Systems and Technologies for Enhanced Coastal Maritime Security
|
|
- Aron Flowers
- 6 years ago
- Views:
Transcription
1 Systems and Technologies for Enhanced Coastal Maritime Security Edward M. Carapezza a* and Ann Bucklin a a University of Connecticut-Avery Point, Groton, CT, USA ABSTRACT This paper describes a design for an innovative command and control system for an intelligent coastal maritime security system. The architecture for this intelligent coastal maritime security system is derived from the forth generation real-time control (RCS) system architecture 1 developed by the National Institute of Science and Technology (NIST) over the past twenty years. This command and control system is a decision support system for real-time monitoring, response and training for security scenarios that can be hosted at various locations along the coast of the United States where homeland security surveillance and response activities are required. Additionally, this paper describes the design for a derivative real-time simulation based environment that can be used as a state-ofart test bed for developing new hardware and software components to be integrated into previous versions of deployed real-time control systems. Keywords: command and control systems, intelligent systems, unattended sensors, homeland security, maritime coastal security, sensor networks, detection, classification, and tracking 1. INTRODUCTION 1.1 Background The coastal areas of United States form a porous and vulnerable border that is of national strategic interest. Our maritime coastal border is over 95,000 miles long, dwarfing the only 7,500 mile land border with Mexico and Canada. The United States also has more than 361 ports and over 7,000 foreign-flag ships make 51,000 calls in U.S. ports annually. These areas require a sustainable security system to detect anomalous behaviors and operations and to provide technologies and assets to respond to these threats. The military has developed complex, intelligent command and control systems, using distributed agents and networks of unmanned and unattended sensor platforms and devices to provide continuous regional surveillance and detection, classification, and integrated response to emerging threat situations. Our maritime coastal border areas require such command and control systems, with a persistent presence, to ensure the security of heavily populated coastal regions and important infrastructure related facilities, such as power plants, chemical plants, and harbors. 1.2 System Requirements There is a need to develop an integrated, state-of-the-art architecture and intelligent coastal maritime security systems for real-time monitoring, event response and first responder training. This intelligent, networked system must be portable for hosting at coastal user community sites around the country. This system must be adaptable to support the management of complex response activities over a range of different types and scales of terrorist incidents as such events inevitably evolve and change in scale over time. The system must be modular and distributed to enable sustained operations through significant and geographically distributed terrorist incidents. Conjunctive with the development of these real-time systems, a state-of-art test bed must also be developed. This test bed, a simulation/stimulation based environment, is required to enable new components and subsystems to be tested and evaluated prior to implementation on existing, deployed systems. This test bed must be designed to support first responder training, exercise rehearsals and reconstructions and will be useful to promote national collaboration between maritime homeland security researchers, developers, and user organizations. * carapezz@engr.uconn.edu; phone Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VII, edited by Edward M. Carapezza, Proc. of SPIE Vol. 6943, , (2008) X/08/$18 doi: / SPIE Digital Library -- Subscriber Archive Copy Proc. of SPIE Vol
2 Figure 1 depicts the typical phases and major command and control system functions that must be supported. Prior to the occurrence of any terrorist event, the coastal maritime security system must support the functions of protecting coastal targets, monitoring significant threat related indications and warnings, deterring an event if enough actionable intelligence is available prior to the event, and training and preparing first responders for post event consequence management activities. If and when a coastal terrorist event occurs, the system must available provide an intelligent consequence management capability over the event duration. Prepare to Respond Deter & Prevent Threat Indications & Warnings Responder Equipment, Simulation and Training Respond to Event Intelligent Consequence Management Protect Coastal Targets Neutralize Threat Coastal Terrorist Event Search & Apprehend Perpetrators Primary Phases Requiring Intelligent Decision Support & Integrated Sensor Networks Figure 1: Functions and Phase Relationships for Coastal Maritime Terrorist Events 2. SYSTEM ARCHITECTURE The architecture for this class of intelligent command and control systems is depicted in figure 2 below and is modeled after the Real-Time Control System (RCS) architecture developed over many years by scientists and engineers in the Intelligent Systems Laboratory at the National Institute of Science and Technology (NIST). This RCS architecture extended and implemented for a wide variety of challenging applications by numerous government labs and companies over the past twenty years. Using the basic RCS representation as a model, the high level architecture and associated functional requirements for an intelligent security system for coastal maritime homeland security applications are depicted in figure 2. Proc. of SPIE Vol
