Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper we discuss issues in testing various cognitive fusion algorithms for situation management. We provide a proof-of-principle discussion and demo showing how gaming technologies and platforms could be used to devise and test various fusion algorithms, including input, processing, and output. We argue that the proof-of-principle warrants further work on more advanced test beds and methods...
Tactical networking environments demand reliable, robust, and efficient approaches to disseminating information that are tolerant to unreliable and bandwidth-constrained networks. This paper describes DisService, an Agile Computing approach to information dissemination that opportunistically discovers and exploits excess communications, storage, and processing capacity in a distributed network to...
Recent operations in Iraq and Afghanistan have confirmed that in order to achieve effective Network-Centric Operations (NCO), innovative enhancement to military decision-making is desired. Required are processes and computational models that support the decision-makers' experience while promoting high levels of shared situation awareness (SA)-not only in the context of the external operating environment,...
In modern warfare, tactical mobility and environment uncertainty place critical decisions at battalion and below levels. However, the introduction of digital systems (vehicles, soldiers, UAV) enables optimised or new capabilities by taking advantage of informational services. The Phoenix Concept Development and Experimentation (CD&E) lifecycle explores new operational concepts using rapid system...
This paper presents a novel approach towards cooperation between conglomerates of sensors for compiling an enhanced operational picture. It uses the benefits of distributed processing via multi-agent systems for intelligent scheduling of multi-functional radars and their flexible interconnection via mobile ad-hoc networking technology. These dynamically reconfigurable networks facilitate the cooperation...
This research explores the feasibility of performing passive information capture on voice data in order to analyze and classify the contents of interpersonal communication. The general form of this problem is very difficult as fully automated speech understanding technology does not exist. This is further complicated by battlefield realities including: noise, jargon and unstructured speech. However,...
The Army Technical Reference Model (TRM) is a fundamental component of the Army Enterprise Architecture suite of reference models. This paper describes the TRM, how it facilitates enterprise architecture integration and system interoperability, how it maps to other key DoD architecture models, and its value to the acquisition community. It describes how it supports Program Managers for efficiently...
In February 2006, the Department of Defense (DoD) Chief Information Officer (CIO) issued a memorandum with the subject heading, ??Department of Defense Policy for Transmission of Internet Protocol Over DoD-Leased and DoD-Owned Transponded Satellite Communications Systems?? explaining the need to provide a single solution that supports direct interoperability between users, maximizes bandwidth-on-demand...
This research advances Cyber Situation Management by proposing methods for automated mapping of Cyber Assets to Missions and Users (Camus). To enable accurate and efficient cyber incident mission impact assessment, a Camus ontology that defines entities, relationships and attributes (ERAs) associated with them has been drafted. Methods for fusing data from multiple data sources have been developed...
In this paper we address the problem of supporting communication in partially connected military tactical radio networks. In such networks traditional multi-hop forwarding techniques cannot guarantee end-to-end communication. Alternative techniques must therefore be designed to compensate for connectivity disruption. We propose a communication model that relies on opportunistic disruption-tolerant...
With the growing reliance on net-centric warfare, understanding the effect of information operations (IO) on the overall mission becomes increasingly important. Traditional information assurance (IA) metrics quantify attributes of the underlying information system, such as the availability, confidentiality, and integrity of critical services and data, without providing mission-level perspective. Meanwhile,...
The Network Centric Warfare (NCW) model is currently attracting attention in modern warfare research. In this model, data processing issues, such as efficiently determining enemies of high threat, are critical for optimizing war tactics. In this paper, by adopting the concept of skyline queries which have been extensively studied in database research, we address the problem of searching highly threatening...
Three primary objectives of the Joint Program Executive Officer (JPEO) Joint Tactical Radio System (JTRS) are: (a) reduce time to field capability, (b) improve interoperability between services, and (c) decrease radio production costs. The Software Communications Architecture (SCA) specification is the architectural framework for all JTRS software artifacts that was created to maximize software application...
A recent feasibility study suggests that a Service Oriented Architecture (SOA) will be central within the NATO Network Enabled Capabilities information infrastructure. An important element of a SOA is the service discovery process, but existing solutions are not sufficient in military networks. We suggest to use a robust Peer-to-Peer (P2P) network as a complement. Unfortunately, available P2P search...
Situation awareness relies on a combined knowledge of the environment, friendly actions and adversaries' actions. Impact assessment applies that knowledge to estimate the consequences of those actions and anticipate plausible futures. In domains such as asymmetric warfare and cyber security, timely and comprehensive impact assessment is critical for human analysts to develop situation awareness and...
Stealthy, goal-oriented multistage attacks are difficult to detect since they often consist of specific attack steps that do not cause significant variations in the statistical distributions of data streams. We present an approach for attack scenario detection and recognition that is based on analyzing data streams from multiple heterogeneous sensors. Events captured from these sensors are used to...
Testing of applications for tactical MANETs poses a special technical challenge due to the difficulty of conducting experiments in an ad hoc network environment at a scale larger than a few nodes. One approach is to conduct experiments in a testbed that can imitate a tactical MANET to the highest feasible level of fidelity. For applications, this is achieved by executing unmodified software under...
Warfighters in today's asymmetric engagements need access to mission-critical information no matter when and where it becomes available. Information Management Services (IMSs) based on publish-subscribe-query services have emerged as an important enabler of tactical information dominance in combined tactical and enterprise military situations. IMSs support information brokering and dissemination between...
The platforms and gateways that compose the Airborne Network (AN) exhibit a high degree of heterogeneity, with a variety of IP and non-IP data links hosted on various terminals produced by multiple manufacturers. The lack of an accepted, mature network management architecture for the AN contributes to the risk that there will be a proliferation of separate, stovepiped tools deployed to monitor and...
Many Programs of Record are using Service Oriented Architecture (SOA) approaches and supporting technologies to realize net-centricity requirements. Furthermore, emerging solutions offer data sharing across adjacent security enclaves for these programs, including Cross Domain Joint Battlespace Infosphere (XJBI) by AFRL, Cross Domain Web Services Gateway by DISA, and the Cross Domain Collaborative...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.