Systems and Technologies for Enhanced Coastal Maritime Security

Size: px
Start display at page:

Download "Systems and Technologies for Enhanced Coastal Maritime Security"

Transcription

1 Systems and Technologies for Enhanced Coastal Maritime Security Edward M. Carapezza a* and Ann Bucklin a a University of Connecticut-Avery Point, Groton, CT, USA ABSTRACT This paper describes a design for an innovative command and control system for an intelligent coastal maritime security system. The architecture for this intelligent coastal maritime security system is derived from the forth generation real-time control (RCS) system architecture 1 developed by the National Institute of Science and Technology (NIST) over the past twenty years. This command and control system is a decision support system for real-time monitoring, response and training for security scenarios that can be hosted at various locations along the coast of the United States where homeland security surveillance and response activities are required. Additionally, this paper describes the design for a derivative real-time simulation based environment that can be used as a state-ofart test bed for developing new hardware and software components to be integrated into previous versions of deployed real-time control systems. Keywords: command and control systems, intelligent systems, unattended sensors, homeland security, maritime coastal security, sensor networks, detection, classification, and tracking 1. INTRODUCTION 1.1 Background The coastal areas of United States form a porous and vulnerable border that is of national strategic interest. Our maritime coastal border is over 95,000 miles long, dwarfing the only 7,500 mile land border with Mexico and Canada. The United States also has more than 361 ports and over 7,000 foreign-flag ships make 51,000 calls in U.S. ports annually. These areas require a sustainable security system to detect anomalous behaviors and operations and to provide technologies and assets to respond to these threats. The military has developed complex, intelligent command and control systems, using distributed agents and networks of unmanned and unattended sensor platforms and devices to provide continuous regional surveillance and detection, classification, and integrated response to emerging threat situations. Our maritime coastal border areas require such command and control systems, with a persistent presence, to ensure the security of heavily populated coastal regions and important infrastructure related facilities, such as power plants, chemical plants, and harbors. 1.2 System Requirements There is a need to develop an integrated, state-of-the-art architecture and intelligent coastal maritime security systems for real-time monitoring, event response and first responder training. This intelligent, networked system must be portable for hosting at coastal user community sites around the country. This system must be adaptable to support the management of complex response activities over a range of different types and scales of terrorist incidents as such events inevitably evolve and change in scale over time. The system must be modular and distributed to enable sustained operations through significant and geographically distributed terrorist incidents. Conjunctive with the development of these real-time systems, a state-of-art test bed must also be developed. This test bed, a simulation/stimulation based environment, is required to enable new components and subsystems to be tested and evaluated prior to implementation on existing, deployed systems. This test bed must be designed to support first responder training, exercise rehearsals and reconstructions and will be useful to promote national collaboration between maritime homeland security researchers, developers, and user organizations. * carapezz@engr.uconn.edu; phone Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense VII, edited by Edward M. Carapezza, Proc. of SPIE Vol. 6943, , (2008) X/08/$18 doi: / SPIE Digital Library -- Subscriber Archive Copy Proc. of SPIE Vol

2 Figure 1 depicts the typical phases and major command and control system functions that must be supported. Prior to the occurrence of any terrorist event, the coastal maritime security system must support the functions of protecting coastal targets, monitoring significant threat related indications and warnings, deterring an event if enough actionable intelligence is available prior to the event, and training and preparing first responders for post event consequence management activities. If and when a coastal terrorist event occurs, the system must available provide an intelligent consequence management capability over the event duration. Prepare to Respond Deter & Prevent Threat Indications & Warnings Responder Equipment, Simulation and Training Respond to Event Intelligent Consequence Management Protect Coastal Targets Neutralize Threat Coastal Terrorist Event Search & Apprehend Perpetrators Primary Phases Requiring Intelligent Decision Support & Integrated Sensor Networks Figure 1: Functions and Phase Relationships for Coastal Maritime Terrorist Events 2. SYSTEM ARCHITECTURE The architecture for this class of intelligent command and control systems is depicted in figure 2 below and is modeled after the Real-Time Control System (RCS) architecture developed over many years by scientists and engineers in the Intelligent Systems Laboratory at the National Institute of Science and Technology (NIST). This RCS architecture extended and implemented for a wide variety of challenging applications by numerous government labs and companies over the past twenty years. Using the basic RCS representation as a model, the high level architecture and associated functional requirements for an intelligent security system for coastal maritime homeland security applications are depicted in figure 2. Proc. of SPIE Vol

3 Intelligent Maritime S ecurity S ys tem Tes t B ed for Intelligent C oas tal Maritime S ecurity S ys tem Development (R &D tool for S ystem Development/E valuation, Modeling, S imulation,training,e xercise P lanning & Reconstruction) Legacy Systems Intel/C ollec tion Systems Resource Systems (FEMA/USCG/Fire/DoD) Sensory Processing Legacy System Inputs Intelligence & Threat Conditions Resource Readiness Processed Sensor Info World Model Real-time Dbas es: threa ts sensor environment resources legacy etc Historical Dbases : threats sensor environment resources legacy etc Mis s ion (Goal) Associate Behavior S ituational Generation Awareness Tactical Planner Tactical Response Internal World Repres entation E xternal World Representation Sensors (space,air,ground, u/w, surface) Real World Actuators /E ffectors (responders/equipment deployed) Figure 2: High Level Architecture and Functions for Intelligent Coastal Maritime Security System 3. PHASED DEVELOPMENT APPROACH After the specific system requirements are developed, design documentation for the coastal maritime security domain specific architecture will be developed. Once this domain specific architecture is developed and simulated using realistic maritime security scenarios, individual component and system technologies will be developed and integrated into this system. Legacy systems, existing or emerging maritime security related databases, devices and systems, will be identified and linked to this architecture to reduce redundancy and provide for cost effective development. Once developed, this integrated system architecture will be a model for national and international command and control systems for coastal maritime security. The maritime domain specific architecture will be made available to other states, regions, and international allies to enhance their readiness against homeland security threats. A prototype of this architecture and integrated system will be developed and made available for demonstration through a combination of both real system hardware and software and through simulation to homeland security users who are developing infrastructure facility or area protection maritime homeland security systems. Additionally, new system integration, unattended sensor, unmanned vehicle, fusion, communication, etc technologies will be designed or enhanced during the system development and demonstration processes. These individual technologies will be described and made available to other organizational entities that are developing state-of-art homeland security systems. A phased approach for both the security system and for the associated development test bed will be utilized to develop, demonstrate, and enhance the architecture and prototypical, domain specific systems and devices. 4. DEVELOPMENT PRODUCTS AND CONTRIBUTIONS Using the phased research and development approach, the anticipated products and contributions of this coastal maritime security system are depicted in the diagram below. Proc. of SPIE Vol