3 Intelligent Maritime S ecurity S ys tem Tes t B ed for Intelligent C oas tal Maritime S ecurity S ys tem Development (R &D tool for S ystem Development/E valuation, Modeling, S imulation,training,e xercise P lanning & Reconstruction) Legacy Systems Intel/C ollec tion Systems Resource Systems (FEMA/USCG/Fire/DoD) Sensory Processing Legacy System Inputs Intelligence & Threat Conditions Resource Readiness Processed Sensor Info World Model Real-time Dbas es: threa ts sensor environment resources legacy etc Historical Dbases : threats sensor environment resources legacy etc Mis s ion (Goal) Associate Behavior S ituational Generation Awareness Tactical Planner Tactical Response Internal World Repres entation E xternal World Representation Sensors (space,air,ground, u/w, surface) Real World Actuators /E ffectors (responders/equipment deployed) Figure 2: High Level Architecture and Functions for Intelligent Coastal Maritime Security System 3. PHASED DEVELOPMENT APPROACH After the specific system requirements are developed, design documentation for the coastal maritime security domain specific architecture will be developed. Once this domain specific architecture is developed and simulated using realistic maritime security scenarios, individual component and system technologies will be developed and integrated into this system. Legacy systems, existing or emerging maritime security related databases, devices and systems, will be identified and linked to this architecture to reduce redundancy and provide for cost effective development. Once developed, this integrated system architecture will be a model for national and international command and control systems for coastal maritime security. The maritime domain specific architecture will be made available to other states, regions, and international allies to enhance their readiness against homeland security threats. A prototype of this architecture and integrated system will be developed and made available for demonstration through a combination of both real system hardware and software and through simulation to homeland security users who are developing infrastructure facility or area protection maritime homeland security systems. Additionally, new system integration, unattended sensor, unmanned vehicle, fusion, communication, etc technologies will be designed or enhanced during the system development and demonstration processes. These individual technologies will be described and made available to other organizational entities that are developing state-of-art homeland security systems. A phased approach for both the security system and for the associated development test bed will be utilized to develop, demonstrate, and enhance the architecture and prototypical, domain specific systems and devices. 4. DEVELOPMENT PRODUCTS AND CONTRIBUTIONS Using the phased research and development approach, the anticipated products and contributions of this coastal maritime security system are depicted in the diagram below. Proc. of SPIE Vol
4 C oas tal Maritime S ec urity S ys tem TechnicalS olution Technical S upport Technical Coordination P olic y Standards Phased Development Approach Develop S ystem R equirements and S cenarios Identify R elevant Legacy or E merging S ystems Develop System Metrics & Measures of Effectiveness (MOEs) Develop S ystem Architecture Develop S ystem S imulation/s timulation (S IM/S TIM) C omponents Integrate & Demonstrate Performance in S im/s tim E nvironment Integrate C omponents with Legacy S ystems/inputs Demonstrate F ull S ystem P erformance in testbed environment Demonstrate Training C apabilities in testbed environment Host system & validate system performance with real distributed demonstrations in representative regions of country Upgrade system & documentation based upon lessons learned Test & E valuation site for emerging threat capabilities and incidents Test & E valuation site for emerging technologies & interoperability 1. Technical S olutions Domain-S pecific C 3 I Architecture S tate-of-a rt National T estbed P ilot demonstrations to user communities 2. Technical S upport Interoperability assistance Technical system assistance Protocol verification Training assistance S ystem implementation assistance C ase studies & scenario development S ymposiums and conferences 3. Technical Coordination Integrated system support across & for federal/s tate/local government entities Integrated system support across & for corporate/lab developers & integrators 4. Policy Technology monitoring S ecurity studies 5. S tandards Integrated S ecurity R esponse S ystems R esponder Leadership Figure 3: Phased Development Approach and Anticipated Contributions 5. SITUATIONAL AWARENESS ASSOCIATE The defense of high value coastal areas, such ports, commercial facilities, power plants requires a surveillance capability for detecting, tracking and identifying real-time air, ground, water surface 2, and submerged threats 3. Defending these high value coastal areas against individual or combinations of air, ground, surface water and submerged threats is an extremely challenging problem. An individual, a group of individuals, or even a small air, ground or submerged vehicle could easily be used to carry dangerous materials, such as explosives, chemical, biological, radiological, or nuclear materials, to high value targets in our coastal areas. Transportation centers, harbors, populated residential areas, and important commercial and military facilities are vulnerable to such attacks. Each high value asset or area could have its own local distributed, networked set of multi-phenomenological surveillance sensors and signal processing subsystems. This surveillance system would have to be tailored for the specific type of facility and surrounding terrain and bathymetry. Real-time information from these local surveillance systems would be fused with information from existing legacy surveillance assets and other regional and national sensor systems. This fused, real-time information would be processed by the intelligent coastal maritime security system to develop a situational awareness context. The decision support components of the overall security system would then reason with this updated world model view to formulate conclusions about the true state of the evolving threat situation and would recommend actions to human operators to deploy consequence management resources in a quasi-optimal time sequence. The distributed surveillance subsystem would be acting as an intelligent situational awareness associate, a human-like software entity that would generate an evolving representation of the current external world and evolving problem situation to the human response team. This associate software entity would also have the capability to provide some indication of the quality of the situational picture provided, using some type of reasoning with uncertainty. A robust graphic interface and an intelligent explanation facility would enable the Proc. of SPIE Vol
