A Network Centric Info-Structure for the Swedish Armed Forces
|
|
- Gillian Norman
- 8 years ago
- Views:
Transcription
1 A Network Centric Info-Structure for the Swedish Armed Forces Klas Wallenius, CelsiusTech Systems AB Summary The commonly accepted concept of Situational Awareness is discussed, where the knowledge of own and enemy resources and their relations to the environment is essential to make good decisions. In addition, the concept of Information Awareness is suggested, to measure the information and its value to the users. A network centric info-structure is proposed, with a Common Battle-Space Model that is supporting situational awareness for all decision-makers in the organisation. The common model includes information regarding the situation, the environment and the decisions. The difficulties in designing such a model include most of all the need for information control, for which Information Awareness is essential. The Saab solutions to design essential parts of the Common Battles-Space Model include the Wide Area Situation Picture, WASP, and the Multi- Sensor Tracker, MST. Yet a substantial research effort remains to complete the battle-space model. The development of a common planning system to maintain and evaluate decision alternatives is particularly important. 1. Introduction A Revolution in Military Affairs, RMA, is the label often used to indicate the vast changes that are foreseen in modern armed forces around the world. [5] The revolution will enforce completely new doctrines and organisations for warfare. New ways of running business in the commercial sector, exploiting the fast development of information technology, will influence this revolution. The concepts of warfare leveraged by the new technology are sometimes described as Network Centric Warfare [1]. The network centric view, as opposed to the traditional platform centric view, will imply that information obtained somewhere in the organisation can be shared by anyone else that is connected to the network. This enables decentralised decision making and a reduced number of levels in the management hierarchies. This will, in turn, give much faster reactions to events in the battle-space. The Swedish Armed Forces has extensive intentions to develop an RMA concept [5]. One effort in this direction is the research on a Mobile Joint Command and Control Function, with the Swedish acronym ROLF [10]. The IQ Ledning programme aims at proposing an info-structure that is supporting such a ROLF unit. It is a joint study programme between Saab AB, The National Defence College of Sweden (FHS), the Defence Research Establishment (FOA), the Swedish Defence Materiel Administration (FMV), and the Royal Institute of Technology (KTH). Another study programme is performed in cooperation between SaabTech Systems AB and FMV, to find methods and concepts for a Wide Area Situation Picture, WASP. The views presented in this article are mainly based on experiences from the IQ Ledning and the WASP programmes. However, these are only two of the activities in the RMA arena that SaabTech Systems AB takes part in. 2. Situational Awareness and Information Awareness The concept of Situational Awareness usually includes the states of own and enemy forces, the environment, and the relationship between the forces and the environment [4]. There is a decision scheme for officers in the Swedish Armed Forces [6]. This scheme requires that the purpose and goals of the task and knowledge of own and enemy forces are considered to maintain the decision alternatives. The knowledge of the forces includes a comparison of the capacity under present terrain and weather conditions. By considering these aspects, operators will make their decisions based on a well-founded awareness of how to optimally exploit their own However, not only weapons and forces should be included among the resources that the operators have to be aware of. As the achievement of dominant battle-space awareness will take a more vital part of the operations, decisions concerning how to best use the information resources (such as sensors, intelligence, data links and even the 220
2 capacity of the decision-makers) will gain in importance. Everything cannot be known at a given moment since there is a cost for using the resources needed to obtain the information. At the same time the difference between knowing something, and not knowing something, may be essential for the outcome of the operation. To maximise the total benefit of the information resources, a means of measuring the usefulness of the information is required. The decision-makers should always be aware of to what extent they can trust the information, and what information they have, compared to what information they need in their current assignments. They should also (somehow) be aware of how they could benefit by using more of the information Thus we state that Information Awareness must be included to give full situational awareness. In older systems, Information Awareness came with no or little computer-based support. The data presented usually originated from one source (e.g. radar) or a few similar sources only. The operators then learnt how to trust the data by intuition and experience, and also by some rather primitive quality numbers. In future systems, the origin of the data will be so complex that intuition will be of little or no help anymore. Computer-based support to achieve better Information Awareness will thus grow in importance. Such support in its simplest manner is performed independently of the intended usage of the information. Full support for Information Awareness, though, will also require a model of the decisions to be considered, and will thus be much harder to achieve [8, 9]. In [2], three measures are defined that, if presented together with the information, will give a larger degree of Information Awareness to the users: 1. Precision to denote measures of the "correctness" of data, 2. Quality to denote its fitness for purpose, 3. Utility to denote the expected benefit for the use. Of these three measures, only 'quality' and 'utility' depend upon the purpose to which the information is applied. 