Advanced User Interface Design and Advanced Internetting for Tactical Security Systems
|
|
|
- Simon Anderson
- 9 years ago
- Views:
Transcription
1 Advanced User Interface Design and Advanced Internetting for Tactical Security Systems S.A. Murray, D.W. Gage, J.P. Bott, D.W. Murphy, W.D Bryan, S.W. Martin, and H. G. Nguyen Space and Naval Warfare Systems Center, San Diego San Diego, California Abstract In recent years, military security forces have operated in a climate of increasing mission complexity and diversity. As a response to such challenges, the US Army Training and Doctrine Command (TRADOC) approved a concept for a Family of Integrated Tactical Security Systems (FITSS) involving integrated security sensor systems to support future operations. In support of this concept the Defense Special Weapons Agency (DSWA), at the request of the US Army Product Manager Physical Security Equipment, initiated two exploratory development projects at SPAWAR Systems Center, San Diego to develop an Advanced User Interface for Tactical Security (AITS) and a Tactical Sensor Internetting and Integration (TS 2 I 2 ) capability. These projects are complementary in approach and application. AITS addresses the human factors and display technologies needed to effectively support tactical security personnel with sensor information in a clear, intuitive manner while TS 2 I 2 is focused on a protocol architecture to support control of multiple tactical sensors using current communications resources. The concepts behind these projects, and their current progress, are described in this paper. Background Military security operations in recent years have shown a trend toward increased mission complexity and diversity, a trend that is exacerbated by budget and manpower constraints. Both operational and acquisition agencies are looking to technology solutions to aid security forces in accomplishing their missions, and distributed sensor systems are being designed that afford wide area surveillance coverage to small numbers of security personnel, augmenting their patrolling duties with enhanced situational awareness. In December 1996 the US Army Training and Doctrine Command approved the US Army Military Police School Concept Statement for a Family of Integrated Tactical Security Systems (FITSS) [1]. This concept statement addressed requirements for a system of robust, man-portable sensors with detection and assessment capabilities to support future operations. The system was to be easy to employ and interoperable with joint forces. FITSS is an open architecture system and stresses maximum use of current commercial-off-the-shelf (COTS) and government-of-the-shelf (GOTS) components but provides for insertion of new technological capabilities as they become available, with minimal interface or communications redesign. Many sensor systems, such as the Remotely Monitored Battlefield Sensor System (REMBASS), Improved Remotely Monitored Battlefield Sensor System (IREMBASS), Tactical Remote Surveillance System (TRSS), and the Platoon Early Warning System (PEWS) have been developed to help ground forces monitor perimeters or collect intelligence information. Each, however, has been designed for a specific application or user community. These systems share a common communications protocol (SEIWG-05) for transmitting data over point-to-point radio links, but are otherwise based on proprietary hardware and software and are not interoperable. Such architectures do not support easy expansion with new sensors, displays, or alternate communication links. The operator interfaces for these systems also require significant operator involvement for interpreting alarms. Alerts from REMBASS and TRSS sensors, for example, are displayed to the operator alphanumerically, i.e., with the identification number of the
2 transmitting sensor. The operator must then correlate these data to sensor locations plotted on a paper map. and mentally fuse them with any other related information prior to determining an appropriate situation response. The FITSS concept is intended to correct current deficiencies and address future operational needs by focusing on interoperable sensors and information integration at the operator interface. To realize this concept, the US Army Product Manager Physical Security Equipment has requested that the Defense Special Weapons Agency (DSWA) initiate two complementary, exploratory development projects: 1) Advanced User Interface for Tactical Security (AITS) and 2) Tactical Security Sensor Internetting and Integration (TS 2 I 2 ). DSWA subsequently tasked SPAWAR Systems Center, San Diego (SSC-SD, a Navy laboratory) to execute these projects, based on extensive laboratory experience in communications architectures, distributed sensors, and human machine interfaces [2, 3, 4, 5, 6]. The AITS project is developing an operator interface to provide integrated and tactically relevant information from multiple types of sensors in a clear and intuitive manner. The interface controls and displays will allow the operator to receive and interpret alert signals and to control sensors without hampering mobility in the field. TS 2 I 2 is developing a communication and interface architecture for distributed sensor systems to interface multiple sensors of varying types (e.g., seismic, acoustic, thermal, etc.) and to support their operation with available tactical communications systems. The AITS Project The objective of the AITS project is to increase the effectiveness of tactical security forces by improving the operator interface for situational awareness and ease of use in integrating new, and different sensor systems. A considerable range of sensor types must be supported in present field operations and technological improvements will expand this