A Network Centric Info-Structure for the Swedish Armed Forces

Size: px
Start display at page:

Download "A Network Centric Info-Structure for the Swedish Armed Forces"

Transcription

1 A Network Centric Info-Structure for the Swedish Armed Forces Klas Wallenius, CelsiusTech Systems AB Summary The commonly accepted concept of Situational Awareness is discussed, where the knowledge of own and enemy resources and their relations to the environment is essential to make good decisions. In addition, the concept of Information Awareness is suggested, to measure the information and its value to the users. A network centric info-structure is proposed, with a Common Battle-Space Model that is supporting situational awareness for all decision-makers in the organisation. The common model includes information regarding the situation, the environment and the decisions. The difficulties in designing such a model include most of all the need for information control, for which Information Awareness is essential. The Saab solutions to design essential parts of the Common Battles-Space Model include the Wide Area Situation Picture, WASP, and the Multi- Sensor Tracker, MST. Yet a substantial research effort remains to complete the battle-space model. The development of a common planning system to maintain and evaluate decision alternatives is particularly important. 1. Introduction A Revolution in Military Affairs, RMA, is the label often used to indicate the vast changes that are foreseen in modern armed forces around the world. [5] The revolution will enforce completely new doctrines and organisations for warfare. New ways of running business in the commercial sector, exploiting the fast development of information technology, will influence this revolution. The concepts of warfare leveraged by the new technology are sometimes described as Network Centric Warfare [1]. The network centric view, as opposed to the traditional platform centric view, will imply that information obtained somewhere in the organisation can be shared by anyone else that is connected to the network. This enables decentralised decision making and a reduced number of levels in the management hierarchies. This will, in turn, give much faster reactions to events in the battle-space. The Swedish Armed Forces has extensive intentions to develop an RMA concept [5]. One effort in this direction is the research on a Mobile Joint Command and Control Function, with the Swedish acronym ROLF [10]. The IQ Ledning programme aims at proposing an info-structure that is supporting such a ROLF unit. It is a joint study programme between Saab AB, The National Defence College of Sweden (FHS), the Defence Research Establishment (FOA), the Swedish Defence Materiel Administration (FMV), and the Royal Institute of Technology (KTH). Another study programme is performed in cooperation between SaabTech Systems AB and FMV, to find methods and concepts for a Wide Area Situation Picture, WASP. The views presented in this article are mainly based on experiences from the IQ Ledning and the WASP programmes. However, these are only two of the activities in the RMA arena that SaabTech Systems AB takes part in. 2. Situational Awareness and Information Awareness The concept of Situational Awareness usually includes the states of own and enemy forces, the environment, and the relationship between the forces and the environment [4]. There is a decision scheme for officers in the Swedish Armed Forces [6]. This scheme requires that the purpose and goals of the task and knowledge of own and enemy forces are considered to maintain the decision alternatives. The knowledge of the forces includes a comparison of the capacity under present terrain and weather conditions. By considering these aspects, operators will make their decisions based on a well-founded awareness of how to optimally exploit their own However, not only weapons and forces should be included among the resources that the operators have to be aware of. As the achievement of dominant battle-space awareness will take a more vital part of the operations, decisions concerning how to best use the information resources (such as sensors, intelligence, data links and even the 220

2 capacity of the decision-makers) will gain in importance. Everything cannot be known at a given moment since there is a cost for using the resources needed to obtain the information. At the same time the difference between knowing something, and not knowing something, may be essential for the outcome of the operation. To maximise the total benefit of the information resources, a means of measuring the usefulness of the information is required. The decision-makers should always be aware of to what extent they can trust the information, and what information they have, compared to what information they need in their current assignments. They should also (somehow) be aware of how they could benefit by using more of the information Thus we state that Information Awareness must be included to give full situational awareness. In older systems, Information Awareness came with no or little computer-based support. The data presented usually originated from one source (e.g. radar) or a few similar sources only. The operators then learnt how to trust the data by intuition and experience, and also by some rather primitive quality numbers. In future systems, the origin of the data will be so complex that intuition will be of little or no help anymore. Computer-based support to achieve better Information Awareness will thus grow in importance. Such support in its simplest manner is performed independently of the intended usage of the information. Full support for Information Awareness, though, will also require a model of the decisions to be considered, and will thus be much harder to achieve [8, 9]. In [2], three measures are defined that, if presented together with the information, will give a larger degree of Information Awareness to the users: 1. Precision to denote measures of the "correctness" of data, 2. Quality to denote its fitness for purpose, 3. Utility to denote the expected benefit for the use. Of these three measures, only 'quality' and 'utility' depend upon the purpose to which the information is applied. 3. A Network Centric Info-Structure the Common Battle-Space Model Traditional systems of systems for military organisations have been platform centric. The communication bandwidth between the units (command and control centres, aircraft, tanks, etc.) has been very limited compared to the communication within each unit. The information flows between different units have been explicitly defined and thus very inflexible. The information exchange in such a platform centric info-structure is naturally message based, i.e. certain message formats are predefined for different kinds of reports and orders. The different units maintain local models of the assumed situation in the battle-space. As a result of the difficulty that they have had sharing information, different units have historically used their own sensors and data processing capabilities to maintain their own local models of the battle-space. There has been little or no means to keep these models consistent between the platforms. By use of modern network technology, communication bandwidth now has been much more achievable. At the same time, standardised communication protocols have made it considerably cheaper to offer services across all units connected to a network. Thus, the view can be changed from defining information flows between the platforms to, instead, defining the common information model available to all units. Force Coordination Other Organisations Sensors Force Control The Common Battle-Space Model: Decisions Environment Situation Intelligence Weapons Control Other infosources Data Fusion Figure 1. The suggested info-structure a common model of the battle-space made available for the different levels of decisionmakers. We sugges t such a common model, the Common Battle-Space Model (see Figure 1), which will include all aspects of situational awareness for all users. In other words: the model should include pieces of information relevant to all decisionmakers on all different levels in the military organisation. The implementation of this model would imply a tremendous improvement of decision performance. Better and faster situational awareness together with a larger flexibility would lead to a much better utilisation of available Referring to the definition of Situational Awareness, we see three major categories of 221