5 human response team to ask the situational awareness entity questions about the quality of the fused surveillance information provided and the pedigree of the logic used to make conclusions about the current state of the external world. 6. TACTICAL PLANNING ASSOCIATE As the surveillance system is updating the current world model using stored and emerging information from legacy systems and from dedicated networked sensors, to reflect the current state of the event, a tactical planning component for the system is available to plan the recommended actions to mitigate the consequences of the terrorist actions. This tactical planning software component would reconcile all previously identified and evolving prioritized goals for the consequence management system with the assets available for deployment. The resources available for consequence management include all human assets, such as first responders, and all air, ground, and water vehicles, facilities, and other devices. This tactical planning subsystem would be acting as an intelligent tactical planning associate, a human-like software entity that would use the evolving representation of the current external world and evolving problem situation to the recommend a set of planned actions to the human response team. This associate software entity would also have the capability to provide some indication of the quality of the tactical plans provided, using some type of reasoning with uncertainty. A robust graphic interface and an intelligent explanation facility would also enable the human response team to ask the tactical plan entity questions about the quality of the detailed plans provided and the pedigree of the logic used to make conclusions about the best plan recommended for each sojourn of time. 7. TACTICAL RESPONSE ASSOCIATE As the tactical planning subsystem is updating the current set of recommended plans for action, a distributed tactical response component for the system is available to parse the high level recommended plans in tailored, discrete action tasks for each consequence management asset. This tactical response system software component would also prioritize and order tasks to available resources and report all accomplishment of these assets back to the tactical planning component. As mentioned earlier, the resources available for consequence management include all human assets, such as first responders, and all air, ground, and water vehicles, facilities, and other devices. This response subsystem would be acting as an intelligent tactical response associate, a human-like software entity that would use the evolving representation of the current response accomplishments and evolving state of resource availability to the recommend modifications and refinements to the plans and associated tasks to the human response team. This associate software entity would also have the capability to provide some indication of the quality of the event response actions provided, using some type of reasoning with uncertainty. A robust graphic interface and an intelligent explanation facility would also enable the human response team to ask this response entity questions about the quality of the consequence management actions provided and the pedigree of the logic used to make conclusions about recommendations for modified tasks for the next period of time. 8. SUMMARY Coastal maritime security is an extremely challenging problem. This paper proposes an innovative command and control system design and the use of distributed associate technology and surveillance sensor networks for an intelligent coastal maritime security system. This concept utilizes a domain specific architecture, based on the 4 th generation of the NIST Real Time Control System architecture. This domain specific architecture is distributed associate system architecture with three intelligent associates, a situational awareness associate, a tactical planning associate, and a tactical response associate. Each associate is an intelligent software entity that provides human-like recommendations to a team of humans tasked with the time critical job of responding to some terrorist event. A realtime simulation/stimulation test bed is required to develop and maintain such complex security system. 9. References 1. J.Albus, Real Time Control System (RCS) Handbook ; NIST R.Urick, Underwater Acoustics, E.Carapezza, Sustainable Coastal Sensor Networks: Technologies and Challenges, 2008 Proc. of SPIE Vol
Security & Defense Solutions
intelligent convergence TM Security & Defense Solutions Intelligent Convergence with Augusta Systems EdgeFrontier White Paper The Need for Intelligent Convergence The distributed and evolving nature of
More informationMaritime Satellite Security Services
ARATOS HOMELAND SECURITY Maritime Satellite Security Services Maritime Security Importance Maritime Security becomes more important in the ever-changing global market thus: The protection of Life Ship
More informationInsight: Operability Testing for High Availability Systems
Insight: Operability Testing for High Availability Systems Edward Beck Computer Sciences Corporation NDIA Systems Engineering Conference October 23-26, 2006 Copyright 2004 Computer Sciences Corporation.
More informationReal-Time Diagnostics for High Availability Systems
Copyright 2004 Computer Sciences Corporation. All rights reserved. 10/24/2007 12:49:47 PM 1 Real-Time Diagnostics for High Availability Systems Edward Beck Computer Sciences Corporation NDIA Systems Engineering
More informationCENTRE FOR MARITIME RESEARCH AND EXPERIMENTATION
CENTRE FOR MARITIME RESEARCH AND EXPERIMENTATION Gabriel Grenon, Dr.Alain Maguer presented by Per Arne Sletner Head, Autonomous Unmanned Vehicles Section Slide 1 Mission CMRE organises and conducts scientific
More informationTSA System Architecture
TSA System Architecture Keith Goll TSA/ACC Security Capabilities Workshop July 19, 2017 TSA System Architecture Program Overview The System Architecture (SA) allows the Transportation Security Administration
More informationDHS Enterprise Architecture. The Open Group Conference Boundaryless Information Flow October 20, 2003
DHS Enterprise Architecture The Open Group Conference Boundaryless Information Flow October 20, 2003 Our EA Challenge Support the FY05 budget formulation process Develop high-level, conceptual Homeland
More informationDATA ITEM DESCRIPTION TITLE: TRAINING SITUATION DOCUMENT Number: DI-SESS-81517C Approval Date:
DATA ITEM DESCRIPTION TITLE: TRAINING SITUATION DOCUMENT Number: DI-SESS-81517C Approval Date: 20130524 AMSC Number: N9379 Limitation: N/A DTIC Applicable: N/A GIDEP Applicable: N/A Office of Primary Responsibility:
More informationSOLUTION MOTION VIDEO EXPLOITATION
SOLUTION MOTION VIDEO EXPLOITATION SITUATIONAL AWARENESS IN A DYNAMIC ENVIRONMENT Conditions on the ground can change in an instant, and national security depends on up-to-the minute situational awareness.
More informationMethodology for Selecting the Preferred Networked Computer System Solution for Dynamic Continuous Defense Missions
Methodology for Selecting the Preferred Networked Computer Solution for Dynamic Continuous Defense Missions San Diego Dr. Glenn S. Tolentino Command & Control and Enterprise Engineering Department SPAWAR
More informationUNCLASSIFIED FY Note FY15 increases for Soldier sensory performance, training effectiveness and Soldier system architecture research.