number in the future. Tactical security personnel must transport, deploy, and operate such equipment with minimal outside support. AITS can reduce these challenges with a portable interface designed to present an integrated tactical picture to the operator under mobile, hands-free conditions. A modular design approach provides a common set of information to the operator regardless of the number or type of sensors employed. This plug and play scheme is therefore user-focused rather than equipment-focused, and reduces operator task loading through improved humancomputer interaction. The AITS project will develop a proof of concept interface system, and validate its design concepts with a progressive set of user evaluations and operational tests. Approach The AITS project is being conducted in two sequential phases: 1) information gathering, analysis, and baseline system definition, and 2) prototype construction, engineering validation, and systematic user testing. The entire development approach is structured around user involvement and input. User requirements were derived through visits to user facilities, on site interviews and observation of training exercises, and all concept development has been grounded on these identified user needs [7]. Appropriate technologies and human factors methods have been brought to bear as required to satisfy the requirements. Information Requirements Security personnel of the US Army (military police units ), US Marine Corps,, Sensor Control and Management Platoons (SCAMP), and regular combat troops from both services were followed through a variety of field training exercises. The primary missions observed included route and area security, force protection, law and order, battlefield circulation control, amphibious assault support, and Military Operations in Urban Terrain (MOUT). Regardless of the unit or branch of service, the equipment suites for these missions were highly similar and included seismic/acoustic, optical break beam, passive infrared (IR), and magnetic sensors. In general, the security task is continuous, active, and manual. Although auditory warnings are sometimes used to alert personnel about security breaches, the primary method for detecting intrusions is direct, continuous monitoring of displays by system operators. These operators expressed an overall consensus about essential interface support for the security job that included:
3 Target location: Where are they? This information included the locations of the alerting sensors that activated in response to the targets. Some automated means for visually correlating target information to the location of the transmitting sensor is desired; current methods using paper maps are timeconsuming and prone to errors. Assessment capability: What are they? This is a deficiency of current sensor systems. Knowing the type and number of targets greatly assists decisions about deploying scarce security personnel. Relative target locations: Where are they with respect to the operator? This leads to an operatorcentered approach to the display design. Support information: This includes other friendly personnel command elements, terrain data, roads, waterways, etc. This type of information is useful for planning the best response to sensor alerts Geographic information: Specifically, perspective views of terrain topography that help the operator to better understand the location information Communication support: Good communications with other member of their units or with appropriate command echelons are pivotal to successful operations. While not technically a component of the AITS system, display support for the communication function can and should be integrated into the design Raw sensor information: Users requested a display of raw sensor information as a means of confirming processed information. Interface Analysis Examination of relevant human factors and display design principles centered on the key decisions required of security forces when responding to alerts. The technology review of system components focused on the practical implications of their working environment (i.e., in the field and typically on the move). Although the complete results of this analysis are beyond the scope of this report, the specifications of display features included: monoscopic data presentation (i.e., stereoscopic information was not required) color capability for grouping of certain data classes (e.g., headings, target classification, etc.) graphically-based icons for sensor and target classification both visual and auditory directional (azimuth) alerting signals, to orient the user to target location alphanumeric presentation of data needed in generating reports (e.g., range and bearing) a combination of automatic and operator-selectable data presentation formats. Baseline System Design SSC-SD efforts in display design and technology analyses were augmented by a support contract with the Human Interface Technology (HIT) Laboratory at the University of Washington. The HIT Laboratory is an international leader in the generation of innovative control and display concepts and maintains a current awareness of emerging technologies through its visiting scientist programs. In collaboration with the HIT Laboratory, SSC-SD defined a baseline AITS system concept design that includes: A see-through monocular HMD display; this approach will permit the soldier to see the entire working environment with minimal obstruction to vision. All information will be confined to the soldier s field-of-regard (i.e., in the region where he or she is looking). A small, hand-held display is included as a backup device. A control system based primarily on voice recognition. A wrist-worn keyboard and clothing-worn mouse are included as backup tools.