4 C oas tal Maritime S ec urity S ys tem TechnicalS olution Technical S upport Technical Coordination P olic y Standards Phased Development Approach Develop S ystem R equirements and S cenarios Identify R elevant Legacy or E merging S ystems Develop System Metrics & Measures of Effectiveness (MOEs) Develop S ystem Architecture Develop S ystem S imulation/s timulation (S IM/S TIM) C omponents Integrate & Demonstrate Performance in S im/s tim E nvironment Integrate C omponents with Legacy S ystems/inputs Demonstrate F ull S ystem P erformance in testbed environment Demonstrate Training C apabilities in testbed environment Host system & validate system performance with real distributed demonstrations in representative regions of country Upgrade system & documentation based upon lessons learned Test & E valuation site for emerging threat capabilities and incidents Test & E valuation site for emerging technologies & interoperability 1. Technical S olutions Domain-S pecific C 3 I Architecture S tate-of-a rt National T estbed P ilot demonstrations to user communities 2. Technical S upport Interoperability assistance Technical system assistance Protocol verification Training assistance S ystem implementation assistance C ase studies & scenario development S ymposiums and conferences 3. Technical Coordination Integrated system support across & for federal/s tate/local government entities Integrated system support across & for corporate/lab developers & integrators 4. Policy Technology monitoring S ecurity studies 5. S tandards Integrated S ecurity R esponse S ystems R esponder Leadership Figure 3: Phased Development Approach and Anticipated Contributions 5. SITUATIONAL AWARENESS ASSOCIATE The defense of high value coastal areas, such ports, commercial facilities, power plants requires a surveillance capability for detecting, tracking and identifying real-time air, ground, water surface 2, and submerged threats 3. Defending these high value coastal areas against individual or combinations of air, ground, surface water and submerged threats is an extremely challenging problem. An individual, a group of individuals, or even a small air, ground or submerged vehicle could easily be used to carry dangerous materials, such as explosives, chemical, biological, radiological, or nuclear materials, to high value targets in our coastal areas. Transportation centers, harbors, populated residential areas, and important commercial and military facilities are vulnerable to such attacks. Each high value asset or area could have its own local distributed, networked set of multi-phenomenological surveillance sensors and signal processing subsystems. This surveillance system would have to be tailored for the specific type of facility and surrounding terrain and bathymetry. Real-time information from these local surveillance systems would be fused with information from existing legacy surveillance assets and other regional and national sensor systems. This fused, real-time information would be processed by the intelligent coastal maritime security system to develop a situational awareness context. The decision support components of the overall security system would then reason with this updated world model view to formulate conclusions about the true state of the evolving threat situation and would recommend actions to human operators to deploy consequence management resources in a quasi-optimal time sequence. The distributed surveillance subsystem would be acting as an intelligent situational awareness associate, a human-like software entity that would generate an evolving representation of the current external world and evolving problem situation to the human response team. This associate software entity would also have the capability to provide some indication of the quality of the situational picture provided, using some type of reasoning with uncertainty. A robust graphic interface and an intelligent explanation facility would enable the Proc. of SPIE Vol

5 human response team to ask the situational awareness entity questions about the quality of the fused surveillance information provided and the pedigree of the logic used to make conclusions about the current state of the external world. 6. TACTICAL PLANNING ASSOCIATE As the surveillance system is updating the current world model using stored and emerging information from legacy systems and from dedicated networked sensors, to reflect the current state of the event, a tactical planning component for the system is available to plan the recommended actions to mitigate the consequences of the terrorist actions. This tactical planning software component would reconcile all previously identified and evolving prioritized goals for the consequence management system with the assets available for deployment. The resources available for consequence management include all human assets, such as first responders, and all air, ground, and water vehicles, facilities, and other devices. This tactical planning subsystem would be acting as an intelligent tactical planning associate, a human-like software entity that would use the evolving representation of the current external world and evolving problem situation to the recommend a set of planned actions to the human response team. This associate software entity would also have the capability to provide some indication of the quality of the tactical plans provided, using some type of reasoning with uncertainty. A robust graphic interface and an intelligent explanation facility would also enable the human response team to ask the tactical plan entity questions about the quality of the detailed plans provided and the pedigree of the logic used to make conclusions about the best plan recommended for each sojourn of time. 7. TACTICAL RESPONSE ASSOCIATE As the tactical planning subsystem is updating the current set of recommended plans for action, a distributed tactical response component for the system is available to parse the high level recommended plans in tailored, discrete action tasks for each consequence management asset. This tactical response system software component would also prioritize and order tasks to available resources and report all accomplishment of these assets back to the tactical planning component. As mentioned earlier, the resources available for consequence management include all human assets, such as first responders, and all air, ground, and water vehicles, facilities, and other devices. This response subsystem would be acting as an intelligent tactical response associate, a human-like software entity that would use the evolving representation of the current response accomplishments and evolving state of resource availability to the recommend modifications and refinements to the plans and associated tasks to the human response team. This associate software entity would also have the capability to provide some indication of the quality of the event response actions provided, using some type of reasoning with uncertainty. A robust graphic interface and an intelligent explanation facility would also enable the human response team to ask this response entity questions about the quality of the consequence management actions provided and the pedigree of the logic used to make conclusions about recommendations for modified tasks for the next period of time. 8. SUMMARY Coastal maritime security is an extremely challenging problem. This paper proposes an innovative command and control system design and the use of distributed associate technology and surveillance sensor networks for an intelligent coastal maritime security system. This concept utilizes a domain specific architecture, based on the 4 th generation of the NIST Real Time Control System architecture. This domain specific architecture is distributed associate system architecture with three intelligent associates, a situational awareness associate, a tactical planning associate, and a tactical response associate. Each associate is an intelligent software entity that provides human-like recommendations to a team of humans tasked with the time critical job of responding to some terrorist event. A realtime simulation/stimulation test bed is required to develop and maintain such complex security system. 9. References 1. J.Albus, Real Time Control System (RCS) Handbook ; NIST R.Urick, Underwater Acoustics, E.Carapezza, Sustainable Coastal Sensor Networks: Technologies and Challenges, 2008 Proc. of SPIE Vol