3 information to be shared by the decision-makers in the Common Battle-Space Model: 1. Situation. Estimated states of objects in the battle-space. The states include identity, type, kinematics, and logistic status of the objects. 2. Environment. Information on phenomena that cannot be affected by own or enemy actions, e.g. weather, terrain, and doctrines. 3. Decisions. Purpose and goals for the missions, together with both rejected and selected decision alternatives ( plans ). The decision alternatives describe how available resources can be exploited to accomplish the purpose of the missions. For each alternative an estimate of the expected outcome is required in terms of utility for the organisation compared to the costs for resource exploitation. One commander s decision to exploit resources, to achieve his goals, will of course define new goals for the commanders of those The mission definitions and the decision alternatives are thus included in the same category of information, which will require a common planning service, available to all the users. 4. New difficulties Clearly, the network centric approach presents new difficulties for the designers of the info-structure since there are very different requirements on the information for different decision-makers. At the lowest control levels, the decision-makers have very specialised assignments. They need detailed information, with good timeliness and accuracy. At the same time they are very often mobile, leading to limited communication capacity. At higher levels there is a tendency for generality and a demand for overview. The decisions may be seen more as a matter of resource allocation rather than controlling different weapons and platforms. At these higher levels, the focus may be on other, non real-time, information, e.g. information on political, international law and treaty, and economical issues. A key difficulty to overcome in designing a network centric info-structure will be how to keep the battle-space model relevant to each of the different classes of users, given their substantially various information requirements. We propose the usage of hierarchical aggregation as a partial solution. By arranging objects in groups (and in groups of groups), the users could easily select the level of abstraction that suits their current assignments. The design must also accommodate many contributors of information to the common battlespace model, any of whom may contribute information which is inconsistent with other information, whilst maintaining model consistency. Maintaining information security will be another key concern, especially when there are information exchanges with other organisations: media, civil organisations, and allied forces (and maybe even with the enemy to apply pressure during negotiations). Thus it must be possible to make decisions on the access to the information for the different users. The competing demands of precision versus limited bandwidth need to be considered. The data streams must be controlled, which will limit the precision available for some users. This will be of particular importance to users connected to the network via low bandwidth data links. There are also competing demands of real time versus non-real time data due to the nature of the data types - non real-time data tend to come in larger chunks, congesting the network in its narrow parts. Real-time data streams must then be given higher priority to meet their timeliness requirements. Furthermore, the info-structure designed for warfare also must anticipate that C2 centres and sensors may be captured or destroyed and that the network occasionally may be cut off due to attacks and jamming performed by the enemy. It should still be possible to make full use of the remaining resources to assemble a battle-space model of as high quality as possible. Emphasis on co-ordinating the collection and dissemination of information will increase, since sensors and intelligence services will be limited resources available to the competing needs of decision-makers in the organisation. Further issues include the limited capacity of the decision-makers themselves. Methods to compile and present the information to the decision-makers, suitable to their current tasks and work-pressure, constitute an essential part of the research on ROLF [10]. Altogether there must be a control of the information collection and the information flows in the system, to make optimal use of available resources, and to meet security requirements. The emphasis on information control will be much larger than before. Since the information by default is shared in a network centric info-structure, it is the exceptions from sharing information that must be managed. In platform centric systems, the information control is built in, by the fact that all information flows are defined explicitly in hardware and software. Information control will require methods for data reduction, bandwidth regulation, data filtering, managing of public keys and resource management. The usage of these methods should be kept simple. Metaphors have to be developed for bandwidth consumption and 222