4 An integrated architecture for voice and imagery communication and features for database access. This capability will benefit greatly from the products of the TS 2 I 2 project. In operation sensor alert generates a spatial auditory signal, via headphones, and a directional symbol on the display to orient the user to the azimuth of the intrusion. A small magnetic sensor integrated with the HMD provides sufficient directional information to register display symbology over the real world. When the user s field-of-regard is pointed correctly, visual icons are superimposed over both the target and the alerting sensor; each major class of target and each type of sensor is represented by a unique visual icon. Support information includes magnetic bearing and range to the target. Voice control is used to call up supporting displays such as map images, showing the user s position in relation to any or all alerts and sensors, or raw sensor information displays (e.g., video, sensor data). These additional displays can be located and stabilized anywhere in the user s total visual space, using voice or conventional input controls. The approach described here supports all of the information needs identified during user interviews and field observations, and permits all security tasks to be performed while on-the-move. In addition, the basic technologies and display formats specified in this design are compatible with similar programs for information support to the dismounted soldier (e.g., the Army s Land Warrior program, SIPE). The TS 2 I 2 Project The Tactical Security Sensor Internetting and Integration Project is focused on how to better exploit the surveillance potential of multiple remote sensors using internet communication protocols. This work has been based primarily on the Multipurpose Surveillance and Security Mission Platform (MSSMP), a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions [8]. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder, and makes maximum use of commercial off-the-shelf (COTS) components. With an additional radio transceiver, however, MSSMP can also function as a gateway between existing security/surveillance sensor systems (such as TASS, TRSS, and IREMBASS, and IPbased networks), to support the timely distribution of threat detection and threat assessment information. The MSSMP architecture is, therefore, well positioned for integration with the IP-based tactical radio networks that will evolve in the next decade. The DoD concept for joint services interoperability in the 21st Century, C4I For The Warrior [9], envisions a widely distributed user-driven infrastructure in which the warrior plugs in to obtain information from secure and seamlessly integrated Command Control Computer Communications and Intelligence (C4I) systems. Each branch of service has its own strategy for meeting this vision and IP protocol compliance has been designated as the glue between all of these strategies to obtain and maintain interoperability between the services. The Army Digitization Master Plan (ADMP), the Army s roadmap for fulfilling its Enterprise strategy [10], further states that Army digital data communications will use Internet protocols such as Transmission Control Protocol/User Datagram Protocol (TCP/UDP) and Internet Protocol (IP) as their common thread. TCP is the workhorse transport protocol of the Internet, so much so that the Internet protocol suite is usually referred to as "TCP/IP." Unfortunately, TCP is oriented to continuous data streams rather than discrete messages. Tactical military communications, however (i.e., low bandwidth, high error-rate links in an environment where RF links between mobile nodes dynamically come and go, and where adversaries may be trying to destroy our communications assets), are very different from the extremely high bandwidth, permanently-installed communications channels that support the Internet. TCP is thus poorly matched to the requirements of security sensors and other quasi-autonomous systems [5]. User Datagram Protocol (UDP) is a transport layer protocol that is much simpler than TCP, and allows user processes almost direct access to basic IP operations. UDP is also supported as part of all standard TCP/IP software packages. The TS 2 I 2 project, therefore, is developing tools that build on top of UDP functionality. This project addresses some of the issues associated with using limited-performance IP networks to support
5 tactical security/surveillance sensor applications, i.e., to get the biggest "bang for the bit". Specific goals of the TS 2 I 2 include: Transparent support for communications with both local and distant processors Tailoring to the design communications topology. If, for example, a processor sends a message to another processor, and the message is not acknowledged immediately, then we will want to retransmit the message as quickly as possible, and continue until it is received Adapting to the current communications topology. If another platform doesn't acknowledge any of the messages we send to it over a period of time, then our system should be able to make the inference that either the other node or the channel is down. That is, communications performance data must inform the behavior of the overall system and enable a more autonomous mode of operation, as necessary Prioritization of message transmission, including automatic handling of perishable data. A threat alarm/alert, for example, should have a higher priority than a routine status message, and a newer alarm may or may not be more important than an old one. Transport Layer and Session Layer Tools The TS 2 I 2 Project is addressing functional tools for both the Transport and Session protocol layers of Internet communications. The first task is to develop a tightly written, efficient, and reliable messagebased transport protocol layer for message buffering, numbering, timeouts and acknowledgements. We would, furthermore, like to include all the various performance improvement schemes being pursued as TCP options by the community of Internet protocol developers, such as selective acknowledgements. A second task is to develop an enhanced Session Layer protocol. Operations