The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyber security risk management in Industrial Control Systems has been a challenging problem for both practitioners and the research community. Their proprietary nature along with the complexity of those systems renders traditional approaches rather insufficient and creating the need for the adoption of a holistic point of view. This paper draws upon the principles of the Viable System Model and Game...
Delivering the most value for money when developing capabilities for a large system of systems is a complex issue. Several key factors affect the value of every particular piece of work, and those factors can change over time as the actual work effort evolves, the requirements change, and the value of desired capabilities independently rise and fall. Most scheduling approaches are predictive and based...
This paper presents object tracking in depth, RGB and normal-maps images using LGT tracker. The depth and RGB images are rendered using depth imaging plugins. A series of experiments were held to evaluate the tracker performance in tracking objects in different image sequences. The experiments conducted were from the Visual Object Tracking (VOT) challenge that was arranged in association with ICCV'13...
Identifying global change impacts on Defence will assist future preparedness, minimize unanticipated demand and reduce unfunded cost pressures. The physical world is observably changing, arguably at an increasing rate and perhaps irreversibly. This is provoking socio-economic, technological and geographical change — known as Global Change. These changes will affect Defence, directly and indirectly,...
Performance requirements play a significant role in the design of large-scale systems, such as enterprise information systems. Systems Modeling Language (SysML), proposed by Object Management Group (OMG) for system engineering, provides for requirements specification, though a verification method for quantitative requirements as performance ones is lacking. In the information systems domain, performance...
Complex system configuration problems are the problems of appropriately assigning system parameter values for optimizing some aspect of complex system performance. In this paper, we first cast complex system configuration problems as mixed-variable parameter optimization problems where mensurable system simulation responses are used for evaluation. Then we present a simulation-based ant colony optimization...
Constraints and challenges in Ghana's agricultural industry limit its throughput. A policy constraint is an issue when it comes to agricultural sustainability. A fresh approach to interventions and capacity-building using systems thinking approach; the four levels of thinking and the Evolutionary Learning Laboratory during a stakeholder workshop in Ghana has shown remarkable impact on the ability...
This paper focuses on one of the earliest steps in System of Systems (SoS) design aiming to meaningfully determine stakeholders' values or preferences. It recommends the plural problem definition and dynamic construction of stakeholder's values in the front end of design process. It suggests a method based on the probability theory to embed flexibility and tolerance, and construct a basic framework...
Systems of Systems require organizations within them to have staff with abilities appropriate to the challenges. Large organizations frequently use competency models as the tool to ensure that their staff has the proper skills to deal with these challenges. While competency models represent an improvement on their primary predecessor, weaknesses have been noted in the literature. Most improvement...
We consider the role of collaborative modelling and co-simulation in the design of systems of cyber-physical systems (SoCPSs). Such systems pose particular challenges to model-based SoS engineering through the need to address the semantic heterogeneity of models of physical phenomena alongside models of the computing elements. We describe an approach to multidisciplinary design in which discrete-event...
To push the construction of system of systems(SoS) forward is of great strategic and practical significance. But from the perspective of capability assessment, there is still no effective fundamental measure that can scientifically reflect the typical characteristics of the SoS. In this study, from the view of “structure, state, evolution”, firstly proposed a fundamental measure framework for SoS's...
This paper proposes and demonstrates an architectural pattern for the contractual specification of interfaces between constituent systems within a System of Systems (SoS). We take a structured approach to the development of the pattern, which we call the Contract Pattern. It is developed and demonstrated in SysML using a case study from the Audio/Video domain. We also identify some of the obstacles...
Based on analyzing the System of Systems (SoS) Capability Gaps (CG), this paper pointed out the important missions and the major difficulties in the process of SoS capability gaps analysis. Then the overall flow of carrying out the SoS CG analysis was created and prompted to guide the relevant researchers to perform CG analysis, which mainly including recognition of capability gaps, description of...
SoS are an ensemble of complex systems, which have the potential for an extraordinary amount of structural complexity, even temporarily, as a result of interconnections and couplings that can vary in strength. Because of this, SoS can be extremely vulnerable to very sudden catastrophic collapse as a result of small and insignificant partial functionality losses in one of the constituent systems. This...
The paper presents an analysis of the ineffectiveness of the information and computer technologies (ICT) used by Russian enterprises. A capability based approach is proposed to improve this situation. The approach is focused on establishing a close and direct link from enterprise capabilities and values to ICT systems. The approach comprises: • A set of 9 universal capabilities, which are mandatory...
Engineers working in expatriate situations experience intra-project-team cultural diversity and therefore need to develop cross-cultural abilities. In culturally diverse project teams the cross-cultural adaptation process is a significant contributor to project success. This paper identifies the challenges faced by Indonesian expatriate engineers in the cross-cultural adaptation process in multicultural...
New or improved technologies are frequently inserted into existing military capabilities (socio-technical systems of systems) in order to address emerging threats or to exploit latest scientific and technological developments. Urgent technology insertion projects, which are aimed at addressing critical capability gaps, pose a particular challenge for Defence organisations as any delays and/or suboptimal...
Semantic heterogeneity is a significant challenge to integration in Systems of Systems Engineering (SoSE) due the large variety of languages, domains and tools which are used in their construction. In this paper we envision a strategy for managing this heterogeneity by decomposing domain specific languages into their “building block” theories which can be independently analysed, and used as a basis...
Military command and control networks exist in the context of System of Systems. In a near-peer land combat environment, the benefits conferred to a commander by a networked command and control system make that network a highly desirable cyber target. This paper contends that the successful compromise of a command and control system, in conjunction with an integrated deception plan, leads to the degradation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.