3. A Network Centric Info-Structure the Common Battle-Space Model Traditional systems of systems for military organisations have been platform centric. The communication bandwidth between the units (command and control centres, aircraft, tanks, etc.) has been very limited compared to the communication within each unit. The information flows between different units have been explicitly defined and thus very inflexible. The information exchange in such a platform centric info-structure is naturally message based, i.e. certain message formats are predefined for different kinds of reports and orders. The different units maintain local models of the assumed situation in the battle-space. As a result of the difficulty that they have had sharing information, different units have historically used their own sensors and data processing capabilities to maintain their own local models of the battle-space. There has been little or no means to keep these models consistent between the platforms. By use of modern network technology, communication bandwidth now has been much more achievable. At the same time, standardised communication protocols have made it considerably cheaper to offer services across all units connected to a network. Thus, the view can be changed from defining information flows between the platforms to, instead, defining the common information model available to all units. Force Coordination Other Organisations Sensors Force Control The Common Battle-Space Model: Decisions Environment Situation Intelligence Weapons Control Other infosources Data Fusion Figure 1. The suggested info-structure a common model of the battle-space made available for the different levels of decisionmakers. We sugges t such a common model, the Common Battle-Space Model (see Figure 1), which will include all aspects of situational awareness for all users. In other words: the model should include pieces of information relevant to all decisionmakers on all different levels in the military organisation. The implementation of this model would imply a tremendous improvement of decision performance. Better and faster situational awareness together with a larger flexibility would lead to a much better utilisation of available Referring to the definition of Situational Awareness, we see three major categories of 221
3 information to be shared by the decision-makers in the Common Battle-Space Model: 1. Situation. Estimated states of objects in the battle-space. The states include identity, type, kinematics, and logistic status of the objects. 2. Environment. Information on phenomena that cannot be affected by own or enemy actions, e.g. weather, terrain, and doctrines. 3. Decisions. Purpose and goals for the missions, together with both rejected and selected decision alternatives ( plans ). The decision alternatives describe how available resources can be exploited to accomplish the purpose of the missions. For each alternative an estimate of the expected outcome is required in terms of utility for the organisation compared to the costs for resource exploitation. One commander s decision to exploit resources, to achieve his goals, will of course define new goals for the commanders of those The mission definitions and the decision alternatives are thus included in the same category of information, which will require a common planning service, available to all the users. 4. New difficulties Clearly, the network centric approach presents new difficulties for the designers of the info-structure since there are very different requirements on the information for different decision-makers. At the lowest control levels, the decision-makers have very specialised assignments. They need detailed information, with good timeliness and accuracy. At the same time they are very often mobile, leading to limited communication capacity. At higher levels there is a tendency for generality and a demand for overview. The decisions may be seen more as a matter of resource allocation rather than controlling different weapons and platforms. At these higher levels, the focus may be on other, non real-time, information, e.g. information on political, international law and treaty, and economical issues. A key difficulty to overcome in designing a network centric info-structure will be how to keep the battle-space model relevant to each of the different classes of users, given their substantially various information requirements. We propose the usage of hierarchical aggregation as a partial solution. By arranging objects in groups (and in groups of groups), the users could easily select the level of abstraction that suits their current assignments. The design must also accommodate many contributors of information to the common battlespace model, any of whom may contribute information which is inconsistent with other information, whilst maintaining model consistency. Maintaining information security will be another key concern, especially when there are information exchanges with other organisations: media, civil organisations, and allied forces (and maybe even with the enemy to apply pressure during negotiations). Thus it must be possible to make decisions on the access to the information for the different users. The competing demands of precision versus limited bandwidth need to be considered. The data streams must be controlled, which will limit the precision available for some users. This will be of particular importance to users connected to the network via low bandwidth data links. There are also competing demands of real time versus non-real time data due to the nature of the data types - non real-time data tend to come in larger chunks, congesting the network in its narrow parts. Real-time data streams must then be given higher priority to meet their timeliness requirements. Furthermore, the info-structure designed for warfare also must anticipate that C2 centres and sensors may be captured or destroyed and that the network occasionally may be cut off due to attacks and jamming performed by the enemy. It should still be possible to make full use of the remaining resources to assemble a battle-space model of as high quality as possible. Emphasis on co-ordinating the collection and dissemination of information will increase, since sensors and intelligence services will be limited resources available to the competing needs of decision-makers in the organisation. Further issues include the limited capacity of the decision-makers themselves. Methods to compile and present the information to the decision-makers, suitable to their current tasks and work-pressure, constitute an essential part of the research on ROLF [10]. Altogether there must be a control of the information collection and the information flows in the system, to make optimal use of available resources, and to meet security requirements. The emphasis on information control will be much larger than before. Since the information by default is shared in a network centric info-structure, it is the exceptions from sharing information that must be managed. In platform centric systems, the information control is built in, by the fact that all information flows are defined explicitly in hardware and software. Information control will require methods for data reduction, bandwidth regulation, data filtering, managing of public keys and resource management. The usage of these methods should be kept simple. Metaphors have to be developed for bandwidth consumption and 222