4 information classification to make the problems understandable and solvable for decision-makers. Common to all problems of information control is, however, the need for information awareness, as defined in Section 2. There has to be an understanding of the usefulness of information and the possibilities to achieve better information. 5. WASP the Wide Area Situation Picture SaabTech Systems has developed the methods needed to meet the requirements for a common description of the situation in the battle-space. WASP the Wide Area Situation Picture is truly network centric, and is designed to Give information on moving objects for different users, with common target numbers. Be robust to attacks, jamming and technical disturbances, Fully utilise currently available information resources: sensors, C2 centres, data links, and data fusion capabilities (all from many different suppliers). Always indicate the resulting data precision due to the currently available information Be fully scalable, allowing for thousands of both users and contributors. Be easy to integrate, even with existing systems and data links. The achievement of the WASP is performed on two levels. Data from sensors and human reporters are entered into the system on the sensor data level. The active and passive sensors may be of very different kind, giving measurements of one up to three or even more dimensions. A measurement could be a one-dimensional bearing to the target or a complex data record including bearing, range, elevation and Doppler information. A measurement may also give indications that can be used to estimate the object s type or identity. Data fusion is performed to combine these sensor data to estimate what objects there are, and where they are in the battle space. SaabTech Systems AB has the solution for this - the Multi-Sensor Tracker (MST), with the future add-on of automatic type estimation ( MST+). The MST is capable to utilise many different sensors from any supplier as long as there is output on the sensor data level. Theoretically, data fusion is best performed when data from as many sensors as possible are being used. In some cases it is even necessary to feed data from more than one sensor to the tracker, for instance when only passive sensors are used. Thus it would seem appropriate to have only one data fusion node in the network, using data distributed from all available sensors. There are however several reasons why data fusion on the sensor data level will be performed at more than one place and why there has to be means to combine data also on the track level. First of all, the usage of one single MST in the entire system would imply a very vulnerable solution. Redundancy will be needed to meet the requirements for robustness. Secondly, from some sensors there can only be track data distributed, because of the construction of the sensor or because of the available bandwidth. Thirdly, the connection of centres and systems belonging to other organisations will give tracks in most cases. The WASP Correlator Unit (WCU), is used to perform the required track correlation. The participating track sources (C2 units, data fusion nodes and networks belonging to other organisations) are connected to the network, and to each other, via the WCUs. All software necessary to establish the WASP is encapsulated in these WCUs. Thus, the adaptation effort for each type of track source is kept at a minimum, see Figure 2. Figure 2. The WASP network. The local track data is correlated to the global track data, received from other WCUs (via the network), to determine which tracks that correspond to the same real objects. This correlation process is fully automatic, although it will be possible to perform manual interaction. Special care is taken in the WCUs to estimate the precision of the tracks. Local data that is either unique or of better precision than the global data, is reported to the other WCUs. In this way the network will distribute only the best track data that is available for each object. Finally, the actual Wide Area Situation Picture is assembled for presentation to the local operators. 223

5 To reduce bandwidth consumption, the total surveillance area is divided into smaller subscription areas. For each such area there are several bandwidth levels that could be subscribed to by using multicast services in the network. On the lowest bandwidth level, information on all objects in the subscription area is reported, although at a rather low update rate. Higher accuracy is achieved by subscribing to higher levels, thus requiring more bandwidth in the network. The WASP concept will be fully scalable, due to the selected correlation algorithm and the use of multicast. Thousands of C2 units can be connected and there will be no limit on the total surveillance area. The survivability of the WASP will be outstanding. Although sensors, data links and C2 units may come and go, each operator will still achieve the best quality and consistency from the WASP. 6. Conclusions The Common Battles-Space Model will increase the decision performance dramatically. The combination of MST+ and WASP has the capacity to take a substantial part of the implementation of the model. These concepts can make flexible use of very different kinds of data sources and they already exist on the prototype level. By the bandwidth management, the subscription for data, and the careful estimation of data precision, we already are on the way to support Information Awareness. [3] P-O Fjällström, G. Neider, M. Persson, T. Risch, and P. Svensson. Architecture principels for information superiority in future command and control systems (in Swedish). Technical Report FOA-R DE, ISSN , Defence Research Establishment, FOA (Sweden), [4] V. Gawron, Situational Awareness (Lecture notes), H. Silver and Associates, UK, [5] HKV. RMA A new foundation for defense forces development (in Swedis h). Technical Report HKV :63046, Swedish National Defence, [6] HKV. StabsR 1 Fu (in Swedish), Swedish National Defence, [7] L. Jönsson, G. Neider, J. Schubert, P.Svensson. Information Fusion for the Tactical Intelligence Process. An Informal Introduction to the Key Technology for Dominant Battlespace Awareness (in Swedish). Technical Report FOA-R SE, ISSN , Defence Research Establishment, FOA (Sweden), [8] H. Raiffa. Decision Analysis. Reading: Addison-Wesley, [9] L. Seligman, P. Lehner, K. Smith, C. Elsaesser, and D. Mattox, Decision-centric information monitoring, Journal of Intelligent Information Systems, 14(1), March, [10] C. Sundin, and H. Friman. Rolf 2010 a mobile joint command and control concept. Technical Report ISBN ISSN , Swedish Defence College, Yet there is a large amount of research remaining to make the model work in its full extent. Especially the service required for maintaining decision alternatives and mission definitions need certain care. Such a planning tool is essential for effective resource exploitation. Acknowledgments The views here presented are based on discussions with the people in the IQ Ledning and WASP programmes, and with Daniel Wängelin, SaabTech Systems AB. Thank you all for these stimulating moments. References [1] D.S. Alberts, J.J. Gartska, and F.P. Stein. Network Centric Warfare. U.S. D.o.D., [2] S. Arnborg, H. Artman, K. Wallenius, Information Awareness in Command and Control: Precision, Quality, Utility. 3 rd International Conference on Information Fusion, Paris Klas Wallenius, M.Sc. E.E., has been working with the data fusion group at SaabTech Systems AB since He is currently the technical manager for the WASP development program. 224

