C4ISR for Future Naval Strike Groups

C4ISR for Future Naval Strike Groups
Author: National Research Council
Publisher: National Academies Press
Total Pages: 300
Release: 2006-04-26
Genre: Technology & Engineering
ISBN: 0309185904

The Navy has put forth a new construct for its strike forces that enables more effective forward deterrence and rapid response. A key aspect of this construct is the need for flexible, adaptive command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) systems. To assist development of this capability, the Navy asked the NRC to examine C4ISR for carrier, expeditionary, and strike and missile defense strike groups, and for expeditionary strike forces. This report provides an assessment of C4ISR capabilities for each type of strike group; recommendations for C4ISR architecture for use in major combat operations; promising technology trends; and an examination of organizational improvements that can enable the recommended architecture.

Unmanned Aircraft Systems (Uas) in the Cyber Domain: Protecting Usa's Advanced Air Assets

Unmanned Aircraft Systems (Uas) in the Cyber Domain: Protecting Usa's Advanced Air Assets
Author: Julie J. C. H. Ryan
Publisher: Independently Published
Total Pages: 430
Release: 2018-09-14
Genre: Computers
ISBN: 9781724077066

Unmanned Aircraft Systems (UAS) are an integral part of the US national critical infrastructure. They must be protected from hostile intent or use to the same level as any other military or commercial asset involved in US national security. However, from the Spratly Islands to Djibouti to heartland America, the expanding Chinese Unmanned Aircraft Systems (UAS / Drone) industry has outpaced the US technologically and numerically on all fronts: military, commercial, and recreational. Both countries found that there were large information security gaps in unmanned systems that could be exploited on the international cyber-security stage. Many of those gaps remain today and are direct threats to US advanced Air Assets if not mitigated upfront by UAS designers and manufacturers. The authors contend that US military / commercial developers of UAS hardware and software must perform cyber risk assessments and mitigations prior to delivery of UAS systems to stay internationally competitive and secure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This book will fully immerse and engage the reader in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). Topics covered include National Airspace (NAS) policy issues, information security, UAS vulnerabilities in key systems (Sense and Avoid / SCADA), collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.

10th International Conference on Theory and Application of Soft Computing, Computing with Words and Perceptions - ICSCCW-2019

10th International Conference on Theory and Application of Soft Computing, Computing with Words and Perceptions - ICSCCW-2019
Author: Rafik A. Aliev
Publisher: Springer Nature
Total Pages: 997
Release: 2019-11-19
Genre: Technology & Engineering
ISBN: 3030352498

This book presents the proceedings of the 10th Conference on Theory and Applications of Soft Computing, Computing with Words and Perceptions, ICSCCW 2019, held in Prague, Czech Republic, on August 27–28, 2019. It includes contributions from diverse areas of soft computing and computing with words, such as uncertain computation, decision-making under imperfect information, neuro-fuzzy approaches, deep learning, natural language processing, and others. The topics of the papers include theory and applications of soft computing, information granulation, computing with words, computing with perceptions, image processing with soft computing, probabilistic reasoning, intelligent control, machine learning, fuzzy logic in data analytics and data mining, evolutionary computing, chaotic systems, soft computing in business, economics and finance, fuzzy logic and soft computing in earth sciences, fuzzy logic and soft computing in engineering, fuzzy logic and soft computing in material sciences, soft computing in medicine, biomedical engineering, and pharmaceutical sciences. Showcasing new ideas in the field of theories of soft computing and computing with words and their applications in economics, business, industry, education, medicine, earth sciences, and other fields, it promotes the development and implementation of these paradigms in various real-world contexts. This book is a useful guide for academics, practitioners and graduates.