within this layer are divided into the session connection establishment phase, data-transfer phase, and session connection release phase. The MSSMP system requires Session Layer mechanisms to cleanly support multiple sensor platforms and multiple control stations, to permit the orderly transfer of platform control from one station to another in a variety of circumstances, including: one operator requesting, and receiving, transfer of control of a platform from another operator currently controlling it an operator assuming control of a platform which has lost contact with its current operator an operator (e.g., higher echelon commander) invoking a higher priority in order to "steal" control of a platform from its current operator split control, in which one operator acquires control of one subsystem (e.g., for problem diagnosis and repair) while another operator controls the rest of the platform data sharing, in which multiple operators may have "read only" access to a platforms sensor data output, while just one operator has actual control. These requirements are not unique to MSSMP, but apply to any system with dynamic client-server relationships and requirements for uniqueness of control. Phase 2 Plans The tasks reported here represent Phase 1 of both project efforts, which began in FY 98. Phase 2 will involve construction and user testing of the prototype AITS, using the MSSMP as a data source. In addition, some of the TS 2 I 2 tools will be incorporated into the AITS prototype to evaluate the impact of these new capabilities on surveillance methods and command-level decision support. Phase 2 of the TS 2 I 2 project will additionally focus on possible complications of Session Layer protocol design, such as:
6 command interruption, which has implications for safety and system integrity; the concept of "emergency override" is one which must be further considered the concept of "delegation" of precedence, as tactical requirements shift assignment of operator precedence, as a systematic method for breaking ties between operators of equal precedence, each seeking control of a sensor resource. Summary The common goal of the AITS and TS 2 I 2 projects is to provide enhanced access to information using concepts that are easily adaptable to any security sensor suite. This goal is achieved by involving the user community throughout the development cycle, and through developing general-purpose tools that function on top of existing protocols. The synergy of these two projects will be realized through more flexible control of tactical sensors and through improved situation awareness at all command levels of the security force. Acknowledgements This work has been performed under the Advanced Interface for Tactical Security (AITS) and the Tactical Security Sensor Internetting and Integration (TS 2 I 2 ) Exploratory Development (6.2) projects, sponsored by the Defense Special Weapons Agency. References 1. US Army Training and Doctrine Command (TRADOC) Pamphlet Bryan, W.D., Nguyen, H.G., and Gage, D.W. (1998). Man-Portable Networked Sensor System. SPIE Proceedings 3394: Sensor Technology for Soldier Systems, Orlando, FL, April Nguyen, H.G., Marsh, W.C., and Bryan, W.D. (1996).Virtual Systems: Aspects of the Air-Mobile Ground Security and Surveillance System Prototype. Unmanned Systems, (vol. 14, no. 1). Winter. ** 4. Gage, D.W. (1997). Network Protocols for Mobile Robot Systems. SPIE Proceedings. 3210: Mobile Robots XII. Pittsburgh, PA, October Gage, D.W., Bryan, W.D., and Nguyen, H.G. (1998). Internetting Tactical Security Sensor Systems. SPIE Vol. 3393: Digitization of the Battlespace, Orlando, FL, April ** 6. Martin, B.F. and Bryan, W.D. (1995). Low-Cost Miniature Interface and Control Systems for Smart Sensors, Tactical Radios, and Computer Networks. IEEE Military Communications Conference (MILCOM 95). SanDiego,CA,Nov.6-8. ** 7. Murray, S.A. (in press). Advanced Interfaces for Tactical Security Part 1 (SSC-SD Technical Report). 8. Multipurpose Security and Surveillance Mission Platform Command and Control Umbrella The Army Digitization Office. ** Available on the Internet at URL under Publications.
Coordinated Operation Capability Using Scalable C2
Coordinated Operation Capability Using Scalable C2 Authors: Hüseyin KUTLUCA, İbrahim AKSU, Arda ÜNAL MilSOFT Yazılım Teknolojileri A.Ş. Teknokent, 06800 ODTU Ankara / TURKEY [email protected] [email protected]
"Nowa Technika Wojskowa" Nr 12/2011 AS A READY, PROVEN AND COMPREHENSIVE C3I SYSTEM TO SUPPORT LAND FORCES ACTIVITIES The Network Centric Data Communication Platform is a modular, completely prepared according
AeroVironment, Inc. Unmanned Aircraft Systems Overview Background
AeroVironment, Inc. Unmanned Aircraft Systems Overview Background AeroVironment is a technology solutions provider with a more than 40-year history of practical innovation in the fields of unmanned aircraft
COMBATSS-21 Scalable combat management system for the world s navies
COMBATSS-21 Scalable combat management system for the world s navies The COMBATSS-21 total ship combat management system was designed to deliver capability rapidly and affordably. Built on an open architecture,
Intelligent Surveillance & Security Systems
Intelligent Surveillance & Security Systems Weapon Station (Optional) - Lethal / Non-lethal weapon - Universal Gun Mount Tracking Module - Low light, High resolution Camera - Illuminator - Laser Range
Sensor Integration in the Security Domain
Sensor Integration in the Security Domain Bastian Köhler, Felix Opitz, Kaeye Dästner, Guy Kouemou Defence & Communications Systems Defence Electronics Integrated Systems / Air Dominance & Sensor Data Fusion
Flexible, Life-Cycle Support for Unique Mission Requirements
Flexible, Life-Cycle Support for Unique Mission Requirements We Meet the Need Anytime, Anywhere, Any Mission The customers we serve are diverse and so are their requirements. Transformational logistics
Totally Wireless Video Security
Traditional Video Surveillance ($50,000+) vs. Event-Based Videofied Solution ($2,500) Executive Summary: Totally Wireless Video Security has been effective but cost and complexity has limited deployment
The future of range instrumentation.