4 information classification to make the problems understandable and solvable for decision-makers. Common to all problems of information control is, however, the need for information awareness, as defined in Section 2. There has to be an understanding of the usefulness of information and the possibilities to achieve better information. 5. WASP the Wide Area Situation Picture SaabTech Systems has developed the methods needed to meet the requirements for a common description of the situation in the battle-space. WASP the Wide Area Situation Picture is truly network centric, and is designed to Give information on moving objects for different users, with common target numbers. Be robust to attacks, jamming and technical disturbances, Fully utilise currently available information resources: sensors, C2 centres, data links, and data fusion capabilities (all from many different suppliers). Always indicate the resulting data precision due to the currently available information Be fully scalable, allowing for thousands of both users and contributors. Be easy to integrate, even with existing systems and data links. The achievement of the WASP is performed on two levels. Data from sensors and human reporters are entered into the system on the sensor data level. The active and passive sensors may be of very different kind, giving measurements of one up to three or even more dimensions. A measurement could be a one-dimensional bearing to the target or a complex data record including bearing, range, elevation and Doppler information. A measurement may also give indications that can be used to estimate the object s type or identity. Data fusion is performed to combine these sensor data to estimate what objects there are, and where they are in the battle space. SaabTech Systems AB has the solution for this - the Multi-Sensor Tracker (MST), with the future add-on of automatic type estimation ( MST+). The MST is capable to utilise many different sensors from any supplier as long as there is output on the sensor data level. Theoretically, data fusion is best performed when data from as many sensors as possible are being used. In some cases it is even necessary to feed data from more than one sensor to the tracker, for instance when only passive sensors are used. Thus it would seem appropriate to have only one data fusion node in the network, using data distributed from all available sensors. There are however several reasons why data fusion on the sensor data level will be performed at more than one place and why there has to be means to combine data also on the track level. First of all, the usage of one single MST in the entire system would imply a very vulnerable solution. Redundancy will be needed to meet the requirements for robustness. Secondly, from some sensors there can only be track data distributed, because of the construction of the sensor or because of the available bandwidth. Thirdly, the connection of centres and systems belonging to other organisations will give tracks in most cases. The WASP Correlator Unit (WCU), is used to perform the required track correlation. The participating track sources (C2 units, data fusion nodes and networks belonging to other organisations) are connected to the network, and to each other, via the WCUs. All software necessary to establish the WASP is encapsulated in these WCUs. Thus, the adaptation effort for each type of track source is kept at a minimum, see Figure 2. Figure 2. The WASP network. The local track data is correlated to the global track data, received from other WCUs (via the network), to determine which tracks that correspond to the same real objects. This correlation process is fully automatic, although it will be possible to perform manual interaction. Special care is taken in the WCUs to estimate the precision of the tracks. Local data that is either unique or of better precision than the global data, is reported to the other WCUs. In this way the network will distribute only the best track data that is available for each object. Finally, the actual Wide Area Situation Picture is assembled for presentation to the local operators. 223
5 To reduce bandwidth consumption, the total surveillance area is divided into smaller subscription areas. For each such area there are several bandwidth levels that could be subscribed to by using multicast services in the network. On the lowest bandwidth level, information on all objects in the subscription area is reported, although at a rather low update rate. Higher accuracy is achieved by subscribing to higher levels, thus requiring more bandwidth in the network. The WASP concept will be fully scalable, due to the selected correlation algorithm and the use of multicast. Thousands of C2 units can be connected and there will be no limit on the total surveillance area. The survivability of the WASP will be outstanding. Although sensors, data links and C2 units may come and go, each operator will still achieve the best quality and consistency from the WASP. 6. Conclusions The Common Battles-Space Model will increase the decision performance dramatically. The combination of MST+ and WASP has the capacity to take a substantial part of the implementation of the model. These concepts can make flexible use of very different kinds of data sources and they already exist on the prototype level. By the bandwidth management, the subscription for data, and the careful estimation of data precision, we already are on the way to support Information Awareness. [3] P-O Fjällström, G. Neider, M. Persson, T. Risch, and P. Svensson. Architecture principels for information superiority in future command and control systems (in Swedish). Technical Report FOA-R DE, ISSN , Defence Research Establishment, FOA (Sweden), [4] V. Gawron, Situational Awareness (Lecture notes), H. Silver and Associates, UK, [5] HKV. RMA A new foundation for defense forces development (in Swedis h). Technical Report HKV :63046, Swedish