Security & Defense Solutions

Security & Defense Solutions intelligent convergence TM Security & Defense Solutions Intelligent Convergence with Augusta Systems EdgeFrontier White Paper The Need for Intelligent Convergence The distributed and evolving nature of

More information

Maritime Satellite Security Services

Maritime Satellite Security Services ARATOS HOMELAND SECURITY Maritime Satellite Security Services Maritime Security Importance Maritime Security becomes more important in the ever-changing global market thus: The protection of Life Ship

More information

Insight: Operability Testing for High Availability Systems

Insight: Operability Testing for High Availability Systems Insight: Operability Testing for High Availability Systems Edward Beck Computer Sciences Corporation NDIA Systems Engineering Conference October 23-26, 2006 Copyright 2004 Computer Sciences Corporation.

More information

Real-Time Diagnostics for High Availability Systems

Real-Time Diagnostics for High Availability Systems Copyright 2004 Computer Sciences Corporation. All rights reserved. 10/24/2007 12:49:47 PM 1 Real-Time Diagnostics for High Availability Systems Edward Beck Computer Sciences Corporation NDIA Systems Engineering

More information

CENTRE FOR MARITIME RESEARCH AND EXPERIMENTATION

CENTRE FOR MARITIME RESEARCH AND EXPERIMENTATION CENTRE FOR MARITIME RESEARCH AND EXPERIMENTATION Gabriel Grenon, Dr.Alain Maguer presented by Per Arne Sletner Head, Autonomous Unmanned Vehicles Section Slide 1 Mission CMRE organises and conducts scientific

More information

TSA System Architecture

TSA System Architecture TSA System Architecture Keith Goll TSA/ACC Security Capabilities Workshop July 19, 2017 TSA System Architecture Program Overview The System Architecture (SA) allows the Transportation Security Administration

More information

DHS Enterprise Architecture. The Open Group Conference Boundaryless Information Flow October 20, 2003

DHS Enterprise Architecture. The Open Group Conference Boundaryless Information Flow October 20, 2003 DHS Enterprise Architecture The Open Group Conference Boundaryless Information Flow October 20, 2003 Our EA Challenge Support the FY05 budget formulation process Develop high-level, conceptual Homeland

More information

DATA ITEM DESCRIPTION TITLE: TRAINING SITUATION DOCUMENT Number: DI-SESS-81517C Approval Date:

DATA ITEM DESCRIPTION TITLE: TRAINING SITUATION DOCUMENT Number: DI-SESS-81517C Approval Date: DATA ITEM DESCRIPTION TITLE: TRAINING SITUATION DOCUMENT Number: DI-SESS-81517C Approval Date: 20130524 AMSC Number: N9379 Limitation: N/A DTIC Applicable: N/A GIDEP Applicable: N/A Office of Primary Responsibility:

More information

SOLUTION MOTION VIDEO EXPLOITATION

SOLUTION MOTION VIDEO EXPLOITATION SOLUTION MOTION VIDEO EXPLOITATION SITUATIONAL AWARENESS IN A DYNAMIC ENVIRONMENT Conditions on the ground can change in an instant, and national security depends on up-to-the minute situational awareness.

More information

Methodology for Selecting the Preferred Networked Computer System Solution for Dynamic Continuous Defense Missions

Methodology for Selecting the Preferred Networked Computer System Solution for Dynamic Continuous Defense Missions Methodology for Selecting the Preferred Networked Computer Solution for Dynamic Continuous Defense Missions San Diego Dr. Glenn S. Tolentino Command & Control and Enterprise Engineering Department SPAWAR

More information

UNCLASSIFIED FY Note FY15 increases for Soldier sensory performance, training effectiveness and Soldier system architecture research.

UNCLASSIFIED FY Note FY15 increases for Soldier sensory performance, training effectiveness and Soldier system architecture research. Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Army Date: March 2014 2040: Research, Development, Test & Evaluation, Army / BA 2: Applied Research COST ($ in Millions) Prior Years FY 2013 FY 2014

More information

Ardmore Seaport-e Contract Team Capabilities

Ardmore Seaport-e Contract Team Capabilities Ardmore Seaport-e Contract Team Capabilities COMPANY NAME 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 3.11 3.12 3.13 3.14 3.15 3.16 3.17 3.18 3.19 3.20 3.21 3.22 ARDMORE CONSULTING GROUP SURVICE TWINTRON

More information

Persistent Surveillance & Border Security (An Automated Means of Aircraft Deconfliction)

Persistent Surveillance & Border Security (An Automated Means of Aircraft Deconfliction) ECONOMICALLY DISADVANTAGED, WOMAN-OWNED SMALL BUSINESS (ED-WOSB) SBA CERTIFIED 8(M), HUB-ZONE & VIRGINIA CERTIFIED SWAM Decision Support for Persistent Surveillance & Border Security (An Automated Means