ROCKWELL COLLINS Common Range Integrated Instrumentation System (CRIIS) The future of range instrumentation. A proven solution for accurately testing next-generation weapon systems. The speed and accuracy
> SOTAS The world class multimedia vehicle intercom system. www.thalesgroup.com/netherlands
> SOTAS The world class multimedia vehicle intercom system www.thalesgroup.com/netherlands >> Optimal Solutions for the Battlefield Today, armed forces are involved in a wide spectrum of operations, from
NEW ROLES FOR UUVS IN INTELLIGENCE, SURVEILLANCE, AND RECONNAISSANCE
NEW ROLES FOR UUVS IN INTELLIGENCE, SURVEILLANCE, AND RECONNAISSANCE Barbara Fletcher Space and Naval Warfare Systems Center D744 San Diego, CA USA [email protected] ABSTRACT Intelligence, Surveillance,
An ESRI White Paper May 2007 Mobile GIS for Homeland Security
An ESRI White Paper May 2007 Mobile GIS for Homeland Security ESRI 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL [email protected] WEB www.esri.com Copyright 2007 ESRI
Ms. Sandy Veautour Chief Systems Engineer PSG
Ms. Sandy Veautour Chief Systems Engineer PSG SBIR Initiatives Phase I FY 07 3 Awards High Speed Wireless 3-D Video Transmission to Support Virtual Dismounted Training 2 Phase I contract awards Battlefield
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao
Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities Dr. William Kao Agenda Introduction - Sensors, Actuators, Transducers Sensor Types, Classification Wireless Sensor Networks
Simulation and Training Solutions
Simulation and Training Solutions Strong Learning Experiences Available Nowhere Else Advancing Operational Readiness with Leading-Edge Simulation and Training The rapid evolution of military missions,
Propsim enabled Mobile Ad-hoc Network Testing
www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile
Surveillance and Security Technologies for Bridges and Tunnels
Surveillance and Security Technologies for Bridges and Tunnels Sheila Rimal Duwadi, P.E., Team Leader Bridge Safety, Reliability and Security, Federal Highway Administration, 6300 Georgetown Pike, McLean
Introduction. Industry Changes
Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise
Networked unattended ground sensors for battlefield visualization
AARMS Vol. 3, No. 3 (2004) 387 399 TECHNOLOGY Networked unattended ground sensors for battlefield visualization ZSOLT HAIG Zrínyi Miklós National Defense University, Electronic Warfare Department, Budapest,
Live Training. Full-spectrum Range Instrumentation and Tactical Engagement Simulation Systems (TESS)
CDT/SV in action Stryker Vehicle Live Training Full-spectrum Range Instrumentation and Tactical Engagement Simulation Systems (TESS) Live Training Products and Systems Observer-Controllers in the Training
Wireless Video Best Practices Guide
Wireless Video Best Practices Guide Using Digital Video Manager (DVM) with the OneWireless Universal Mesh Network Authors: Annemarie Diepenbroek DVM Product Manager Soroush Amidi OneWireless Product Manager
SatCom For Net-Centric Warfare July/August 2011. MilsatMagazine
SatCom For Net-Centric Warfare July/August 2011 MilsatMagazine Emergency Communications C-COM, Hughes Boeing GPS II-F IvySys Technologies Command Center Guardian Mobility idirect Government Technologies
Multilink Processors (Link 11/16/22) and Integration Architectures
Multilink Processors (Link 11/16/22) and Integration Architectures Authors: Serdar ÖZTÜRK, Emine ESEN TAŞDEMİR, Murat ŞAHİN MilSOFT Yazılım Teknolojileri A.Ş. Teknokent, 06531 ODTU Ankara / TURKEY Mailto:[email protected],
OPTIMIZATION OF PROCESS INTEGRATION
1 OPTIMIZATION OF PROCESS INTEGRATION ODVA S VISION OF A UNIFIED COMMUNICATION SOLUTION FOR THE PROCESS INDUSTRIES CONVERGENT COMPATIBLE SCALABLE OPEN Executive Summary Today s process industries share
Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:[email protected]
Applications of mobile ad-hoc networks my article applications of mobile ad-hoc networks at http://www.computingunplugged.com/issues/issue2004 09/00001371001.html Humayun Bakht School of Computing and
SECURITY SOLUTIONS BANKING AND FINANCE
SECURITY SOLUTIONS BANKING AND FINANCE Pacom has developed a distinguished reputation as a global leader in the field of remote security management for the banking and financial market. Over 25 years of
www.quicknetworksolutions.net RC: 960240
QSL is a growing business that s offering IT Solutions and services to SME and Established Organizations with a high level of understanding and fully qualified, friendly and knowledgeable consultants.