National Defence, [6] HKV. StabsR 1 Fu (in Swedish), Swedish National Defence, [7] L. Jönsson, G. Neider, J. Schubert, P.Svensson. Information Fusion for the Tactical Intelligence Process. An Informal Introduction to the Key Technology for Dominant Battlespace Awareness (in Swedish). Technical Report FOA-R SE, ISSN , Defence Research Establishment, FOA (Sweden), [8] H. Raiffa. Decision Analysis. Reading: Addison-Wesley, [9] L. Seligman, P. Lehner, K. Smith, C. Elsaesser, and D. Mattox, Decision-centric information monitoring, Journal of Intelligent Information Systems, 14(1), March, [10] C. Sundin, and H. Friman. Rolf 2010 a mobile joint command and control concept. Technical Report ISBN ISSN , Swedish Defence College, Yet there is a large amount of research remaining to make the model work in its full extent. Especially the service required for maintaining decision alternatives and mission definitions need certain care. Such a planning tool is essential for effective resource exploitation. Acknowledgments The views here presented are based on discussions with the people in the IQ Ledning and WASP programmes, and with Daniel Wängelin, SaabTech Systems AB. Thank you all for these stimulating moments. References [1] D.S. Alberts, J.J. Gartska, and F.P. Stein. Network Centric Warfare. U.S. D.o.D., [2] S. Arnborg, H. Artman, K. Wallenius, Information Awareness in Command and Control: Precision, Quality, Utility. 3 rd International Conference on Information Fusion, Paris Klas Wallenius, M.Sc. E.E., has been working with the data fusion group at SaabTech Systems AB since He is currently the technical manager for the WASP development program. 224
Sensor Integration in the Security Domain
Sensor Integration in the Security Domain Bastian Köhler, Felix Opitz, Kaeye Dästner, Guy Kouemou Defence & Communications Systems Defence Electronics Integrated Systems / Air Dominance & Sensor Data Fusion
More informationLong Term Defence Study
Long Term Defence Study 2014-09-10 LtCol Johan Hansson SwAF HQ 1 Long Term Defence Studies Three main objectives: To identify uncertainties. To create some scenarios which demonstrates the coming challenges
More informationREAL-TIME STREAMING ANALYTICS DATA IN, ACTION OUT
REAL-TIME STREAMING ANALYTICS DATA IN, ACTION OUT SPOT THE ODD ONE BEFORE IT IS OUT flexaware.net Streaming analytics: from data to action Do you need actionable insights from various data streams fast?
More informationSolving Agencies Big Data Challenges: PED for On-the-Fly Decisions
White Paper Solving Agencies Big Data Challenges: PED for On-the-Fly Decisions Carina Veksler, NetApp March 2012 WP-7158 ABSTRACT With the growing volumes of rich sensor data and imagery used today to
More informationHow To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
More informationHow To Design A System Design For Surveillance Systems
A System Design for Surveillance Systems Protecting Critical Infrastructures 1 FOI (Swedish Defence Research Agency) Box 1165, SE-581 11 Linköping, Sweden {jungert, nikha, niclas.wadstromer}@foi.se Erland
More information2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
More informationCity Technology Platform Technical Architecture Context
December 2013 City Technology Platform Technical Architecture Context Intro A major component of the 24m Future City Demonstrator award from the Technology Strategy Board (TSB) has been the design and
More informationwww. thalesgroup. com Network Management Systems
www. thalesgroup. com Network Management Systems NETWORK MANAGEMENT SYSTEMS FROM THALES Based on Thales' highly successful dynamic management software, the NMS family of Link 16 products provides fully
More informationOur long-term transformation strategy will exploit these tactical advances to achieve two key operational level objectives:
TASK FORCE ASW Anti-Submarine Warfare Conceptt off Operrattiions fforr tthe 21 s st t Centturry BACKGROUND As we sail deeper into the 21 st century, Anti-Submarine Warfare (ASW) will remain a core mission
More informationAGILITY CHALLENGES AND SOLUTIONS FOR C2 SOFTWARE
14th ICCRTS C2 and Agility AGILITY CHALLENGES AND SOLUTIONS FOR C2 SOFTWARE Captain JANILMA PERES Captain MARCOS LEHMKUHL Captain DANIEL MAIER Major ANDERSONN KOHL BRAZILIAN ARMY Outline 1. Introduction
More informationPotential Role of an Enterprise Service Bus (ESB) in Simulation
Doug Stapleton IBM Australia Limited 28 Sydney Avenue, Forrest ACT 2603 AUSTRALIA dougstap@au1.ibm.com ABSTRACT This paper considers eight areas where an Enterprise Service Bus (ESB) can contribute to
More informationCOMBATSS-21 Scalable combat management system for the world s navies
COMBATSS-21 Scalable combat management system for the world s navies The COMBATSS-21 total ship combat management system was designed to deliver capability rapidly and affordably. Built on an open architecture,
More informationData analytics Delivering intelligence in the moment
www.pwc.co.uk Data analytics Delivering intelligence in the moment January 2014 Our point of view Extracting insight from an organisation s data and applying it to business decisions has long been a necessary
More informationwww.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS)
www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) Certified Foundation Watchkeeper X is built to the same standards as a manned aircraft, and conforms to CAA/MAA standards. It
More informationDet talte ord gælder
Thank you for the invitation. I m pleased to be given this opportunity to speak to you about Homeland Security, seen from my point of view. Homeland Security is a concept we ve all grown very familiar
More informationAUSA Background Brief
AUSA Background Brief No. 96 November 2002 An Institute of Land Warfare Publication Space, Missile Defense and Computer Network Operations Challenges: Computer Network Operations: A Critical Element of
More informationCUSTOMER KEYNOTE Hal Buddenbohm
CUSTOMER KEYNOTE Hal Buddenbohm Supply Chain Director ITT Force Protection Systems Hal Buddenbohm is the Supply Chain Director at ITT Force Protection Systems in Thousand Oaks, CA. Prior to joining ITT,
More informationNow when it comes to mapping suppliers, the King of models is undoubtedly Kraljic's Matrix, also know as Supplier Positioning. 1
We are currently seeing a lot of interest in the Purchasing world on more carefully managed supplier relationships and their potential to generate value. Why now? Well, it's likely that many organisations
More informationHigh-value, affordable, sustainable special missions solutions.