More information

QUICKLOOK PROJECT PROPOSAL

QUICKLOOK PROJECT PROPOSAL QUICKLOOK PROJECT PROPOSAL Version 1.06 By Tactical Science Solutions, Inc. in support of the Tactical Satellite-3 design effort February 15, 2007 Group: Tactical Science Solutions, Inc. Authors: David

More information

C2 ADVANCED MULTI-DOMAIN ENVIRONMENT AND LIVE OBSERVATION TECHNOLOGIES

C2 ADVANCED MULTI-DOMAIN ENVIRONMENT AND LIVE OBSERVATION TECHNOLOGIES C2 ADVANCED MULTI-DOMAIN ENVIRONMENT AND LIVE OBSERVATION TECHNOLOGIES FLYSEC Final Info Day and Risk-Based Security Projects Cluster meeting 28/06/2018 1 OVERVIEW 2 Source: FRONTEX THE PROBLEM IRREGULAR

More information

Task Force on the Role of Autonomy in the DoD Systems

Task Force on the Role of Autonomy in the DoD Systems Task Force on the Role of Autonomy in the DoD Systems Dr. Robin Murphy, Co-Chair Mr. James Shields, Co-Chair June 2012 Terms of Reference Review relevant technologies to evaluate readiness for introduction

More information

Edison SmartConnect. The Role of IT in. John Bubb Southern California Edison Edison SmartConnect TM May 20, 2008

Edison SmartConnect. The Role of IT in. John Bubb Southern California Edison Edison SmartConnect TM May 20, 2008 Edison SmartConnect The Role of IT in Smart Grid Infrastructure John Bubb Southern California Edison Edison SmartConnect TM May 20, 2008 PG&E LADWP SCE SDG&E SCE Overview Serving over 13 million people

More information

Enterprise Architecture as an Essential Tool Supporting Army Transformation. Fernando Mezquita

Enterprise Architecture as an Essential Tool Supporting Army Transformation. Fernando Mezquita Enterprise Architecture as an Essential Tool Supporting Army Transformation Fernando Mezquita There are two ways of spreading light: to be the candle or the mirror that reflects it. Edith Wharton, 1862-1937

More information

Architecture Considerations of Time Sensitive Targeting and NATO TST Tool

Architecture Considerations of Time Sensitive Targeting and NATO TST Tool Architecture Considerations of Time Sensitive Targeting and NATO TST Tool Orhan Cetinkaya, PhD Yakup Yildirim, PhD NCI Agency, 19-21 June 2013 NATO UNCLASSIFIED 1 Outline Joint Targeting Time Sensitive

More information

23.7 billion billion CHALLENGES AND OPPORTUNITIES ENHANCING SECURITY AND CONNECTIVITY WITH DIGITAL TRANSFORMATION

23.7 billion billion CHALLENGES AND OPPORTUNITIES ENHANCING SECURITY AND CONNECTIVITY WITH DIGITAL TRANSFORMATION MARITIME DRIVING DIGITAL INNOVATION FOR FUTURE GROWTH Enhancing Security and Connectivity 24 Ang Mo Kio Street 65, Singapore 569061 mktg.elect@stengg.com www.stengg.com CHALLENGES AND OPPORTUNITIES ENHANCING

More information

Implementation of Service-Oriented Architecture for an Integrated Simulation, Training and Experimental Environment

Implementation of Service-Oriented Architecture for an Integrated Simulation, Training and Experimental Environment Implementation of Service-Oriented Architecture for an Integrated, Training and Experimental Environment Jason Keir; Christopher Millmore Virtual Environments & Laboratory (VESL) School of ITEE j.keir@adfa.edu.au

More information

UNCLASSIFIED. FY 2016 Base FY 2016 OCO. Work in this project is performed by the U.S. Army Research Laboratory (ARL), Aberdeen Proving Ground, MD.

UNCLASSIFIED. FY 2016 Base FY 2016 OCO. Work in this project is performed by the U.S. Army Research Laboratory (ARL), Aberdeen Proving Ground, MD. Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Army Date: February 2015 2040: Research, Development, Test & Evaluation, Army / BA 2: Applied Research COST ($ in Millions) Prior Years FY 2014 FY

More information

TOPIC DESCRIPTION SUPPLEMENT for the SYSTEMS ENGINEERING SURVEY DESCRIPTION

TOPIC DESCRIPTION SUPPLEMENT for the SYSTEMS ENGINEERING SURVEY DESCRIPTION 1 2 Objectives of Systems Engineering 3 4 5 6 7 8 DoD Policies, Regulations, & Guidance on Systems Engineering Roles of Systems Engineering in an Acquisition Program Who performs on an Acquisition Program

More information

Siveillance Vantage secures your critical infrastructure

Siveillance Vantage secures your critical infrastructure Siveillance Vantage secures your critical infrastructure Enhanced security management with reliable and coordinated response for emergency and routine procedures Answers for infrastructure. Ensuring security,

More information

DEPARTMENT OF DEFENSE STANDARD PRACTICE

DEPARTMENT OF DEFENSE STANDARD PRACTICE NOT MEASUREMENT SENSITIVE 5 April 2012 SUPERSEDING 28 January 2008 DEPARTMENT OF DEFENSE STANDARD PRACTICE DOCUMENTATION OF VERIFICATION, VALIDATION, AND ACCREDITATION (VV&A) FOR MODELS AND SIMULATIONS

More information

SECURITY SOLUTIONS UTILITIES AND TELECOMMUNICATIONS

SECURITY SOLUTIONS UTILITIES AND TELECOMMUNICATIONS SECURITY SOLUTIONS UTILITIES AND TELECOMMUNICATIONS PACOM is quickly developing a distinguished reputation as a global leader in the field of remote security management for utilities and telecommunications

More information

Technology Insertion. 8 March Walt Dickey. Deepwater brief template.ppt 1

Technology Insertion. 8 March Walt Dickey. Deepwater brief template.ppt 1 Technology Insertion 8 March 2005 Walt Dickey Deepwater brief template.ppt 1 U. S. Coast Guard Missions Maritime Safety Search and Rescue International Ice Patrol Maritime Mobility Lightering Zone Enforcement