Sensor Integration in the Security Domain

Sensor Integration in the Security Domain Sensor Integration in the Security Domain Bastian Köhler, Felix Opitz, Kaeye Dästner, Guy Kouemou Defence & Communications Systems Defence Electronics Integrated Systems / Air Dominance & Sensor Data Fusion

More information

Long Term Defence Study

Long Term Defence Study Long Term Defence Study 2014-09-10 LtCol Johan Hansson SwAF HQ 1 Long Term Defence Studies Three main objectives: To identify uncertainties. To create some scenarios which demonstrates the coming challenges

More information

REAL-TIME STREAMING ANALYTICS DATA IN, ACTION OUT

REAL-TIME STREAMING ANALYTICS DATA IN, ACTION OUT REAL-TIME STREAMING ANALYTICS DATA IN, ACTION OUT SPOT THE ODD ONE BEFORE IT IS OUT flexaware.net Streaming analytics: from data to action Do you need actionable insights from various data streams fast?

More information

Solving Agencies Big Data Challenges: PED for On-the-Fly Decisions

Solving Agencies Big Data Challenges: PED for On-the-Fly Decisions White Paper Solving Agencies Big Data Challenges: PED for On-the-Fly Decisions Carina Veksler, NetApp March 2012 WP-7158 ABSTRACT With the growing volumes of rich sensor data and imagery used today to

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

How To Design A System Design For Surveillance Systems

How To Design A System Design For Surveillance Systems A System Design for Surveillance Systems Protecting Critical Infrastructures 1 FOI (Swedish Defence Research Agency) Box 1165, SE-581 11 Linköping, Sweden {jungert, nikha, niclas.wadstromer}@foi.se Erland

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

City Technology Platform Technical Architecture Context

City Technology Platform Technical Architecture Context December 2013 City Technology Platform Technical Architecture Context Intro A major component of the 24m Future City Demonstrator award from the Technology Strategy Board (TSB) has been the design and

More information

www. thalesgroup. com Network Management Systems

www. thalesgroup. com Network Management Systems www. thalesgroup. com Network Management Systems NETWORK MANAGEMENT SYSTEMS FROM THALES Based on Thales' highly successful dynamic management software, the NMS family of Link 16 products provides fully

More information

Our long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives:

Our long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives: TASK FORCE ASW Anti-Submarine Warfare Conceptt off Operrattiions fforr tthe 21 s st t Centturry BACKGROUND As we sail deeper into the 21 st century, Anti-Submarine Warfare (ASW) will remain a core mission

More information

AGILITY CHALLENGES AND SOLUTIONS FOR C2 SOFTWARE

AGILITY CHALLENGES AND SOLUTIONS FOR C2 SOFTWARE 14th ICCRTS C2 and Agility AGILITY CHALLENGES AND SOLUTIONS FOR C2 SOFTWARE Captain JANILMA PERES Captain MARCOS LEHMKUHL Captain DANIEL MAIER Major ANDERSONN KOHL BRAZILIAN ARMY Outline 1. Introduction

More information

Potential Role of an Enterprise Service Bus (ESB) in Simulation

Potential Role of an Enterprise Service Bus (ESB) in Simulation Doug Stapleton IBM Australia Limited 28 Sydney Avenue, Forrest ACT 2603 AUSTRALIA dougstap@au1.ibm.com ABSTRACT This paper considers eight areas where an Enterprise Service Bus (ESB) can contribute to

More information

COMBATSS-21 Scalable combat management system for the world s navies

COMBATSS-21 Scalable combat management system for the world s navies COMBATSS-21 Scalable combat management system for the world s navies The COMBATSS-21 total ship combat management system was designed to deliver capability rapidly and affordably. Built on an open architecture,

More information

Data analytics Delivering intelligence in the moment

Data analytics Delivering intelligence in the moment www.pwc.co.uk Data analytics Delivering intelligence in the moment January 2014 Our point of view Extracting insight from an organisation s data and applying it to business decisions has long been a necessary

More information

www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS)

www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) Certified Foundation Watchkeeper X is built to the same standards as a manned aircraft, and conforms to CAA/MAA standards. It

More information

Det talte ord gælder

Det talte ord gælder Thank you for the invitation. I m pleased to be given this opportunity to speak to you about Homeland Security, seen from my point of view. Homeland Security is a concept we ve all grown very familiar

More information

AUSA Background Brief

AUSA Background Brief AUSA Background Brief No. 96 November 2002 An Institute of Land Warfare Publication Space, Missile Defense and Computer Network Operations Challenges: Computer Network Operations: A Critical Element of

More information

CUSTOMER KEYNOTE Hal Buddenbohm

CUSTOMER KEYNOTE Hal Buddenbohm CUSTOMER KEYNOTE Hal Buddenbohm Supply Chain Director ITT Force Protection Systems Hal Buddenbohm is the Supply Chain Director at ITT Force Protection Systems in Thousand Oaks, CA. Prior to joining ITT,

More information

Now when it comes to mapping suppliers, the King of models is undoubtedly Kraljic's Matrix, also know as Supplier Positioning. 1

Now when it comes to mapping suppliers, the King of models is undoubtedly Kraljic's Matrix, also know as Supplier Positioning. 1 We are currently seeing a lot of interest in the Purchasing world on more carefully managed supplier relationships and their potential to generate value. Why now? Well, it's likely that many organisations

More information

High-value, affordable, sustainable special missions solutions.