SPECIAL MISSIONS High-value, affordable, sustainable special missions solutions. When government, military and commercial customers want airborne solutions for critical missions, they turn to Beechcraft.
More informationService Oriented Architecture (SOA) for DoD
Service Oriented Architecture (SOA) for DoD Prof. Paul A. Strassmann January 9, 2008 1 Part 1 SOA Requirements 2 The DoD Challenge 3 Most DoD Projects Have Own Data Projects 07 Budget $ Millions Number
More informationOracle Value Chain Planning Inventory Optimization
Oracle Value Chain Planning Inventory Optimization Do you know what the most profitable balance is among customer service levels, budgets, and inventory cost? Do you know how much inventory to hold where
More informationSecurity is one of the biggest concerns today. Ever since the advent of the 21 st century, the world has been facing several challenges regarding the security of people, economy, and infrastructure. One
More informationQinetiQ has recently contributed to inquiries undertaken by Parliament s Joint Standing Committee
QinetiQ SUBMISSION TO THE FIRST PRINCIPLES REVIEW OF DEFENCE QinetiQ is one of Australia s largest independent providers of specialist technical advisory services to Defence. We are a trusted partner to
More informationAeroVironment, Inc. Unmanned Aircraft Systems Overview Background
AeroVironment, Inc. Unmanned Aircraft Systems Overview Background AeroVironment is a technology solutions provider with a more than 40-year history of practical innovation in the fields of unmanned aircraft
More informationIUID Asset tracking for the U.S. Army
IUID Asset Tracking for the U.S. Army locate and track mission critical assets before boots are on the ground. Getting materiel deployed on time is essential for a safe and successful mission. That means
More informationArmy Intelligence Industry Day Foundation Layer Technology Focus Areas
CLEARED FOR PUBLIC RELEASE Army Intelligence Industry Day Foundation Layer Technology Focus Areas 27 JULY 2015 Mark Kitz System of Systems Engineering CLEARED FOR PUBLIC RELEASE 1 MISSION: Provide affordable,
More informationSecurity Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
More informationProviding On-Demand Situational Awareness
ITT Exelis Geospatial Intelligence Solutions Providing On-Demand Situational Awareness Use of U.S. Department of Defense (DoD) and U.S. Army imagery in this brochure does not constitute or imply DoD or
More informationEnabling Cloud Architecture for Globally Distributed Applications
The increasingly on demand nature of enterprise and consumer services is driving more companies to execute business processes in real-time and give users information in a more realtime, self-service manner.
More informationINTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
More informationImage credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations
More informationDepartment of Finance and Deregulation. Data Mining and Analysis of AusTender Data 2011-12. February 2013
Department of Finance and Deregulation Data Mining and Analysis of AusTender Data 2011-12 February 2013 December 2012 Table of Contents 1. Background... 1 2. Executive Summary... 2 3. Methodology... 6
More information22C:22 (CS:2820) Object-Oriented Software Development
The University of Iowa 22C:22 (CS:2820) Object-Oriented Software Development Fall 2012 Software Complexity by Cesare Tinelli Complexity Software systems are complex artifacts Failure to master this complexity
More informationSoftware Reprogramming Policy for Electronic Warfare and Target Sensing Systems
Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY
More informationSILOBREAKER ENTERPRISE SOFTWARE SUITE
INSIGHT AS A SERVICE SILOBREAKER ENTERPRISE SOFTWARE SUITE Fully customizable behind your firewall! Silobreaker Enterprise Software Suite is Silobreaker s flagship product. It is ideal for organizations
More informationMultisensor Data Fusion and Applications
Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: varshney@syr.edu
More informationSB-Plan: Simulation-based support for resource allocation and mission planning
SB-Plan: Simulation-based support for resource allocation and mission planning Pontus Svenson, FOI Ledningssystem ponsve@foi.se Christian Mårtenson, FOI Ledningssystem cmart@foi.se 0. Abstract In future
More informationA Multi Agent System for MS Windows using Matlab-enabled Agents
A Multi Agent System for MS Windows using Matlab-enabled Agents Th.M. Hupkens a R.Thaens b a Royal Netherlands Naval College, Combat Systems Department, P.O. Box 10000, 1780 CA Den Helder, The Netherlands
More informationwww.thalesgroup.com Sotas The world class multi-media vehicle system by Courtesy of Comonwealth of Australia
www.thalesgroup.com The world class multi-media vehicle system by Courtesy of Comonwealth of Australia Optimal Solutions for the Battlefield For many years, is the benchmark for vehicle communication systems,
More informationEvent Processing Middleware for Wireless Sensor Networks
Event Processing Middleware for Wireless Sensor Networks Selvakennedy Selvadurai University of Sydney Outline Introduction System Assumptions EPM Architecture Group Management and Centre Localisation Components
More informationArmy Doctrine Update
Combined Arms Doctrine Directorate US Army Combined Arms Center Fort Leavenworth, Kansas Army Doctrine Update This document summarizes some doctrinal changes that have occurred or will occur in the near
More informationNetVision. NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management. Solution Datasheet
Version 2.0 - October 2014 NetVision Solution Datasheet NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management According to analyst firm Berg Insight, the installed base
More informationSurveillance and Security Systems
Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems
More informationTake control of lending credit risk
Enterprise Software overview Take control of lending credit risk Market leading credit management, origination and workflow tools for commercial lending Before Misys FusionBanking Credit Management Enterprise,
More informationIntroduction. Chapter 1
1 Chapter 1 Introduction Robotics and automation have undergone an outstanding development in the manufacturing industry over the last decades owing to the increasing demand for higher levels of productivity
More informationPhysical Security Services
Physical Security Services The ANVIL Group Physical Security Services The ANVIL Group is an internationally renowned and accredited security company specialising in Crisis Avoidance. Established in 1988,
More informationBBC Technology Strategy
BBC Technology Strategy Issued: January 2010 For more information contact: Spencer.piggott@bbc.co.uk Copyright 2010 BBC All Rights Reserved TECHNOLOGY STRATEGY Introduction This paper defines the BBC s
More informationDebt Collection Agencies: The Key to Improved Recoveries? A Decision Analytics briefing paper from Experian
Debt Collection Agencies: The Key to Improved Recoveries? A Decision Analytics briefing paper from Experian June 2007 Introduction Credit lenders exploiting the use of debt collection agencies to manage
More informationVortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex
More informationThe Advantages of a Cloud Based Training and Simulation
Cloud for training and simulation: the right approach Training can no longer be viewed as an add-on or an afterthought. It is an integral part of defence capability: a means not just of improving technical
More informationMs. Sandy Veautour Chief Systems Engineer PSG
Ms. Sandy Veautour Chief Systems Engineer PSG SBIR Initiatives Phase I FY 07 3 Awards High Speed Wireless 3-D Video Transmission to Support Virtual Dismounted Training 2 Phase I contract awards Battlefield
More informationData for the Public Good. The Government Statistical Service Data Strategy
Data for the Public Good The Government Statistical Service Data Strategy November 2013 1 Foreword by the National Statistician When I launched Building the Community - The Strategy for the Government
More information3. Provide the capacity to analyse and report on priority business questions within the scope of the master datasets;
Business Intelligence Policy Version Information A. Introduction Purpose Business Intelligence refers to the practice of connecting facts, objects, people and processes of interest to an organisation in