More information

Operational Activity Decomposition (OV-5, Node Tree)

Operational Activity Decomposition (OV-5, Node Tree) Operational Activity Decomposition (OV-5, Node Tree) The Biological Sensor Fusion (BSF) node tree diagram organizes the Operational Activities in a hierarchical structure from highest to lowest in a single

More information

Request for Solutions: High Energy Laser (HEL) Flexible Prototype. 11 December 2018

Request for Solutions: High Energy Laser (HEL) Flexible Prototype. 11 December 2018 Request for Solutions: High Energy Laser (HEL) Flexible Prototype 11 December 2018 1.0 Purpose The Air Force Life Cycle Management Center (AFLCMC) seeks a prototype groundbased Laser Weapon System (LWS)

More information

BEST PRACTICES IN ENTERPRISE ASSET MANAGEMENT:

BEST PRACTICES IN ENTERPRISE ASSET MANAGEMENT: BEST PRACTICES IN ENTERPRISE ASSET MANAGEMENT: Homeland Security Week O c t o b e r 2 0 1 8 Written By: Douglas Morgan and Bob Caviness 1225 South Clark Street Suite 1300 Arlington, VA 22202 STSint.com

More information

Architecture Modeling Approach for Net-Centric Enterprise Services

Architecture Modeling Approach for Net-Centric Enterprise Services Architecture Modeling Approach for Net-Centric Enterprise s (C4ISR/C2 Architecture Track, Paper #60) Yun-Tung Lau, Ph.D.*, Michelle TJ King (SAIC) Walter J. Okon and David Kye (DISA/NE) June, 2005 NCES

More information

Contact Program Coordinator NMMT Working Group Holger Klindt

Contact Program Coordinator NMMT Working Group Holger Klindt emir is an open initiative of the German maritime industry for improving safety and efficiency in maritime transportation systems. emir provides a framework for engineering, validation, verification, and

More information

Development, Validation and Implementation Considerations of a Decision Support System for Unmanned & Autonomous System of Systems Test & Evaluation

Development, Validation and Implementation Considerations of a Decision Support System for Unmanned & Autonomous System of Systems Test & Evaluation Development, Validation and Implementation Considerations of a Decision Support System for Unmanned & Autonomous System of Systems Test & Evaluation Test Week 2010 Kris Cowart, Maj, USAF Ricardo Valerdi,

More information

Passit4Sure.OG Questions. TOGAF 9 Combined Part 1 and Part 2

Passit4Sure.OG Questions. TOGAF 9 Combined Part 1 and Part 2 Passit4Sure.OG0-093.221Questions Number: OG0-093 Passing Score: 800 Time Limit: 120 min File Version: 7.1 TOGAF 9 Combined Part 1 and Part 2 One of the great thing about pass4sure is that is saves our

More information

Sample Reliability Language for DoD Acquisition Contracts

Sample Reliability Language for DoD Acquisition Contracts Sample Reliability Language for DoD Acquisition Contracts The single most important step necessary to correct high suitability failure rates is to ensure programs are formulated to execute a viable systems

More information

Enterprise Portal Modeling Methodologies and Processes

Enterprise Portal Modeling Methodologies and Processes Enterprise Portal Modeling Methodologies and Processes Tushar K. Hazra, Ph.D. tkhazra@bellatlantic.net (410) 960-2112 1 Objectives Introducing the case for Enterprise Portal Modeling (EPM) Do we need to

More information

W911NF Project - Mid-term Report

W911NF Project - Mid-term Report W911NF-08-1-0041 Project - Mid-term Report Agent Technology Center, Czech Technical University in Prague Michal Pechoucek 1 Accomplishments for the First 6 Months 1.1 Scenario and Demos During the first

More information

Methodology for Modeling, Simulation, and Analysis Support of DoD Space Acquisitions

Methodology for Modeling, Simulation, and Analysis Support of DoD Space Acquisitions Methodology for Modeling, Simulation, and Analysis Support of DoD Space Acquisitions Aerospace USC Technical Interchange Meeting Dec 17, 2010 Michael Baxter, Director Modeling & Simulation Systems Analysis

More information

LARGE SCALE COMPUTER SIMULATION MODELING SYSTEM ENHANCEMENTS. Project Results Executive Overview

LARGE SCALE COMPUTER SIMULATION MODELING SYSTEM ENHANCEMENTS. Project Results Executive Overview National Shipbuilding Research Program Advance Shipbuilding Enterprise LARGE SCALE COMPUTER SIMULATION MODELING SYSTEM ENHANCEMENTS Project Results Executive Overview Prepared by: LSMS Project Team Submittal

More information

CONTINUITY OF OPERATIONS PLAN

CONTINUITY OF OPERATIONS PLAN CONTINUITY OF OPERATIONS PLAN (TEMPLATE) NAME OF ORGANIZATION/BUSINESS ADDRESS PHONE NUMBER Organization Logo Continuity of Operations Plan Version 1.5 Table of Contents I. Introduction... 1 II. Purpose...