High-value, affordable, sustainable special missions solutions. SPECIAL MISSIONS High-value, affordable, sustainable special missions solutions. When government, military and commercial customers want airborne solutions for critical missions, they turn to Beechcraft.

More information

Service Oriented Architecture (SOA) for DoD

Service Oriented Architecture (SOA) for DoD Service Oriented Architecture (SOA) for DoD Prof. Paul A. Strassmann January 9, 2008 1 Part 1 SOA Requirements 2 The DoD Challenge 3 Most DoD Projects Have Own Data Projects 07 Budget $ Millions Number

More information

Oracle Value Chain Planning Inventory Optimization

Oracle Value Chain Planning Inventory Optimization Oracle Value Chain Planning Inventory Optimization Do you know what the most profitable balance is among customer service levels, budgets, and inventory cost? Do you know how much inventory to hold where

More information

Security is one of the biggest concerns today. Ever since the advent of the 21 st century, the world has been facing several challenges regarding the security of people, economy, and infrastructure. One

More information

QinetiQ has recently contributed to inquiries undertaken by Parliament s Joint Standing Committee

QinetiQ has recently contributed to inquiries undertaken by Parliament s Joint Standing Committee QinetiQ SUBMISSION TO THE FIRST PRINCIPLES REVIEW OF DEFENCE QinetiQ is one of Australia s largest independent providers of specialist technical advisory services to Defence. We are a trusted partner to

More information

AeroVironment, Inc. Unmanned Aircraft Systems Overview Background

AeroVironment, Inc. Unmanned Aircraft Systems Overview Background AeroVironment, Inc. Unmanned Aircraft Systems Overview Background AeroVironment is a technology solutions provider with a more than 40-year history of practical innovation in the fields of unmanned aircraft

More information

IUID Asset tracking for the U.S. Army

IUID Asset tracking for the U.S. Army IUID Asset Tracking for the U.S. Army locate and track mission critical assets before boots are on the ground. Getting materiel deployed on time is essential for a safe and successful mission. That means

More information

Army Intelligence Industry Day Foundation Layer Technology Focus Areas

Army Intelligence Industry Day Foundation Layer Technology Focus Areas CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,

More information

Security Threats on National Defense ICT based on IoT

Security Threats on National Defense ICT based on IoT , pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,

More information

Providing On-Demand Situational Awareness

Providing On-Demand Situational Awareness ITT Exelis Geospatial Intelligence Solutions Providing On-Demand Situational Awareness Use of U.S. Department of Defense (DoD) and U.S. Army imagery in this brochure does not constitute or imply DoD or

More information

Enabling Cloud Architecture for Globally Distributed Applications

Enabling Cloud Architecture for Globally Distributed Applications The increasingly on demand nature of enterprise and consumer services is driving more companies to execute business processes in real-time and give users information in a more realtime, self-service manner.

More information

INTRUSION PREVENTION AND EXPERT SYSTEMS

INTRUSION PREVENTION AND EXPERT SYSTEMS INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion

More information

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations

More information

Department of Finance and Deregulation. Data Mining and Analysis of AusTender Data 2011-12. February 2013

Department of Finance and Deregulation. Data Mining and Analysis of AusTender Data 2011-12. February 2013 Department of Finance and Deregulation Data Mining and Analysis of AusTender Data 2011-12 February 2013 December 2012 Table of Contents 1. Background... 1 2. Executive Summary... 2 3. Methodology... 6

More information

22C:22 (CS:2820) Object-Oriented Software Development

22C:22 (CS:2820) Object-Oriented Software Development The University of Iowa 22C:22 (CS:2820) Object-Oriented Software Development Fall 2012 Software Complexity by Cesare Tinelli Complexity Software systems are complex artifacts Failure to master this complexity

More information

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems

Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY

More information

SILOBREAKER ENTERPRISE SOFTWARE SUITE

SILOBREAKER ENTERPRISE SOFTWARE SUITE INSIGHT AS A SERVICE SILOBREAKER ENTERPRISE SOFTWARE SUITE Fully customizable behind your firewall! Silobreaker Enterprise Software Suite is Silobreaker s flagship product. It is ideal for organizations

More information

Multisensor Data Fusion and Applications

Multisensor Data Fusion and Applications Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: varshney@syr.edu

More information

SB-Plan: Simulation-based support for resource allocation and mission planning

SB-Plan: Simulation-based support for resource allocation and mission planning SB-Plan: Simulation-based support for resource allocation and mission planning Pontus Svenson, FOI Ledningssystem ponsve@foi.se Christian Mårtenson, FOI Ledningssystem cmart@foi.se 0. Abstract In future

More information

A Multi Agent System for MS Windows using Matlab-enabled Agents

A Multi Agent System for MS Windows using Matlab-enabled Agents A Multi Agent System for MS Windows using Matlab-enabled Agents Th.M. Hupkens a R.Thaens b a Royal Netherlands Naval College, Combat Systems Department, P.O. Box 10000, 1780 CA Den Helder, The Netherlands

More information

www.thalesgroup.com Sotas The world class multi-media vehicle system by Courtesy of Comonwealth of Australia

www.thalesgroup.com Sotas The world class multi-media vehicle system by Courtesy of Comonwealth of Australia www.thalesgroup.com The world class multi-media vehicle system by Courtesy of Comonwealth of Australia Optimal Solutions for the Battlefield For many years, is the benchmark for vehicle communication systems,

