to react to and act upon. The research conducted in this thesis assessed, developed, and implemented an appropriate LVC environment that can be used in training for tactical convoy operations in the Marine Corps. We developed a robust mesh network connected to a personal computer running a constructive simulation to create dynamic tracks on handheld, Android-based C2 systems. Using low-bandwidth radios to create the network, we were able to create a rich, tactically realistic training environment while minimally increasing the combat load of our Marines. The system we created has the same functionality of the blue force tracker (BFT). Because the BFT is no longer funded, we recommend the LVC solution we created for this thesis as a potential replacement with embedded training capabilities.Captain, United States Marine CorpsApproved for public release. distribution is unlimite

    Cooperative Unmanned Aerial Surveillance Control System Architecture

    Get PDF
    Intelligence, surveillance and reconnaissance (ISR) is a high-demand Department of Defense mission performed by unmanned aircraft systems (UASs) at the tactical and theater levels. Coordinating UASs through cooperative control offers the advantages of persistence, distributed and adaptable sensor coverage, and reduced revisit time on points of interest. The purpose of this thesis is to apply systems engineering principles to the problem of developing a flexible, common control system for cooperative UAS surveillance at the tactical level. The AFIT team developed a concept of operations (CONOPS) encompassing various users and surveillance tasks. The team then used the scenarios in the CONOPS to build a conceptual architecture. Concurrently, the team constructed a developmental test system that closely resembled the architecture and successfully conducted flight tests of multiple aircraft. The team then used this architecture and the prototype system to identify significant technical risks and future research areas to be explored prior to the development of an operational system

    Research Naval Postgraduate School, v.12, no.3, October 2002

    Get PDF
    NPS Research is published by the Research and Sponsored Programs, Office of the Vice President and Dean of Research, in accordance with NAVSOP-35. Views and opinions expressed are not necessarily those of the Department of the Navy.Approved for public release; distribution is unlimited
    • …
    corecore