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Army Date: March 2014 2040: Research, Development, Test & Evaluation, Army / BA 2: Applied Research COST ($ in Millions) Prior Years FY 2013 FY 2014
More informationArdmore Seaport-e Contract Team Capabilities
Ardmore Seaport-e Contract Team Capabilities COMPANY NAME 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 3.11 3.12 3.13 3.14 3.15 3.16 3.17 3.18 3.19 3.20 3.21 3.22 ARDMORE CONSULTING GROUP SURVICE TWINTRON
More informationPersistent Surveillance & Border Security (An Automated Means of Aircraft Deconfliction)
ECONOMICALLY DISADVANTAGED, WOMAN-OWNED SMALL BUSINESS (ED-WOSB) SBA CERTIFIED 8(M), HUB-ZONE & VIRGINIA CERTIFIED SWAM Decision Support for Persistent Surveillance & Border Security (An Automated Means
More informationQUICKLOOK PROJECT PROPOSAL
QUICKLOOK PROJECT PROPOSAL Version 1.06 By Tactical Science Solutions, Inc. in support of the Tactical Satellite-3 design effort February 15, 2007 Group: Tactical Science Solutions, Inc. Authors: David
More informationC2 ADVANCED MULTI-DOMAIN ENVIRONMENT AND LIVE OBSERVATION TECHNOLOGIES
C2 ADVANCED MULTI-DOMAIN ENVIRONMENT AND LIVE OBSERVATION TECHNOLOGIES FLYSEC Final Info Day and Risk-Based Security Projects Cluster meeting 28/06/2018 1 OVERVIEW 2 Source: FRONTEX THE PROBLEM IRREGULAR
More informationTask Force on the Role of Autonomy in the DoD Systems
Task Force on the Role of Autonomy in the DoD Systems Dr. Robin Murphy, Co-Chair Mr. James Shields, Co-Chair June 2012 Terms of Reference Review relevant technologies to evaluate readiness for introduction
More informationEdison SmartConnect. The Role of IT in. John Bubb Southern California Edison Edison SmartConnect TM May 20, 2008
Edison SmartConnect The Role of IT in Smart Grid Infrastructure John Bubb Southern California Edison Edison SmartConnect TM May 20, 2008 PG&E LADWP SCE SDG&E SCE Overview Serving over 13 million people
More informationEnterprise Architecture as an Essential Tool Supporting Army Transformation. Fernando Mezquita
Enterprise Architecture as an Essential Tool Supporting Army Transformation Fernando Mezquita There are two ways of spreading light: to be the candle or the mirror that reflects it. Edith Wharton, 1862-1937
More informationArchitecture Considerations of Time Sensitive Targeting and NATO TST Tool
Architecture Considerations of Time Sensitive Targeting and NATO TST Tool Orhan Cetinkaya, PhD Yakup Yildirim, PhD NCI Agency, 19-21 June 2013 NATO UNCLASSIFIED 1 Outline Joint Targeting Time Sensitive
More information23.7 billion billion CHALLENGES AND OPPORTUNITIES ENHANCING SECURITY AND CONNECTIVITY WITH DIGITAL TRANSFORMATION
MARITIME DRIVING DIGITAL INNOVATION FOR FUTURE GROWTH Enhancing Security and Connectivity 24 Ang Mo Kio Street 65, Singapore 569061 mktg.elect@stengg.com www.stengg.com CHALLENGES AND OPPORTUNITIES ENHANCING
More informationImplementation of Service-Oriented Architecture for an Integrated Simulation, Training and Experimental Environment
Implementation of Service-Oriented Architecture for an Integrated, Training and Experimental Environment Jason Keir; Christopher Millmore Virtual Environments & Laboratory (VESL) School of ITEE j.keir@adfa.edu.au
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO. Work in this project is performed by the U.S. Army Research Laboratory (ARL), Aberdeen Proving Ground, MD.
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Army Date: February 2015 2040: Research, Development, Test & Evaluation, Army / BA 2: Applied Research COST ($ in Millions) Prior Years FY 2014 FY
More informationTOPIC DESCRIPTION SUPPLEMENT for the SYSTEMS ENGINEERING SURVEY DESCRIPTION
1 2 Objectives of Systems Engineering 3 4 5 6 7 8 DoD Policies, Regulations, & Guidance on Systems Engineering Roles of Systems Engineering in an Acquisition Program Who performs on an Acquisition Program
More informationSiveillance Vantage secures your critical infrastructure
Siveillance Vantage secures your critical infrastructure Enhanced security management with reliable and coordinated response for emergency and routine procedures Answers for infrastructure. Ensuring security,
More informationDEPARTMENT OF DEFENSE STANDARD PRACTICE
NOT MEASUREMENT SENSITIVE 5 April 2012 SUPERSEDING 28 January 2008 DEPARTMENT OF DEFENSE STANDARD PRACTICE DOCUMENTATION OF VERIFICATION, VALIDATION, AND ACCREDITATION (VV&A) FOR MODELS AND SIMULATIONS
More informationSECURITY SOLUTIONS UTILITIES AND TELECOMMUNICATIONS
SECURITY SOLUTIONS UTILITIES AND TELECOMMUNICATIONS PACOM is quickly developing a distinguished reputation as a global leader in the field of remote security management for utilities and telecommunications
More informationTechnology Insertion. 8 March Walt Dickey. Deepwater brief template.ppt 1
Technology Insertion 8 March 2005 Walt Dickey Deepwater brief template.ppt 1 U. S. Coast Guard Missions Maritime Safety Search and Rescue International Ice Patrol Maritime Mobility Lightering Zone Enforcement
More informationOperational Activity Decomposition (OV-5, Node Tree)
Operational Activity Decomposition (OV-5, Node Tree) The Biological Sensor Fusion (BSF) node tree diagram organizes the Operational Activities in a hierarchical structure from highest to lowest in a single