More information

Event Processing Middleware for Wireless Sensor Networks

Event Processing Middleware for Wireless Sensor Networks Event Processing Middleware for Wireless Sensor Networks Selvakennedy Selvadurai University of Sydney Outline Introduction System Assumptions EPM Architecture Group Management and Centre Localisation Components

More information

Army Doctrine Update

Army Doctrine Update Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near

More information

NetVision. NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management. Solution Datasheet

NetVision. NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management. Solution Datasheet Version 2.0 - October 2014 NetVision Solution Datasheet NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management According to analyst firm Berg Insight, the installed base

More information

Surveillance and Security Systems

Surveillance and Security Systems Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems

More information

Take control of lending credit risk

Take control of lending credit risk Enterprise Software overview Take control of lending credit risk Market leading credit management, origination and workflow tools for commercial lending Before Misys FusionBanking Credit Management Enterprise,

More information

Introduction. Chapter 1

Introduction. Chapter 1 1 Chapter 1 Introduction Robotics and automation have undergone an outstanding development in the manufacturing industry over the last decades owing to the increasing demand for higher levels of productivity

More information

Physical Security Services

Physical Security Services Physical Security Services The ANVIL Group Physical Security Services The ANVIL Group is an internationally renowned and accredited security company specialising in Crisis Avoidance. Established in 1988,

More information

BBC Technology Strategy

BBC Technology Strategy BBC Technology Strategy Issued: January 2010 For more information contact: Spencer.piggott@bbc.co.uk Copyright 2010 BBC All Rights Reserved TECHNOLOGY STRATEGY Introduction This paper defines the BBC s

More information

Debt Collection Agencies: The Key to Improved Recoveries? A Decision Analytics briefing paper from Experian

Debt Collection Agencies: The Key to Improved Recoveries? A Decision Analytics briefing paper from Experian Debt Collection Agencies: The Key to Improved Recoveries? A Decision Analytics briefing paper from Experian June 2007 Introduction Credit lenders exploiting the use of debt collection agencies to manage

More information

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex

More information

The Advantages of a Cloud Based Training and Simulation

The Advantages of a Cloud Based Training and Simulation Cloud for training and simulation: the right approach Training can no longer be viewed as an add-on or an afterthought. It is an integral part of defence capability: a means not just of improving technical

More information

Ms. Sandy Veautour Chief Systems Engineer PSG

Ms. Sandy Veautour Chief Systems Engineer PSG Ms. Sandy Veautour Chief Systems Engineer PSG SBIR Initiatives Phase I FY 07 3 Awards High Speed Wireless 3-D Video Transmission to Support Virtual Dismounted Training 2 Phase I contract awards Battlefield

More information

Data for the Public Good. The Government Statistical Service Data Strategy

Data for the Public Good. The Government Statistical Service Data Strategy Data for the Public Good The Government Statistical Service Data Strategy November 2013 1 Foreword by the National Statistician When I launched Building the Community - The Strategy for the Government

More information

3. Provide the capacity to analyse and report on priority business questions within the scope of the master datasets;

3. Provide the capacity to analyse and report on priority business questions within the scope of the master datasets; Business Intelligence Policy Version Information A. Introduction Purpose Business Intelligence refers to the practice of connecting facts, objects, people and processes of interest to an organisation in

More information

Asset Tracking System

Asset Tracking System Asset Tracking System System Description Asset & Person Tracking 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and

More information

How To Use Open Source Software In Defence

How To Use Open Source Software In Defence Open Source Software in the Defence Industry Anthony Harrison Thales anthony.harrison@uk.thalesgroup.com Abstract: There are an increasing number of defence programmes incorporating open source software

More information

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

Announcement of a new IAEA Co-ordinated Research Programme (CRP) Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication

More information

The Advantages of Enterprise Historians vs. Relational Databases

The Advantages of Enterprise Historians vs. Relational Databases GE Intelligent Platforms The Advantages of Enterprise Historians vs. Relational Databases Comparing Two Approaches for Data Collection and Optimized Process Operations The Advantages of Enterprise Historians

More information

Bio-inspired cyber security for your enterprise

Bio-inspired cyber security for your enterprise Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t

More information

Service Oriented Architectures in the Delivery of Capability

Service Oriented Architectures in the Delivery of Capability Service Oriented Architectures in the Delivery of Capability Abstract Duncan Russell, Jie Xu {duncanr jxu}@comp.leeds.ac.uk School of Computing, University of Leeds, UK Service oriented architecture (SOA)

More information

The Importance of Analytics

The Importance of Analytics CIPHER Briefing The Importance of Analytics July 2014 Renting 1 machine for 1,000 hours will be nearly equivalent to renting 1,000 machines for 1 hour in the cloud. This will enable users and organizations

More information

Available online at www.sciencedirect.com Available online at www.sciencedirect.com. Advanced in Control Engineering and Information Science

Available online at www.sciencedirect.com Available online at www.sciencedirect.com. Advanced in Control Engineering and Information Science Available online at www.sciencedirect.com Available online at www.sciencedirect.com Procedia Procedia Engineering Engineering 00 (2011) 15 (2011) 000 000 1822 1826 Procedia Engineering www.elsevier.com/locate/procedia

