C4ISR for Future Naval Strike Groups


Book Description

The Navy has put forth a new construct for its strike forces that enables more effective forward deterrence and rapid response. A key aspect of this construct is the need for flexible, adaptive command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) systems. To assist development of this capability, the Navy asked the NRC to examine C4ISR for carrier, expeditionary, and strike and missile defense strike groups, and for expeditionary strike forces. This report provides an assessment of C4ISR capabilities for each type of strike group; recommendations for C4ISR architecture for use in major combat operations; promising technology trends; and an examination of organizational improvements that can enable the recommended architecture.




Systems-of-Systems Perspectives and Applications


Book Description

This professional technical book presents complex topics on System-of-System (SoS) and Systems-of-Systems (SOS) engineering, SOS enterprise architecture (SOSEA) design and analysis, and implementation of SOSEA framework along with the modeling, simulation and analysis (MS&A) models in MATLAB. In addition, the book also extends the use of SOS perspectives for the development of computer simulation models for complex processes, systems, decision support systems, and game-theoretic models. This book is intended for two reader categories; namely, a primary and secondary category. The primary category includes system engineers, SOS architects, and mathematicians. The secondary category includes scientists and researchers in space/airborne systems, wireless communications, medicine, and mathematics, who would benefit from several chapters that contain open problems and technical relevance.




Unmanned Aircraft Systems (Uas) in the Cyber Domain: Protecting Usa's Advanced Air Assets


Book Description

Unmanned Aircraft Systems (UAS) are an integral part of the US national critical infrastructure. They must be protected from hostile intent or use to the same level as any other military or commercial asset involved in US national security. However, from the Spratly Islands to Djibouti to heartland America, the expanding Chinese Unmanned Aircraft Systems (UAS / Drone) industry has outpaced the US technologically and numerically on all fronts: military, commercial, and recreational. Both countries found that there were large information security gaps in unmanned systems that could be exploited on the international cyber-security stage. Many of those gaps remain today and are direct threats to US advanced Air Assets if not mitigated upfront by UAS designers and manufacturers. The authors contend that US military / commercial developers of UAS hardware and software must perform cyber risk assessments and mitigations prior to delivery of UAS systems to stay internationally competitive and secure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This book will fully immerse and engage the reader in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). Topics covered include National Airspace (NAS) policy issues, information security, UAS vulnerabilities in key systems (Sense and Avoid / SCADA), collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.




10th International Conference on Theory and Application of Soft Computing, Computing with Words and Perceptions - ICSCCW-2019


Book Description

This book presents the proceedings of the 10th Conference on Theory and Applications of Soft Computing, Computing with Words and Perceptions, ICSCCW 2019, held in Prague, Czech Republic, on August 27–28, 2019. It includes contributions from diverse areas of soft computing and computing with words, such as uncertain computation, decision-making under imperfect information, neuro-fuzzy approaches, deep learning, natural language processing, and others. The topics of the papers include theory and applications of soft computing, information granulation, computing with words, computing with perceptions, image processing with soft computing, probabilistic reasoning, intelligent control, machine learning, fuzzy logic in data analytics and data mining, evolutionary computing, chaotic systems, soft computing in business, economics and finance, fuzzy logic and soft computing in earth sciences, fuzzy logic and soft computing in engineering, fuzzy logic and soft computing in material sciences, soft computing in medicine, biomedical engineering, and pharmaceutical sciences. Showcasing new ideas in the field of theories of soft computing and computing with words and their applications in economics, business, industry, education, medicine, earth sciences, and other fields, it promotes the development and implementation of these paradigms in various real-world contexts. This book is a useful guide for academics, practitioners and graduates.




Human Interface and the Management of Information


Book Description

This two-volume set LNCS 14015 - 14016 constitutes the thoroughly refereed proceedings of the thematic area Human Interface and the Management of Information, HIMI 2023, which was held as part of HCI International 2023 which took place in Copenhagen, Denmark, during July 23-28, 2023. A total of 1578 papers and 396 posters have been accepted for publication in the HCII 2023 proceedings from a total of 7472 submissions. The papers included in the HCII-HIMI volume set were organized in topical sections as follows: Part I: Information design and user experience; data visualization and big data; multimodal interaction; interacting with AI and intelligent systems; Part II: Service design; knowledge in eLearning and eEducation; supporting work and collaboration.




Hyperspectral Data Exploitation


Book Description

Authored by a panel of experts in the field, this book focuses on hyperspectral image analysis, systems, and applications. With discussion of application-based projects and case studies, this professional reference will bring you up-to-date on this pervasive technology, wether you are working in the military and defense fields, or in remote sensing technology, geoscience, or agriculture.




Advances in Computer Science and Education Applications


Book Description

This two-volume set (CCIS 201 and CCIS 202) constitutes the refereed proceedings of the International Conference on Computer Science and Education, CSE 2011, held in Qingdao, China, in July 2011. The 164 revised full papers presented in both volumes were carefully reviewed and selected from a large number of submissions. The papers address a large number of research topics and applications: from artificial intelligence to computers and information technology; from education systems to methods research and other related issues; such as: database technology, computer architecture, software engineering, computer graphics, control technology, systems engineering, network, communication, and other advanced technology, computer education, and life-long education.




Proceedings of International Conference on Cognition and Recognition


Book Description

The book covers a comprehensive overview of the theory, methods, applications and tools of cognition and recognition. The book is a collection of best selected papers presented in the International Conference on Cognition and Recognition 2016 (ICCR 2016) and helpful for scientists and researchers in the field of image processing, pattern recognition and computer vision for advance studies. Nowadays, researchers are working in interdisciplinary areas and the proceedings of ICCR 2016 plays a major role to accumulate those significant works at one place. The chapters included in the proceedings inculcates both theoretical as well as practical aspects of different areas like nature inspired algorithms, fuzzy systems, data mining, signal processing, image processing, text processing, wireless sensor networks, network security and cellular automata.