More informationRequest for Solutions: High Energy Laser (HEL) Flexible Prototype. 11 December 2018
Request for Solutions: High Energy Laser (HEL) Flexible Prototype 11 December 2018 1.0 Purpose The Air Force Life Cycle Management Center (AFLCMC) seeks a prototype groundbased Laser Weapon System (LWS)
More informationBEST PRACTICES IN ENTERPRISE ASSET MANAGEMENT:
BEST PRACTICES IN ENTERPRISE ASSET MANAGEMENT: Homeland Security Week O c t o b e r 2 0 1 8 Written By: Douglas Morgan and Bob Caviness 1225 South Clark Street Suite 1300 Arlington, VA 22202 STSint.com
More informationArchitecture Modeling Approach for Net-Centric Enterprise Services
Architecture Modeling Approach for Net-Centric Enterprise s (C4ISR/C2 Architecture Track, Paper #60) Yun-Tung Lau, Ph.D.*, Michelle TJ King (SAIC) Walter J. Okon and David Kye (DISA/NE) June, 2005 NCES
More informationContact Program Coordinator NMMT Working Group Holger Klindt
emir is an open initiative of the German maritime industry for improving safety and efficiency in maritime transportation systems. emir provides a framework for engineering, validation, verification, and
More informationDevelopment, Validation and Implementation Considerations of a Decision Support System for Unmanned & Autonomous System of Systems Test & Evaluation
Development, Validation and Implementation Considerations of a Decision Support System for Unmanned & Autonomous System of Systems Test & Evaluation Test Week 2010 Kris Cowart, Maj, USAF Ricardo Valerdi,
More informationPassit4Sure.OG Questions. TOGAF 9 Combined Part 1 and Part 2
Passit4Sure.OG0-093.221Questions Number: OG0-093 Passing Score: 800 Time Limit: 120 min File Version: 7.1 TOGAF 9 Combined Part 1 and Part 2 One of the great thing about pass4sure is that is saves our
More informationSample Reliability Language for DoD Acquisition Contracts
Sample Reliability Language for DoD Acquisition Contracts The single most important step necessary to correct high suitability failure rates is to ensure programs are formulated to execute a viable systems
More informationEnterprise Portal Modeling Methodologies and Processes
Enterprise Portal Modeling Methodologies and Processes Tushar K. Hazra, Ph.D. tkhazra@bellatlantic.net (410) 960-2112 1 Objectives Introducing the case for Enterprise Portal Modeling (EPM) Do we need to
More informationW911NF Project - Mid-term Report
W911NF-08-1-0041 Project - Mid-term Report Agent Technology Center, Czech Technical University in Prague Michal Pechoucek 1 Accomplishments for the First 6 Months 1.1 Scenario and Demos During the first
More informationMethodology for Modeling, Simulation, and Analysis Support of DoD Space Acquisitions
Methodology for Modeling, Simulation, and Analysis Support of DoD Space Acquisitions Aerospace USC Technical Interchange Meeting Dec 17, 2010 Michael Baxter, Director Modeling & Simulation Systems Analysis
More informationLARGE SCALE COMPUTER SIMULATION MODELING SYSTEM ENHANCEMENTS. Project Results Executive Overview
National Shipbuilding Research Program Advance Shipbuilding Enterprise LARGE SCALE COMPUTER SIMULATION MODELING SYSTEM ENHANCEMENTS Project Results Executive Overview Prepared by: LSMS Project Team Submittal
More informationCONTINUITY OF OPERATIONS PLAN
CONTINUITY OF OPERATIONS PLAN (TEMPLATE) NAME OF ORGANIZATION/BUSINESS ADDRESS PHONE NUMBER Organization Logo Continuity of Operations Plan Version 1.5 Table of Contents I. Introduction... 1 II. Purpose...
More informationDeployable SAR Integrated Chain with Unmanned Systems (DARIUS) Stephen Broatch. DARIUS Project Coordinator
Deployable SAR Integrated Chain with Unmanned Systems (DARIUS) Stephen Broatch DARIUS Project Coordinator Copyright 2014 All Rights Reserved The research leading to these results has received funding from
More informationNATIONAL INCIDENT MANAGEMENT SYSTEM CAPABILITY ASSESSMENT SUPPORT TOOL (NIMCAST) SELF-ASSESSMENT INSTRUMENT 6
NATIONAL INCIDENT MANAGEMENT SYSTEM CAPABILITY ASSESSMENT SUPPORT TOOL (NIMCAST) TABLE OF CONTENTS Page TABLE OF CONTENTS 1 NATIONAL INCIDENT MANAGEMENT SYSTEM CAPABILITY ASSESSMENT SUPPORT TOOL (NIMCAST)
More informationMassachusetts Institute of Technology
Massachusetts Institute of Technology A Prescriptive Adaptive Test Framework (PATFrame) for Unmanned and Autonomous Systems: A Collaboration Between MIT, USC, UT Arlington and Softstar Systems Dr. Ricardo
More informationUse of an Executable Workflow Model To Evaluate C2 Processes
12 th ICCTRS Adapting C2 to the 21 st Century Use of an Executable Workflow Model To Evaluate C2 Processes Network-centric Metrics C2 Modeling and Simulation C2 Experimentation Paul D. North POC: Paul
More informationScience & Technology Directorate
Science & Technology Directorate Unified Incident Command Decision Support (UICDS) Overview Michael B. Smith Science and Technology Directorate U.S. Department of Homeland Security Sept 12, 2006 1 1 1
More informationVIRGINIA CENTRAL REGION ITS ARCHITECTURE IMPLEMENTATION PLAN
VIRGINIA CENTRAL REGION ITS ARCHITECTURE IMPLEMENTATION PLAN Prepared for: Prepared by: June 23, 2009 i Table of Contents 1 INTRODUCTION... 1 2 USE OF ARCHITECTURE... 1 2.1 Architecture Use for Planning...