More information

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer

More information

Secure information exchange

Secure information exchange www.thales.no Secure information exchange 2 together. Safer. Everywhere. Whenever critical decisions need to be made, Thales has a role to play. In all its markets aerospace, space, ground transportation,

More information

CAPABILITY FOR DEFENCE IN TURKEY

CAPABILITY FOR DEFENCE IN TURKEY NETWORK ENABLED CAPABILITY FOR DEFENCE IN TURKEY Mr. Mete ARSLAN, marslan@ssm.gov.tr Presentation Plan Introduction of SSM SSM point of view for NEC concept and National motivation NEC Technical Feasibility

More information

Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:humayunbakht@yahoo.co.uk

Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:humayunbakht@yahoo.co.uk Applications of mobile ad-hoc networks my article applications of mobile ad-hoc networks at http://www.computingunplugged.com/issues/issue2004 09/00001371001.html Humayun Bakht School of Computing and

More information

Navy Information Dominance Industry Day

Navy Information Dominance Industry Day Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic

More information

Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189

Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189 CALL FOR PAPERS for the IST/SET-126 Symposium on Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189 to be held in Norfolk Virginia,

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Case No COMP/M.3649 - FINMECCANICA / BAES AVIONICS & COMMUNICATIONS. REGULATION (EC) No 139/2004 MERGER PROCEDURE

Case No COMP/M.3649 - FINMECCANICA / BAES AVIONICS & COMMUNICATIONS. REGULATION (EC) No 139/2004 MERGER PROCEDURE EN Case No COMP/M.3649 - FINMECCANICA / BAES AVIONICS & COMMUNICATIONS Only the English text is available and authentic. REGULATION (EC) No 139/2004 MERGER PROCEDURE Article 6(1)(b) NON-OPPOSITION Date:

More information

The Business Impact of the Cloud. According to 460 Senior Financial Decision-Makers

The Business Impact of the Cloud. According to 460 Senior Financial Decision-Makers The Business Impact of the Cloud According to 460 Senior Financial Decision-Makers March 2012 Contents Summary of key findings 4 Finance decision-makers have a high awareness of cloud computing 4 The majority

More information

Propsim enabled Mobile Ad-hoc Network Testing

Propsim enabled Mobile Ad-hoc Network Testing www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile

More information

Cloud computing for noise monitoring

Cloud computing for noise monitoring Cloud computing for noise monitoring Thorvald Wetlesen 1 1 Norsonic Gunnersbråtan 2, 3421 Lierskogen, Norway ABSTRACT Cloud computing is the use of computing resources that are delivered as a service over

More information

Sytorus Information Security Assessment Overview

Sytorus Information Security Assessment Overview Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)

More information

INFORMATION COMMUNICATION TECHNOLOGY PLAN

INFORMATION COMMUNICATION TECHNOLOGY PLAN Part 3 ICT Pages 59-64 5/7/03 8:36 AM Page 59 59 PART THREE INFORMATION COMMUNICATION TECHNOLOGY PLAN INTRODUCTION There is an urgent need for the Department of Foreign Affairs to transform its current

More information

Software Quality and Infrastructure Protection for Diffuse Computing

Software Quality and Infrastructure Protection for Diffuse Computing FY2001 ONR CIP/SW URI Software Quality and Infrastructure Protection for Diffuse Computing Principal Investigator: Andre Scedrov Institution: University of Pennsylvania URL: http://www.cis.upenn.edu/spyce

More information

DIGITAL STRATEGY 2014-2017

DIGITAL STRATEGY 2014-2017 DIGITAL STRATEGY 2014-2017 Digital Strategy CONTENTS Introduction 1 Our Vision 3 Benefits 5 Our Digital Design Principles 6 Our Strategy 8 Our Key Enablers 11 INTRODUCTION SFRS uses digital technology

More information

SatCom For Net-Centric Warfare July/August 2011. MilsatMagazine

SatCom For Net-Centric Warfare July/August 2011. MilsatMagazine SatCom For Net-Centric Warfare July/August 2011 MilsatMagazine Emergency Communications C-COM, Hughes Boeing GPS II-F IvySys Technologies Command Center Guardian Mobility idirect Government Technologies

More information

ARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence

ARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence ARI ARI 26/2013 (Translated from Spanish) 17 September 2013 Cyber cells: a tool for national cyber security and cyber defence Thiber Theme 1 Cyber cells are effective tools that enable countries to operate,

More information

Data Deduplication: An Essential Component of your Data Protection Strategy

Data Deduplication: An Essential Component of your Data Protection Strategy WHITE PAPER: THE EVOLUTION OF DATA DEDUPLICATION Data Deduplication: An Essential Component of your Data Protection Strategy JULY 2010 Andy Brewerton CA TECHNOLOGIES RECOVERY MANAGEMENT AND DATA MODELLING

More information

Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, 2003. Internal Information Services

Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, 2003. Internal Information Services Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, 2003 Internal Information Services Outline Background Northrop Grumman Service Business Models Service as primary

More information

Sensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE

Sensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE Sensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE Grant Agreement number 611449 Announcement of the Second Competitive

More information

Big data coming soon... to an NSI near you. John Dunne. Central Statistics Office (CSO), Ireland John.Dunne@cso.ie