More information

Deployable SAR Integrated Chain with Unmanned Systems (DARIUS) Stephen Broatch. DARIUS Project Coordinator

Deployable SAR Integrated Chain with Unmanned Systems (DARIUS) Stephen Broatch. DARIUS Project Coordinator Deployable SAR Integrated Chain with Unmanned Systems (DARIUS) Stephen Broatch DARIUS Project Coordinator Copyright 2014 All Rights Reserved The research leading to these results has received funding from

More information

NATIONAL INCIDENT MANAGEMENT SYSTEM CAPABILITY ASSESSMENT SUPPORT TOOL (NIMCAST) SELF-ASSESSMENT INSTRUMENT 6

NATIONAL INCIDENT MANAGEMENT SYSTEM CAPABILITY ASSESSMENT SUPPORT TOOL (NIMCAST) SELF-ASSESSMENT INSTRUMENT 6 NATIONAL INCIDENT MANAGEMENT SYSTEM CAPABILITY ASSESSMENT SUPPORT TOOL (NIMCAST) TABLE OF CONTENTS Page TABLE OF CONTENTS 1 NATIONAL INCIDENT MANAGEMENT SYSTEM CAPABILITY ASSESSMENT SUPPORT TOOL (NIMCAST)

More information

Massachusetts Institute of Technology

Massachusetts Institute of Technology Massachusetts Institute of Technology A Prescriptive Adaptive Test Framework (PATFrame) for Unmanned and Autonomous Systems: A Collaboration Between MIT, USC, UT Arlington and Softstar Systems Dr. Ricardo

More information

Use of an Executable Workflow Model To Evaluate C2 Processes

Use of an Executable Workflow Model To Evaluate C2 Processes 12 th ICCTRS Adapting C2 to the 21 st Century Use of an Executable Workflow Model To Evaluate C2 Processes Network-centric Metrics C2 Modeling and Simulation C2 Experimentation Paul D. North POC: Paul

More information

Science & Technology Directorate

Science & Technology Directorate Science & Technology Directorate Unified Incident Command Decision Support (UICDS) Overview Michael B. Smith Science and Technology Directorate U.S. Department of Homeland Security Sept 12, 2006 1 1 1

More information

VIRGINIA CENTRAL REGION ITS ARCHITECTURE IMPLEMENTATION PLAN

VIRGINIA CENTRAL REGION ITS ARCHITECTURE IMPLEMENTATION PLAN VIRGINIA CENTRAL REGION ITS ARCHITECTURE IMPLEMENTATION PLAN Prepared for: Prepared by: June 23, 2009 i Table of Contents 1 INTRODUCTION... 1 2 USE OF ARCHITECTURE... 1 2.1 Architecture Use for Planning...

More information

Simulation-based Command and Control Applications in a Service-Oriented Environment. John Daly Booz Allen Hamilton

Simulation-based Command and Control Applications in a Service-Oriented Environment. John Daly Booz Allen Hamilton Simulation-based Command and Control Applications in a Service-Oriented Environment John Daly Booz Allen Hamilton daly_john@bah.com Outline Background C2 Concepts Operational Picture and Situational Assessment

More information

CoastWatch VTMIS Traffic Management and Information System

CoastWatch VTMIS Traffic Management and Information System CoastWatch VTMIS Traffic Management and Information System SAAB SYSTEMS Saab can proudly present the CoastWatch VTMIS as an entirely in-house development. In order to achieve the world s best VTMIS solution,

More information

Revision Summary Document for the FEA Consolidated Reference Model Version 2.3

Revision Summary Document for the FEA Consolidated Reference Model Version 2.3 Revision Summary Document for the FEA Consolidated Reference Model Version 2.3 October 2007 Table of Contents 1 INTRODUCTION... 3 2 OVERVIEW... 4 3 PERFORMANCE REFERENCE MODEL (PRM)... 5 3.1 Mission and

More information

Appendix A: T&E workforce competency model

Appendix A: T&E workforce competency model Appendix A: T&E workforce competency model Table 19. The Model Units of Planning Competency 1. Risk Identification Element 1. Identify T&E risk factors (e.g., lack of available time, money, test platforms,

More information

SAAB CBRN SOLUTIONS SAFEGUARDING OPERATIONAL CAPABILITIES

SAAB CBRN SOLUTIONS SAFEGUARDING OPERATIONAL CAPABILITIES CBRN Brochure - VER 1 - MAY 2013 www.saabgroup.com SAAB CBRN SOLUTIONS SAFEGUARDING OPERATIONAL CAPABILITIES PROTECT AND SECURE CONTENTS cbrn automatic warning AND reporting system 4 THIS IS HOW IT WORKS

More information

Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology

Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology 1 Project Team Profile PI: Larry Shi, University of Houston

More information

MBA BADM559 Enterprise IT Governance 12/15/2008. Enterprise Architecture is a holistic view of an enterprise s processes, information and

MBA BADM559 Enterprise IT Governance 12/15/2008. Enterprise Architecture is a holistic view of an enterprise s processes, information and Enterprise Architecture is a holistic view of an enterprise s processes, information and information technology assets as a vehicle for aligning business and IT in a structured, more efficient and sustainable

More information

MANAGEMENT INFORMATION SYSTEMS COURSES Student Learning Outcomes 1

MANAGEMENT INFORMATION SYSTEMS COURSES Student Learning Outcomes 1 MANAGEMENT INFORMATION SYSTEMS COURSES Student Learning Outcomes 1 MIS 180: Principles of Information Systems 1. Explain the importance of determining information system requirements for all management

More information

SECTION C - DESCRIPTION / SPECIFICATIONS / STATEMENT OF WORK

SECTION C - DESCRIPTION / SPECIFICATIONS / STATEMENT OF WORK SECTION C - DESCRIPTION / SPECIFICATIONS / STATEMENT OF WORK C.1. OBJECTIVE The objective of OASIS is to provide Government agencies with total integrated solutions for a multitude of professional service

More information

Protecting Information Assets - Week 9 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protecting Information Assets

Protecting Information Assets - Week 9 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protecting Information Assets Protecting Information Assets - Week 9 - Business Continuity and Disaster Recovery Planning MIS5206 Week 9 Case study discussion Business Continuity Planning (BCP) and Disaster Recovery (DR) Planning Test

More information

IBM Algo Managed Data Analytics Service

IBM Algo Managed Data Analytics Service IBM Algo Managed Data Analytics Service Highlights Secure cloud-based platform with high scalability and performance Broad range of advanced risk and portfolio analytics Integrated risk framework on-demand

More information

DARPA s APT to transform genetic modified plants into military sensors of chemical, biological, radiological, and electromagnetic signals.