More informationSimulation-based Command and Control Applications in a Service-Oriented Environment. John Daly Booz Allen Hamilton
Simulation-based Command and Control Applications in a Service-Oriented Environment John Daly Booz Allen Hamilton daly_john@bah.com Outline Background C2 Concepts Operational Picture and Situational Assessment
More informationCoastWatch VTMIS Traffic Management and Information System
CoastWatch VTMIS Traffic Management and Information System SAAB SYSTEMS Saab can proudly present the CoastWatch VTMIS as an entirely in-house development. In order to achieve the world s best VTMIS solution,
More informationRevision Summary Document for the FEA Consolidated Reference Model Version 2.3
Revision Summary Document for the FEA Consolidated Reference Model Version 2.3 October 2007 Table of Contents 1 INTRODUCTION... 3 2 OVERVIEW... 4 3 PERFORMANCE REFERENCE MODEL (PRM)... 5 3.1 Mission and
More informationAppendix A: T&E workforce competency model
Appendix A: T&E workforce competency model Table 19. The Model Units of Planning Competency 1. Risk Identification Element 1. Identify T&E risk factors (e.g., lack of available time, money, test platforms,
More informationSAAB CBRN SOLUTIONS SAFEGUARDING OPERATIONAL CAPABILITIES
CBRN Brochure - VER 1 - MAY 2013 www.saabgroup.com SAAB CBRN SOLUTIONS SAFEGUARDING OPERATIONAL CAPABILITIES PROTECT AND SECURE CONTENTS cbrn automatic warning AND reporting system 4 THIS IS HOW IT WORKS
More informationSecure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology
Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology 1 Project Team Profile PI: Larry Shi, University of Houston
More informationMBA BADM559 Enterprise IT Governance 12/15/2008. Enterprise Architecture is a holistic view of an enterprise s processes, information and
Enterprise Architecture is a holistic view of an enterprise s processes, information and information technology assets as a vehicle for aligning business and IT in a structured, more efficient and sustainable
More informationMANAGEMENT INFORMATION SYSTEMS COURSES Student Learning Outcomes 1
MANAGEMENT INFORMATION SYSTEMS COURSES Student Learning Outcomes 1 MIS 180: Principles of Information Systems 1. Explain the importance of determining information system requirements for all management
More informationSECTION C - DESCRIPTION / SPECIFICATIONS / STATEMENT OF WORK
SECTION C - DESCRIPTION / SPECIFICATIONS / STATEMENT OF WORK C.1. OBJECTIVE The objective of OASIS is to provide Government agencies with total integrated solutions for a multitude of professional service
More informationProtecting Information Assets - Week 9 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protecting Information Assets
Protecting Information Assets - Week 9 - Business Continuity and Disaster Recovery Planning MIS5206 Week 9 Case study discussion Business Continuity Planning (BCP) and Disaster Recovery (DR) Planning Test
More informationIBM Algo Managed Data Analytics Service
IBM Algo Managed Data Analytics Service Highlights Secure cloud-based platform with high scalability and performance Broad range of advanced risk and portfolio analytics Integrated risk framework on-demand
More informationDARPA s APT to transform genetic modified plants into military sensors of chemical, biological, radiological, and electromagnetic signals.
DARPA s APT to transform genetic modified plants into military sensors of chemical, biological, radiological, and electromagnetic signals. DARPA has launched a new surveillance program which plans to use
More informationIntermediate Systems Acquisitions Course. Commercial and Non-Developmental Items
Commercial and Non-Developmental Items Many systems acquired by DHS are not completely new developments; instead, they use existing products. These products may be used just as they are, or they may be
More information15th International Conference on Harmonisation within Atmospheric Dispersion Modelling for Regulatory Purposes 6 9 May 2013, Madrid, Spain
15th International Conference on Harmonisation within Atmospheric Dispersion Modelling for Regulatory Purposes 6 9 May 2013, Madrid, Spain ESSEM COST ACTION ES1006 Evaluation, improvement and guidance
More informationAutomating the Defense: Really Taking Advantage of Automated Sharing
Automating the Defense: Really Taking Advantage of Automated Sharing Michael Vermilye The Johns Hopkins University Applied Physics Laboratory 2017 by The Johns Hopkins Applied Physics Laboratory. Material
More informationCMMI-DEV V1.3 CMMI for Development Version 1.3 Quick Reference Guide
processlabs CMMI-DEV V1.3 CMMI for Development Version 1.3 Quick Reference Guide CMMI-DEV V1.3 Process Areas Alphabetically by Process Area Acronym processlabs CAR - Causal Analysis and Resolution...