More informationAsset Tracking System
Asset Tracking System System Description Asset & Person Tracking 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and
More informationHow To Use Open Source Software In Defence
Open Source Software in the Defence Industry Anthony Harrison Thales anthony.harrison@uk.thalesgroup.com Abstract: There are an increasing number of defence programmes incorporating open source software
More informationAnnouncement of a new IAEA Co-ordinated Research Programme (CRP)
Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)
More informationFREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Continuous Monitoring 1. What is continuous monitoring? Continuous monitoring is one of six steps in the Risk Management Framework (RMF) described in NIST Special Publication
More informationThe Advantages of Enterprise Historians vs. Relational Databases
GE Intelligent Platforms The Advantages of Enterprise Historians vs. Relational Databases Comparing Two Approaches for Data Collection and Optimized Process Operations The Advantages of Enterprise Historians
More informationBio-inspired cyber security for your enterprise
Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t
More informationService Oriented Architectures in the Delivery of Capability
Service Oriented Architectures in the Delivery of Capability Abstract Duncan Russell, Jie Xu {duncanr jxu}@comp.leeds.ac.uk School of Computing, University of Leeds, UK Service oriented architecture (SOA)
More informationThe Importance of Analytics
CIPHER Briefing The Importance of Analytics July 2014 Renting 1 machine for 1,000 hours will be nearly equivalent to renting 1,000 machines for 1 hour in the cloud. This will enable users and organizations
More informationAvailable online at www.sciencedirect.com Available online at www.sciencedirect.com. Advanced in Control Engineering and Information Science
Available online at www.sciencedirect.com Available online at www.sciencedirect.com Procedia Procedia Engineering Engineering 00 (2011) 15 (2011) 000 000 1822 1826 Procedia Engineering www.elsevier.com/locate/procedia
More informationCYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
More informationSecure information exchange
www.thales.no Secure information exchange 2 together. Safer. Everywhere. Whenever critical decisions need to be made, Thales has a role to play. In all its markets aerospace, space, ground transportation,
More informationCAPABILITY FOR DEFENCE IN TURKEY
NETWORK ENABLED CAPABILITY FOR DEFENCE IN TURKEY Mr. Mete ARSLAN, marslan@ssm.gov.tr Presentation Plan Introduction of SSM SSM point of view for NEC concept and National motivation NEC Technical Feasibility
More informationHumayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:humayunbakht@yahoo.co.uk
Applications of mobile ad-hoc networks my article applications of mobile ad-hoc networks at http://www.computingunplugged.com/issues/issue2004 09/00001371001.html Humayun Bakht School of Computing and
More informationNavy Information Dominance Industry Day
Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic
More informationInformation Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189
CALL FOR PAPERS for the IST/SET-126 Symposium on Information Fusion (Hard and Soft) For Intelligence, Surveillance & Reconnaisance (ISR) Joint Symposium IST-106 and SET-189 to be held in Norfolk Virginia,
More informationPer-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
More informationCase No COMP/M.3649 - FINMECCANICA / BAES AVIONICS & COMMUNICATIONS. REGULATION (EC) No 139/2004 MERGER PROCEDURE
EN Case No COMP/M.3649 - FINMECCANICA / BAES AVIONICS & COMMUNICATIONS Only the English text is available and authentic. REGULATION (EC) No 139/2004 MERGER PROCEDURE Article 6(1)(b) NON-OPPOSITION Date:
More informationThe Business Impact of the Cloud. According to 460 Senior Financial Decision-Makers
The Business Impact of the Cloud According to 460 Senior Financial Decision-Makers March 2012 Contents Summary of key findings 4 Finance decision-makers have a high awareness of cloud computing 4 The majority
More informationPropsim enabled Mobile Ad-hoc Network Testing
www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile
More informationCloud computing for noise monitoring
Cloud computing for noise monitoring Thorvald Wetlesen 1 1 Norsonic Gunnersbråtan 2, 3421 Lierskogen, Norway ABSTRACT Cloud computing is the use of computing resources that are delivered as a service over
More informationSytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
More informationINFORMATION COMMUNICATION TECHNOLOGY PLAN
Part 3 ICT Pages 59-64 5/7/03 8:36 AM Page 59 59 PART THREE INFORMATION COMMUNICATION TECHNOLOGY PLAN INTRODUCTION There is an urgent need for the Department of Foreign Affairs to transform its current
More informationSoftware Quality and Infrastructure Protection for Diffuse Computing
FY2001 ONR CIP/SW URI Software Quality and Infrastructure Protection for Diffuse Computing Principal Investigator: Andre Scedrov Institution: University of Pennsylvania URL: http://www.cis.upenn.edu/spyce
More informationDIGITAL STRATEGY 2014-2017
DIGITAL STRATEGY 2014-2017 Digital Strategy CONTENTS Introduction 1 Our Vision 3 Benefits 5 Our Digital Design Principles 6 Our Strategy 8 Our Key Enablers 11 INTRODUCTION SFRS uses digital technology
More informationSatCom For Net-Centric Warfare July/August 2011. MilsatMagazine
SatCom For Net-Centric Warfare July/August 2011 MilsatMagazine Emergency Communications C-COM, Hughes Boeing GPS II-F IvySys Technologies Command Center Guardian Mobility idirect Government Technologies
More informationARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence
ARI ARI 26/2013 (Translated from Spanish) 17 September 2013 Cyber cells: a tool for national cyber security and cyber defence Thiber Theme 1 Cyber cells are effective tools that enable countries to operate,
More informationData Deduplication: An Essential Component of your Data Protection Strategy
WHITE PAPER: THE EVOLUTION OF DATA DEDUPLICATION Data Deduplication: An Essential Component of your Data Protection Strategy JULY 2010 Andy Brewerton CA TECHNOLOGIES RECOVERY MANAGEMENT AND DATA MODELLING
More informationRapheal Holder From Platform to Service in the Network Centric Value Chain October 23, 2003. Internal Information Services
Rapheal Holder From Platform to Service in the Network Centric Value Chain October 23, 2003 Internal Information Services Outline Background Northrop Grumman Service Business Models Service as primary
More informationSensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE
Sensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE Grant Agreement number 611449 Announcement of the Second Competitive
More informationBig data coming soon... to an NSI near you. John Dunne. Central Statistics Office (CSO), Ireland John.Dunne@cso.ie
Big data coming soon... to an NSI near you John Dunne Central Statistics Office (CSO), Ireland John.Dunne@cso.ie Big data is beginning to be explored and exploited to inform policy making. However these
More informationInformation and Understanding (IFU) Overview
Information and Understanding (IFU) Overview Jun 8 th, 2010 Mark Pronobis IFU CTC Lead AFRL/RIEF mark.pronobis@rl.af.mil Approved for Public Release; Distribution Unlimited: 88ABW-2010-2619 dated 13 May
More informationDomain Based Security: Improving Practices
Domain Based Security: Improving Practices Zia Hayat University of Southampton zia.hayat@baesystems.com Jeff Reeve University of Southampton jsr@ecs.soton.ac.uk Chris Boutle BAE SYSTEMS Integrated System
More informationU.S. COMMERCIAL REMOTE SENSING POLICY. April 25, 2003 FACT SHEET
U.S. COMMERCIAL REMOTE SENSING POLICY April 25, 2003 FACT SHEET The President authorized a new national policy on April 25, 2003 that establishes guidance and implementation actions for commercial remote
More informationPredictive Cyber Defense A Strategic Thought Paper
Predictive Cyber Defense A Strategic Thought Paper Don Adams Vice President, Chief Technology Officer, Worldwide Government TIBCO Software Federal, Inc 2 Summary The art and science of multi-sensor data
More informationThe Intelligent Data Network: Proposal for Engineering the Next Generation of Distributed Data Modeling, Analysis and Prediction
Making Sense of your Data The Intelligent Data Network: Proposal for Engineering the Next Generation of Distributed Data Modeling, Analysis and Prediction David L. Brock The Data Center, Massachusetts
More informationConcept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
More informationCHAPTER THREE, Network Services Management Framework
CHAPTER THREE, Acronyms and Terms 3-3 List of Figures 3-4 1 Introduction 3-5 2 Architecture 3-6 2.1 Entity Identification & Addressing 3-7 2.2 Management Domain Registration and Information Service 3-7
More informationProposal Outline: FrOST. Provisional lead partner: Transport for Greater Manchester
Area of Intervention Proposal Outline: FrOST Provisional lead partner: Transport for Greater Manchester This proposal puts forward ideas which address INTERREG Priority 2, specific objective 4 (SO4): To
More informationOSIX Real-time network performance monitoring.
OSIX Real-time network performance monitoring. Polystar s OSIX system offers the telecommunications market innovative monitoring solutions for maximising network performance and managing advanced real-time
More informationReactive Agent Technology for Real-Time, Multisensor Target Tracking
Reactive Agent Technology for Real-Time, Multisensor Target Tracking COSTAS TSATSOULIS AND EDWARD KOMP Department of Electrical Engineering and Computer Science Information and Telecommunication Technology
More information1. Scope of Games and Game Systems. 2. Evolution of Current Game Designs. 3. New Game Forms Utilising New and Emerging Technical Media
Game Development in Networks of the Future Craig Lindley craig.lindley@hgo.se Game Design, Cognition and Artificial Intelligence Research Group Department of Game Design, Narrative and Time-Based Media
More informationData Warehouse Architecture Overview
Data Warehousing 01 Data Warehouse Architecture Overview DW 2014/2015 Notice! Author " João Moura Pires (jmp@di.fct.unl.pt)! This material can be freely used for personal or academic purposes without any
More informationPRACTICAL DATA MINING IN A LARGE UTILITY COMPANY
QÜESTIIÓ, vol. 25, 3, p. 509-520, 2001 PRACTICAL DATA MINING IN A LARGE UTILITY COMPANY GEORGES HÉBRAIL We present in this paper the main applications of data mining techniques at Electricité de France,
More informationCordys Business Operations Platform
SERVICE DEFINITION Cordys Business Operations GCloud IV - PaaS Copyright 2012 Cordys B.V. All rights reserved. Table of Content Cordys Business Operations... 1 Table of Content... 2 Introduction... 4 Document
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
More informationPATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM
Overlook Systems Technologies, Inc. 1950 Old Gallows Road, Suite 400 Vienna, VA 22182 (703)-893-1411 PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM A PROPOSED SOLUTION TO ADDRESS RISK TO U.S. CRITICAL INFRASTRUCTURE
More information