DARPA s APT to transform genetic modified plants into military sensors of chemical, biological, radiological, and electromagnetic signals. DARPA s APT to transform genetic modified plants into military sensors of chemical, biological, radiological, and electromagnetic signals. DARPA has launched a new surveillance program which plans to use

More information

Intermediate Systems Acquisitions Course. Commercial and Non-Developmental Items

Intermediate Systems Acquisitions Course. Commercial and Non-Developmental Items Commercial and Non-Developmental Items Many systems acquired by DHS are not completely new developments; instead, they use existing products. These products may be used just as they are, or they may be

More information

15th International Conference on Harmonisation within Atmospheric Dispersion Modelling for Regulatory Purposes 6 9 May 2013, Madrid, Spain

15th International Conference on Harmonisation within Atmospheric Dispersion Modelling for Regulatory Purposes 6 9 May 2013, Madrid, Spain 15th International Conference on Harmonisation within Atmospheric Dispersion Modelling for Regulatory Purposes 6 9 May 2013, Madrid, Spain ESSEM COST ACTION ES1006 Evaluation, improvement and guidance

More information

Automating the Defense: Really Taking Advantage of Automated Sharing

Automating the Defense: Really Taking Advantage of Automated Sharing Automating the Defense: Really Taking Advantage of Automated Sharing Michael Vermilye The Johns Hopkins University Applied Physics Laboratory 2017 by The Johns Hopkins Applied Physics Laboratory. Material

More information

CMMI-DEV V1.3 CMMI for Development Version 1.3 Quick Reference Guide

CMMI-DEV V1.3 CMMI for Development Version 1.3 Quick Reference Guide processlabs CMMI-DEV V1.3 CMMI for Development Version 1.3 Quick Reference Guide CMMI-DEV V1.3 Process Areas Alphabetically by Process Area Acronym processlabs CAR - Causal Analysis and Resolution...

More information

Request for Proposal for Implementation of ERP and Webbased ERP- like Solutions

Request for Proposal for Implementation of ERP and Webbased ERP- like Solutions Request for Proposal for Implementation of ERP and Webbased ERP- like Solutions Corrigendum to Volume I System Integration Services and Solution Scope Indian Institute of Technology Bombay NOTE: The contents

More information

System of Systems Common Operating Environment (SOSCOE) Support to Net Centricity

System of Systems Common Operating Environment (SOSCOE) Support to Net Centricity System of Systems Common Operating Environment (SOSCOE) Support to Net Centricity Paul Schoen, Director SOSCOE FCS LSI, Boeing 1 FCS Layered, Networked Architecture Infantry Carrier Vehicle Mounted Combat

More information

ADM The Architecture Development Method

ADM The Architecture Development Method ADM The Development Method P Preliminary Phase Preliminary Phase Determine the Capability desired by the organization: Review the organizational context for conducting enterprise architecture Identify

More information

A PROACTIVE GIS INFRASTRUCTURE FOR ENVIRONMENTAL MONITORING

A PROACTIVE GIS INFRASTRUCTURE FOR ENVIRONMENTAL MONITORING A PROACTIVE GIS INFRASTRUCTURE FOR ENVIRONMENTAL MONITORING M. Martinelli 1, D. Moroni 1, G. Pieri 1, and M. Tampucci 1 1 Institute of Information Science and Technologies ISTI-CNR, Via Moruzzi 1, I-56124,

More information

Concept Development and Experimentation Course. ACT CD&E Process. February 1, 2007

Concept Development and Experimentation Course. ACT CD&E Process. February 1, 2007 Concept Development and Experimentation Course ACT Process February 1, 2007 Robert R. Tyler, Ph.D. Research Scientist, Evidence Based Research, Inc. 1595 Spring Hill Road, Suite 250 Vienna, VA 22182 703-893-6800,

More information

LockNESS. Next-generation maritime situational awareness

LockNESS. Next-generation maritime situational awareness LockNESS Next-generation maritime situational awareness 2 3 The LockNESS solution can be used for a variety of missions in military and security situations, including: Battle group defense Infrastructure

More information

SIMPLIFIED APPROACH ON DEVELOPING PREVENTIVE AND CORRECTIVE MAINTENANCE STRATEGY

SIMPLIFIED APPROACH ON DEVELOPING PREVENTIVE AND CORRECTIVE MAINTENANCE STRATEGY 2018 NDIA GROUND VEHICLE SYSTEMS ENGINEERING AND TECHNOLOGY SYMPOSIUM SYSTEMS ENGINEERING (SE) TECHNICAL SESSION AUGUST 7-9, 2018 - NOVI, MICHIGAN SIMPLIFIED APPROACH ON DEVELOPING PREVENTIVE AND CORRECTIVE

More information

FEATURES. 12 Army Sustainment

FEATURES. 12 Army Sustainment FEATURES 12 Army Sustainment Additive manufacturing employs computer-aided design and manufacturing capabilities to create objects through layer-by-layer printing. (Photo by Amanda Dunford) By Capt. MuShawn

More information

Connected vehicles and other advanced safety features can be effective in reducing, and maybe eliminating, these fatalities.