More informationRequest for Proposal for Implementation of ERP and Webbased ERP- like Solutions
Request for Proposal for Implementation of ERP and Webbased ERP- like Solutions Corrigendum to Volume I System Integration Services and Solution Scope Indian Institute of Technology Bombay NOTE: The contents
More informationSystem of Systems Common Operating Environment (SOSCOE) Support to Net Centricity
System of Systems Common Operating Environment (SOSCOE) Support to Net Centricity Paul Schoen, Director SOSCOE FCS LSI, Boeing 1 FCS Layered, Networked Architecture Infantry Carrier Vehicle Mounted Combat
More informationADM The Architecture Development Method
ADM The Development Method P Preliminary Phase Preliminary Phase Determine the Capability desired by the organization: Review the organizational context for conducting enterprise architecture Identify
More informationA PROACTIVE GIS INFRASTRUCTURE FOR ENVIRONMENTAL MONITORING
A PROACTIVE GIS INFRASTRUCTURE FOR ENVIRONMENTAL MONITORING M. Martinelli 1, D. Moroni 1, G. Pieri 1, and M. Tampucci 1 1 Institute of Information Science and Technologies ISTI-CNR, Via Moruzzi 1, I-56124,
More informationConcept Development and Experimentation Course. ACT CD&E Process. February 1, 2007
Concept Development and Experimentation Course ACT Process February 1, 2007 Robert R. Tyler, Ph.D. Research Scientist, Evidence Based Research, Inc. 1595 Spring Hill Road, Suite 250 Vienna, VA 22182 703-893-6800,
More informationLockNESS. Next-generation maritime situational awareness
LockNESS Next-generation maritime situational awareness 2 3 The LockNESS solution can be used for a variety of missions in military and security situations, including: Battle group defense Infrastructure
More informationSIMPLIFIED APPROACH ON DEVELOPING PREVENTIVE AND CORRECTIVE MAINTENANCE STRATEGY
2018 NDIA GROUND VEHICLE SYSTEMS ENGINEERING AND TECHNOLOGY SYMPOSIUM SYSTEMS ENGINEERING (SE) TECHNICAL SESSION AUGUST 7-9, 2018 - NOVI, MICHIGAN SIMPLIFIED APPROACH ON DEVELOPING PREVENTIVE AND CORRECTIVE
More informationFEATURES. 12 Army Sustainment
FEATURES 12 Army Sustainment Additive manufacturing employs computer-aided design and manufacturing capabilities to create objects through layer-by-layer printing. (Photo by Amanda Dunford) By Capt. MuShawn
More informationConnected vehicles and other advanced safety features can be effective in reducing, and maybe eliminating, these fatalities.
1 2 3 Michigan has made impressive strides over the past decade in reducing the number of traffic fatalities on our roads. However, over the past couple of years, the trend of sharp declines in fatalities
More informationEnabling Integration of Distributed Renewables - Program 174
Enabling Integration of Distributed Renewables - Program 174 Program Description Program Overview The integration of distributed renewable generation sources into the electricity grid poses a number of
More informationAeroVironment, Inc. Unmanned Aircraft Systems Overview. Background
AeroVironment, Inc. Unmanned Aircraft Systems Overview Background AeroVironment provides customers with more actionable intelligence so they can proceed with certainty. Based in California, AeroVironment
More informationOIL & GAS INFRASTRUCTURES PROTECTION
OIL & GAS INFRASTRUCTURES PROTECTION OIL & GAS INFRASTRUCTURES PROTECTION Leonardo s Critical Infrastructure capabilities deliver surveillance and security systems to the Oil & Gas upstream, midstream
More informationUnit 4: Response Actions
: Unit Introduction Visual 4.1 Visual Description: Unit Introduction The Framework is intended to strengthen, organize, and coordinate response actions across all levels. Unit 4 describes and outlines
More informationSoftware Systems Technology Conference
Capabilities Composition Software Systems Technology Conference 22 April 2009 Mr. Terry Simpson Space & Naval Warfare Systems Center Atlantic terry.simpson@navy.mil (843) 218 5630 DSN 312 588 5630 Agenda
More informationDepartment of Homeland Security. Office of Emergency Communications
Department of Homeland Security Office of Emergency Communications STATEWIDE COMMUNICATION INTEROPERABILITY PLAN (SCIP) WEIGHTED EVALUATION CRITERIA September 2007 1 I. BACKGROUND The Public Safety Interoperable
More informationDESIGN AND DEVELOPMENT OF THE YELLOWFIN UUV FOR HOMOGENEOUS COLLABORATIVE MISSIONS
AUVSI10-West DESIGN AND DEVELOPMENT OF THE YELLOWFIN UUV FOR HOMOGENEOUS COLLABORATIVE MISSIONS Michael E. West, * Michael Novitzky, Jesse P. Varnell, Andrew Melim, Evan Seguin, Tedd C. Toler, Tomas R.
More informationContinuity of Operations (COOP) Multi-Year Strategy and Program Management Plan Template Guide
Continuity of Operations (COOP) Multi-Year Strategy and Program Management Plan Template Guide Federal Emergency Management Agency 500 C ST, SW Washington, D.C. 20472 FEMA GUIDE INSTRUCTIONS This guide
More informationData Management Complexity Simplified
Data Management Complexity Simplified Managing Information Overload More Effectively on Fixed and Rotary Wing Aircraft Abstract The multiple independent sensors on board today s fixed and rotary wing platforms
More informationIBM QRadar on Cloud. The amount payable for the IBM SaaS is specified in a Transaction Document.
IBM Terms of Use SaaS Specific Offering Terms IBM QRadar on Cloud The Terms of Use ( ToU ) is composed of this IBM Terms of Use - SaaS Specific Offering Terms ( SaaS Specific Offering Terms ) and a document
More informationSiveillance Vantage secures your critical infrastructure
Siveillance Vantage secures your critical infrastructure Integrated security management with reliable and coordinated response for emergency and routine procedures Answers for infrastructure and cities.