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Implementation of the DoD Management Control Program for Navy Acquisition Category II and III Programs (D-2004-109)
August 17, 2004 Acquisition Implementation of the DoD Management Control Program for Navy Acquisition Category II and III Programs (D-2004-109) Department of Defense Office of the Inspector General Quality
Southern Utah Water SCADA Project and Dispelling Myths regarding 900MHz Spread Spectrum Technology:
Southern Utah Water SCADA Project and Dispelling Myths regarding 900MHz Spread Spectrum Technology: Problem: How to get reliable and accurate data from hundreds of IO points scattered throughout a very
UNCLASSIFIED LOW-COST MINIATURE INTERFACE AND CONTROL SYSTEMS FOR SMART SENSORS, TACTICAL RADIOS, AND COMPUTER NETWORKS
LOW-COST MINIATURE INTERFACE AND CONTROL SYSTEMS FOR SMART SENSORS, TACTICAL RADIOS, AND COMPUTER NETWORKS Brett Martin and Dale Bryan Naval Command, Control, and Ocean Surveillance Center Research, Development,
LEASED-LINE REPLACEMENT
WHITE PAPER LEASED-LINE REPLACEMENT 10 Things to Consider Before Choosing Your IP Gateway WWW.OMNITRONICSWORLD.COM Outline Leased-lines are still being used in many parts of the world to carry voice communications
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Figure 1.Block diagram of inventory management system using Proximity sensors.
Volume 1, Special Issue, March 2015 Impact Factor: 1036, Science Central Value: 2654 Inventory Management System Using Proximity ensors 1)Jyoti KMuluk 2)Pallavi H Shinde3) Shashank VShinde 4)Prof VRYadav
Design of Remote data acquisition system based on Internet of Things
, pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; [email protected]
The Research in Remote and Real-time Monitoring System of Digitized Earthquake Omen Instrument
2010 3rd International Conference on Computer and Electrical Engineering (ICCEE 2010) IPCSIT vol. 53 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V53.No.1.13 The Research in Remote and
Site Surveillance, Project Management and Communications System for Remote Locations in High-Risk Environments
Updated Sept 29, 2011 SITE MAST-R MOBILE SECURITY/TELECOM Site Surveillance, Project Management and Communications System for Remote Locations in High-Risk Environments A major problem in providing security
Portable Wireless Mesh Networks: Competitive Differentiation
Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.