Big data coming soon... to an NSI near you. John Dunne. Central Statistics Office (CSO), Ireland John.Dunne@cso.ie Big data coming soon... to an NSI near you John Dunne Central Statistics Office (CSO), Ireland John.Dunne@cso.ie Big data is beginning to be explored and exploited to inform policy making. However these

More information

Information and Understanding (IFU) Overview

Information and Understanding (IFU) Overview Information and Understanding (IFU) Overview Jun 8 th, 2010 Mark Pronobis IFU CTC Lead AFRL/RIEF mark.pronobis@rl.af.mil Approved for Public Release; Distribution Unlimited: 88ABW-2010-2619 dated 13 May

More information

Domain Based Security: Improving Practices

Domain Based Security: Improving Practices Domain Based Security: Improving Practices Zia Hayat University of Southampton zia.hayat@baesystems.com Jeff Reeve University of Southampton jsr@ecs.soton.ac.uk Chris Boutle BAE SYSTEMS Integrated System

More information

U.S. COMMERCIAL REMOTE SENSING POLICY. April 25, 2003 FACT SHEET

U.S. COMMERCIAL REMOTE SENSING POLICY. April 25, 2003 FACT SHEET U.S. COMMERCIAL REMOTE SENSING POLICY April 25, 2003 FACT SHEET The President authorized a new national policy on April 25, 2003 that establishes guidance and implementation actions for commercial remote

More information

Predictive Cyber Defense A Strategic Thought Paper

Predictive Cyber Defense A Strategic Thought Paper Predictive Cyber Defense A Strategic Thought Paper Don Adams Vice President, Chief Technology Officer, Worldwide Government TIBCO Software Federal, Inc 2 Summary The art and science of multi-sensor data

More information

The Intelligent Data Network: Proposal for Engineering the Next Generation of Distributed Data Modeling, Analysis and Prediction

The Intelligent Data Network: Proposal for Engineering the Next Generation of Distributed Data Modeling, Analysis and Prediction Making Sense of your Data The Intelligent Data Network: Proposal for Engineering the Next Generation of Distributed Data Modeling, Analysis and Prediction David L. Brock The Data Center, Massachusetts

More information

Concept and Project Objectives

Concept and Project Objectives 3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the

More information

CHAPTER THREE, Network Services Management Framework

CHAPTER THREE, Network Services Management Framework CHAPTER THREE, Acronyms and Terms 3-3 List of Figures 3-4 1 Introduction 3-5 2 Architecture 3-6 2.1 Entity Identification & Addressing 3-7 2.2 Management Domain Registration and Information Service 3-7

More information

Proposal Outline: FrOST. Provisional lead partner: Transport for Greater Manchester

Proposal Outline: FrOST. Provisional lead partner: Transport for Greater Manchester Area of Intervention Proposal Outline: FrOST Provisional lead partner: Transport for Greater Manchester This proposal puts forward ideas which address INTERREG Priority 2, specific objective 4 (SO4): To

More information

OSIX Real-time network performance monitoring.

OSIX Real-time network performance monitoring. OSIX Real-time network performance monitoring. Polystar s OSIX system offers the telecommunications market innovative monitoring solutions for maximising network performance and managing advanced real-time

More information

Reactive Agent Technology for Real-Time, Multisensor Target Tracking

Reactive Agent Technology for Real-Time, Multisensor Target Tracking Reactive Agent Technology for Real-Time, Multisensor Target Tracking COSTAS TSATSOULIS AND EDWARD KOMP Department of Electrical Engineering and Computer Science Information and Telecommunication Technology

More information

1. Scope of Games and Game Systems. 2. Evolution of Current Game Designs. 3. New Game Forms Utilising New and Emerging Technical Media

1. Scope of Games and Game Systems. 2. Evolution of Current Game Designs. 3. New Game Forms Utilising New and Emerging Technical Media Game Development in Networks of the Future Craig Lindley craig.lindley@hgo.se Game Design, Cognition and Artificial Intelligence Research Group Department of Game Design, Narrative and Time-Based Media

More information

Data Warehouse Architecture Overview

Data Warehouse Architecture Overview Data Warehousing 01 Data Warehouse Architecture Overview DW 2014/2015 Notice! Author " João Moura Pires (jmp@di.fct.unl.pt)! This material can be freely used for personal or academic purposes without any

More information

PRACTICAL DATA MINING IN A LARGE UTILITY COMPANY

PRACTICAL DATA MINING IN A LARGE UTILITY COMPANY QÜESTIIÓ, vol. 25, 3, p. 509-520, 2001 PRACTICAL DATA MINING IN A LARGE UTILITY COMPANY GEORGES HÉBRAIL We present in this paper the main applications of data mining techniques at Electricité de France,

More information

Cordys Business Operations Platform

Cordys Business Operations Platform SERVICE DEFINITION Cordys Business Operations GCloud IV - PaaS Copyright 2012 Cordys B.V. All rights reserved. Table of Content Cordys Business Operations... 1 Table of Content... 2 Introduction... 4 Document

More information

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50 Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior

More information

PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM

PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM Overlook Systems Technologies, Inc. 1950 Old Gallows Road, Suite 400 Vienna, VA 22182 (703)-893-1411 PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM A PROPOSED SOLUTION TO ADDRESS RISK TO U.S. CRITICAL INFRASTRUCTURE

More information