More information"Charting the Course... MOC B Designing a Microsoft SharePoint 2010 Infrastructure. Course Summary
Course Summary Description This 5 day ILT course teaches IT Professionals to design and deploy Microsoft SharePoint. Objectives At the end of this course, students will be able to: Describe the core methods
More informationThe Open Group Exam OG0-091 TOGAF 9 Part 1 Version: 7.0 [ Total Questions: 234 ]
s@lm@n The Open Group Exam OG0-091 TOGAF 9 Part 1 Version: 7.0 [ Total Questions: 234 ] https://certkill.com Topic break down Topic No. of Questions Topic 1: Volume A 100 Topic 2: Volume B 134 2 https://certkill.com
More informationPartners for Advanced Transportation Technologies. USDOT and PATH. PATH Directors. January 25, 2012
Partners for Advanced Transportation Technologies USDOT and PATH Tom West tomwest@path.berkeley.edu Roberto Horowitz horowitz@berkeley.edu PATH Directors January 25, 2012 California PATH In 2011, two major
More informationVIEWPOINT MORE RESILIENT POSITIONING, NAVIGATION AND TIMING (PNT) THROUGH OPEN ARCHITECTURE AND ANALYTICS
VIEWPOINT MORE RESILIENT POSITIONING, NAVIGATION AND TIMING (PNT) THROUGH OPEN ARCHITECTURE AND ANALYTICS MORE RESILIENT POSITIONING, NAVIGATION AND TIMING (PNT) THROUGH OPEN ARCHITECTURE AND ANALYTICS
More informationA Visualization and Decision-Support Tool for Homeland Security Risk Prioritization
Research Synopsis A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization Modeling Area: Risk Assessment Case Studies Supported: Risk-Based Resource Allocation Principal Investigator:
More informationYou can plan and execute tests across multiple concurrent projects and people by sharing and scheduling software/hardware resources.
Data Sheet Application Development, Test & Delivery Performance Center Micro Focus Performance Center software is an enterprise-class performance engineering software, designed to facilitate standardization,
More informationSmart Distribution Applications and Technologies - Program 124
Smart Distribution Applications and Technologies - Program 124 Program Description Program Overview New technologies will be critical to future smart grid operation. These technologies will include advanced
More informationEvolutionary Differences Between CMM for Software and the CMMI
Evolutionary Differences Between CMM for Software and the CMMI Welcome WelKom Huan Yín Bienvenue Bienvenido Wilkommen????S???S??? Bienvenuto Tervetuloa Välkommen Witamy - 2 Adapting an An Integrated Approach
More informationPREPARING FOR EFFICIENT RESPONSE AND RAPID RECOVERY
SAP Solution in Detail SAP for Public Sector Emergency Management HELP from SAP and Business Objects PREPARING FOR EFFICIENT RESPONSE AND RAPID RECOVERY The SAP Emergency Management for Public Sector package
More informationHuman Behavior in the Infantry Warrior Simulation (IWARS)
Human Behavior in the Infantry Warrior Simulation (IWARS) Applications of BRIMS Alicia Borgman General Dynamics Information Technology Objectives IWARS Overview HBR in IWARS Future HBR Development Directions
More informationTOGAF 9.1 in Pictures
TOGAF 9. in Pictures The TOGAF ADM Cycle Stage Set up an EA team and make sure it can do its work The ADM is about understanding existing architectures and working out the best way to change and improve
More informationOutline. Concept of Development Stage. Engineering Development Stage. Post Development Stage. Systems Engineering Decision Tool
Outline Course Outline Introduction to the Course Introduction to Systems Engineering Structure of Complex System System Development Process Needs Analysis Concept Exploration Concept Definition Advanced
More informationIntegrating Self-Health Awareness in Autonomous Systems
Integrating Self-Health Awareness in Autonomous Systems Karl. M. Reichard The Applied Research Laboratory The Pennsylvania State University P.O. Box 30, State College, PA 16804 Email: kmr5@psu.edu Abstract
More informationExecutive Summary. Revision chart and history log "UNMANNED GROUND TACTICAL VEHICLE (UGTV)" Contract B-0068-GEM3-GC
Project "UNMANNED GROUND TACTICAL VEHICLE (UGTV)" under Contract B-0068-GEM3-GC Executive Summary Period covered: 04.08.09 31.05.10 Issue Date: 30.06.2010 Start date of project: 04.08.09 Duration: 9 months
More informationTOGAF 9.1 Phases E-H & Requirements Management
TOGAF 9.1 Phases E-H & Requirements Management By: Samuel Mandebvu Sources: 1. Primary Slide Deck => Slide share @ https://www.slideshare.net/sammydhi01/learn-togaf-91-in-100-slides 1. D Truex s slide
More informationAddressing the Challenges of Systems Engineering Estimation
Addressing the Challenges of Systems Engineering Estimation Karen McRitchie/Kathy Kha, Galorath Incorporated 2016 Copyright Galorath Incorporated 1 ABSTRACT Cost is a crucial factor in evaluating the viability
More informationINFORMATION MANAGEMENT/ INFORMATION TECHNOLOGY (IM/IT) 8 September Advanced Planning Briefing to Industry
DRAFT INFORMATION MANAGEMENT/ INFORMATION TECHNOLOGY (IM/IT) 8 September 2011 Advanced Planning Briefing to Industry MR. SCOTT WHITE IM/IT TRAIL BOSS Joint Program Executive Office for Chemical and Biological
More informationGiven design trade studies, interpret the results to recommend the most cost-effective concept for development.
1 Summarize the Planning, Programming, Budgeting and Execution (PPBE) process. Analyze the financial structure and the movement of funds within the PPBE. 2 Given a scenario, develop an appropriate PMO
More information