www.thalesgroup.com Sotas The world class multi-media vehicle system by Courtesy of Comonwealth of Australia
www.thalesgroup.com The world class multi-media vehicle system by Courtesy of Comonwealth of Australia Optimal Solutions for the Battlefield For many years, is the benchmark for vehicle communication systems,
Bridging the Digital Divide with Net-Centric Tactical Services
Bridging the Digital Divide with Net-Centric Tactical Services Authors: Scott D. Crane, Charles Campbell, Laura Scannell Affiliation: Booz Allen Hamilton E-mail: [email protected] 1. Abstract The DoD
A Standards-Based Integration Platform for Reconfigurable Unmanned Aircraft Systems
WHITEPAPER A Standards-Based Integration Platform for Reconfigurable Unmanned Aircraft Systems Executive Summary This paper addresses the system design and integration challenges involved in meeting the
Applications for mini VTOL UAV for law enforcement
Applications for mini VTOL UAV for law enforcement Douglas Murphy a, James Cycon b a Space and Naval Warfare Systems Center, San Diego, b Sikorsky Aircraft Corporation ABSTRACT Remotely operated vehicle
DRONE DETECTION RADAR
DRONE DETECTION RADAR MEETING TODAY S CHALLENGES Drones are increasingly becoming wide spread. They ve become affordable, easy to obtain and simple to fly. This creates new opportunities, but also poses
www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS)
www.thalesgroup.com/watchkeeper WATCHKEEPER X UNMANNED AIRCRAFT SYSTEM (UAS) Certified Foundation Watchkeeper X is built to the same standards as a manned aircraft, and conforms to CAA/MAA standards. It
CCTV & Video Surveillance over 10G ip
CCTV & Video Surveillance over 10G ip Background With the increase in data, research and development and corporate competition, many companies are realizing the need to not only protect their data, but
Vindicator Security Solutions EXTEND YOUR SECURITY PERIMETER. Vindicator Radar Detection System
Vindicator Security Solutions EXTEND YOUR SECURITY PERIMETER Vindicator Radar Detection System Extend Your Security Perimeter Many security solutions today are required to provide advanced detection of
A Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
TechNet Land Forces South Small Business Opportunities. Carey Webster Director, Federal Information Solutions Deltek
TechNet Land Forces South Small Business Opportunities Carey Webster Director, Federal Information Solutions Deltek Agenda Review of Upcoming Opportunities for Small Businesses Army 8 Small Business Navy
Microwave Photonic Systems Inc. Joshua L. Korson & Richard J. Stewart
Fiber Optic Communications Equipment Provides Backhaul Infrastructure for Critical Satellite Based Continuity of Communications Solutions: IRIDUIM, INMARSAT, GEO SATCOM Microwave Photonic Systems Inc.
Radiological Assessment Display and Control System
Features Fast, real-time data acquisition and control Highly reliable communication with remote terminal units Collecting, converting, integrating and analyzing data from all monitors Detecting, annunciating
Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance
S O L U T I O N PA P E R Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance Table of Contents Fixed Video Surveillance: The Big Three... 3 Wireless
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement 1.0 INTRODUCTION The Department of the Navy Space and Naval Warfare Systems
Applying Mesh Networking to Wireless Lighting Control
White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible
SureSense Software Suite Overview
SureSense Software Overview Eliminate Failures, Increase Reliability and Safety, Reduce Costs and Predict Remaining Useful Life for Critical Assets Using SureSense and Health Monitoring Software What SureSense
Limi Kalita / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014, 4802-4807. Socket Programming
Socket Programming Limi Kalita M.Tech Student, Department of Computer Science and Engineering, Assam Down Town University, Guwahati, India. Abstract: The aim of the paper is to introduce sockets, its deployment
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 9410.5C N2/N6 OPNAV INSTRUCTION 9410.5C From: Chief of Naval Operations Subj: NAVY
Genexis FTTH Network Architecture
Genexis FTTH Network Architecture An introduction to the Genexis FTTH Network Architecture This document contains general information about the Genexis FTTH Network Architecture. Contents 1. Introduction...2
ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)
BUDGET ACTIVITY ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit) PE NUMBER AND TITLE 6 - MANAGEMENT SUPPORT 0604258A - Target Systems Development COST (In Thousands) FY 2000 FY 2001 FY 2002 FY 2003 FY
Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications
Using Cellular RTU Technology for Remote Monitoring and Control in Pipeline and Well Applications Steve Frank Business Development Manager Moxa Inc. Introduction Cellular technology minimizes site visits
Power over Ethernet technology for industrial Ethernet networks
Power over Ethernet technology for industrial Ethernet networks Introduction Ethernet networking has grown beyond office and home usage to become a very successful protocol suite used in many industrial
Chapter 1 Introduction
Chapter 1 Introduction Chapter 1 provides background information on electronic safety and secuirty (ESS), including the definition and areas of knowledge required for an ESS designer. Information contained
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
Portable High-Speed Mobile Networks
Army Collaboration Increases Response Capabilities - Case Study Portable High-Speed Mobile Networks Every minute, every day, in the rugged mining environment at the Kennecott Copper mine, over 200 vehicles
Leveraging Network Infrastructure to Bring Critical Information to Users
Leveraging Network Infrastructure to Bring Critical Information to Users 13 May 2013 Brian Slaughter Director, Global Public Safety Sales General Dynamics C4 Systems 2013 General Dynamics. All rights reserved.
What, Why and How. Hosted Payloads: A guide to commercially hosted government payloads from the Hosted Payload Alliance. www.hostedpayloadalliance.
Hosted Payloads: What, Why and How A guide to commercially hosted government payloads from the Hosted Payload Alliance The Hosted Payload Alliance (HPA) is a satellite industry alliance formed in 2011
Command and Control Integrated Solutions. Transforming security needs into unique custom-made solutions. Building Technologies
Command and Control Integrated Solutions Transforming security needs into unique custom-made solutions Building Technologies A Changing World A Basic Need Our cities become more complex; our transportation
How To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
Satellite Solutions for Emergency Relief and Disaster Recovery Management. May 2009
Satellite Solutions for Emergency Relief and Disaster Recovery Management May 2009 Introduction Disasters can occur anytime and anywhere. Whether the emergency is an act of nature or an act of man, the
NDIA Fire Control Panel 2009 May 21. L-3 Communications Integrated Optical Systems Brashear Division
NDIA Fire Control Panel 2009 May 21 L-3 Communications Integrated Optical Systems Brashear Division 1 Brashear Fire Control Legacy 2 Thought-Provoking Question #1 (part 1) What potential unique functionality
Advanced Network Video And Alarm Management Suite
Advanced Network Video And Alarm Management Suite ViMS. Advanced Network Video & Alarm Management Suite G anz ViMS Command is a powerful IP network based, open standards Video & Alarm Management software
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure.
MM8000 safety and security with smart danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive safety Safety
A NIMS Smart Practice
NIMS Smart Practice: 02-06 NIMS Integration Center, May 2006 www.fema.gov/emergency/nims 202-646-3850 A NIMS Smart Practice IN ALLEGANY COUNTY, MARYLAND: A MUNICIPAL WIRELESS NETWORK PROVIDING ENHANCED
Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response
Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response International Biological Threat Reduction Department Sandia National Laboratories
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
Integrated Command and Control Center Solutions for Public Safety
Integrated Command and Control Center Solutions for Public Safety TETRA - P25 - LTE - CAD We live in a rapidly changing world, and the time has come for critical communications systems to either evolve
Fully integrated perimeter alert system for simultaneous threat detection and assessment.
SECURITY FLIR Thermal Fence D e t e c t. A s s e s s. R e s p o n d. I n s t a n t l y. The FLIR Thermal Fence Fully integrated perimeter alert system for simultaneous threat detection and assessment.
BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS
Review of the Air Force Academy No 2 (24) 2013 BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS Marian ALEXANDRU, Vlad URSU Transilvania University of Brasov, Romania Abstract: A study of how to implement
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3115.10E March 24, 2006 USD(I) SUBJECT: Intelligence Support to Personnel Recovery References: (a) Title 10, United States Code (b) Title 50, United States Code
LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach
W H I T E P A P E R. Security & Defense Solutions Intelligent Convergence with EdgeFrontier
W H I T E P A P E R Security & Defense Solutions Intelligent Convergence with EdgeFrontier Contents 1. Introduction... 2 2. The Need for Intelligent Convergence... 3 2.1 Security Convergence with EdgeFrontier...
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I Systems Integration
Air Force SOA Enterprise Service Bus Study Using Business Process Management Workflow Orchestration for C4I s Integration Dr. Timothy D. Kehoe, Irene Chang, Dave Czulada, Howard Kong, Dr. Dino Konstantopoulos
The proliferation of the raw processing
TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer
presentation Our customers & Partners AE40 www.ae40.com +972-9-743-8410
AE40 presentation AE40 Our customers & Partners AE40 profile AE40 founded at 2002 Privately held company VoIP and Video over IP based communication solutions(radio, intercom, public announcements, telephony,
White paper. Business Applications of Wide Area Ethernet
White paper Business Applications of Wide Area Ethernet 1 Introduction When enterprises use Ethernet as a wide area networking solution, they have the potential to realize significant gains in network
INTELLECT TM Software Package
AxxonSoft INTELLECT TM Software Package Quick Start Guide Version 1.0.0 Moscow 2010 1 Contents CONTENTS... 2 1 INTRODUCTION... 3 1.1 Document purpose... 3 1.2 Purpose of the Intellect software package...
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
Nasams. Air Defence System. www.kongsberg.com
Nasams Air Defence System www.kongsberg.com World class - through people, technology and dedication Kongsberg Gruppen ASA (KONGSBERG) is an international technology corporation that delivers advanced and