Connected vehicles and other advanced safety features can be effective in reducing, and maybe eliminating, these fatalities. 1 2 3 Michigan has made impressive strides over the past decade in reducing the number of traffic fatalities on our roads. However, over the past couple of years, the trend of sharp declines in fatalities

More information

Enabling Integration of Distributed Renewables - Program 174

Enabling Integration of Distributed Renewables - Program 174 Enabling Integration of Distributed Renewables - Program 174 Program Description Program Overview The integration of distributed renewable generation sources into the electricity grid poses a number of

More information

AeroVironment, Inc. Unmanned Aircraft Systems Overview. Background

AeroVironment, Inc. Unmanned Aircraft Systems Overview. Background AeroVironment, Inc. Unmanned Aircraft Systems Overview Background AeroVironment provides customers with more actionable intelligence so they can proceed with certainty. Based in California, AeroVironment

More information

OIL & GAS INFRASTRUCTURES PROTECTION

OIL & GAS INFRASTRUCTURES PROTECTION OIL & GAS INFRASTRUCTURES PROTECTION OIL & GAS INFRASTRUCTURES PROTECTION Leonardo s Critical Infrastructure capabilities deliver surveillance and security systems to the Oil & Gas upstream, midstream

More information

Unit 4: Response Actions

Unit 4: Response Actions : Unit Introduction Visual 4.1 Visual Description: Unit Introduction The Framework is intended to strengthen, organize, and coordinate response actions across all levels. Unit 4 describes and outlines

More information

Software Systems Technology Conference

Software Systems Technology Conference Capabilities Composition Software Systems Technology Conference 22 April 2009 Mr. Terry Simpson Space & Naval Warfare Systems Center Atlantic terry.simpson@navy.mil (843) 218 5630 DSN 312 588 5630 Agenda

More information

Department of Homeland Security. Office of Emergency Communications

Department of Homeland Security. Office of Emergency Communications Department of Homeland Security Office of Emergency Communications STATEWIDE COMMUNICATION INTEROPERABILITY PLAN (SCIP) WEIGHTED EVALUATION CRITERIA September 2007 1 I. BACKGROUND The Public Safety Interoperable

More information

DESIGN AND DEVELOPMENT OF THE YELLOWFIN UUV FOR HOMOGENEOUS COLLABORATIVE MISSIONS

DESIGN AND DEVELOPMENT OF THE YELLOWFIN UUV FOR HOMOGENEOUS COLLABORATIVE MISSIONS AUVSI10-West DESIGN AND DEVELOPMENT OF THE YELLOWFIN UUV FOR HOMOGENEOUS COLLABORATIVE MISSIONS Michael E. West, * Michael Novitzky, Jesse P. Varnell, Andrew Melim, Evan Seguin, Tedd C. Toler, Tomas R.

More information

Continuity of Operations (COOP) Multi-Year Strategy and Program Management Plan Template Guide

Continuity of Operations (COOP) Multi-Year Strategy and Program Management Plan Template Guide Continuity of Operations (COOP) Multi-Year Strategy and Program Management Plan Template Guide Federal Emergency Management Agency 500 C ST, SW Washington, D.C. 20472 FEMA GUIDE INSTRUCTIONS This guide

More information

Data Management Complexity Simplified

Data Management Complexity Simplified Data Management Complexity Simplified Managing Information Overload More Effectively on Fixed and Rotary Wing Aircraft Abstract The multiple independent sensors on board today s fixed and rotary wing platforms

More information

IBM QRadar on Cloud. The amount payable for the IBM SaaS is specified in a Transaction Document.

IBM QRadar on Cloud. The amount payable for the IBM SaaS is specified in a Transaction Document. IBM Terms of Use SaaS Specific Offering Terms IBM QRadar on Cloud The Terms of Use ( ToU ) is composed of this IBM Terms of Use - SaaS Specific Offering Terms ( SaaS Specific Offering Terms ) and a document

More information

Siveillance Vantage secures your critical infrastructure

Siveillance Vantage secures your critical infrastructure Siveillance Vantage secures your critical infrastructure Integrated security management with reliable and coordinated response for emergency and routine procedures Answers for infrastructure and cities.

More information

"Charting the Course... MOC B Designing a Microsoft SharePoint 2010 Infrastructure. Course Summary

Charting the Course... MOC B Designing a Microsoft SharePoint 2010 Infrastructure. Course Summary Course Summary Description This 5 day ILT course teaches IT Professionals to design and deploy Microsoft SharePoint. Objectives At the end of this course, students will be able to: Describe the core methods

More information

The Open Group Exam OG0-091 TOGAF 9 Part 1 Version: 7.0 [ Total Questions: 234 ]

The Open Group Exam OG0-091 TOGAF 9 Part 1 Version: 7.0 [ Total Questions: 234 ] s@lm@n The Open Group Exam OG0-091 TOGAF 9 Part 1 Version: 7.0 [ Total Questions: 234 ] https://certkill.com Topic break down Topic No. of Questions Topic 1: Volume A 100 Topic 2: Volume B 134 2 https://certkill.com

More information

Partners for Advanced Transportation Technologies. USDOT and PATH. PATH Directors. January 25, 2012

Partners for Advanced Transportation Technologies. USDOT and PATH. PATH Directors. January 25, 2012 Partners for Advanced Transportation Technologies USDOT and PATH Tom West tomwest@path.berkeley.edu Roberto Horowitz horowitz@berkeley.edu PATH Directors January 25, 2012 California PATH In 2011, two major

More information

VIEWPOINT MORE RESILIENT POSITIONING, NAVIGATION AND TIMING (PNT) THROUGH OPEN ARCHITECTURE AND ANALYTICS

VIEWPOINT MORE RESILIENT POSITIONING, NAVIGATION AND TIMING (PNT) THROUGH OPEN ARCHITECTURE AND ANALYTICS VIEWPOINT MORE RESILIENT POSITIONING, NAVIGATION AND TIMING (PNT) THROUGH OPEN ARCHITECTURE AND ANALYTICS MORE RESILIENT POSITIONING, NAVIGATION AND TIMING (PNT) THROUGH OPEN ARCHITECTURE AND ANALYTICS

More information

A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization

A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization Research Synopsis A Visualization and Decision-Support Tool for Homeland Security Risk Prioritization Modeling Area: Risk Assessment Case Studies Supported: Risk-Based Resource Allocation Principal Investigator:

More information

You can plan and execute tests across multiple concurrent projects and people by sharing and scheduling software/hardware resources.

You can plan and execute tests across multiple concurrent projects and people by sharing and scheduling software/hardware resources. Data Sheet Application Development, Test & Delivery Performance Center Micro Focus Performance Center software is an enterprise-class performance engineering software, designed to facilitate standardization,

More information

Smart Distribution Applications and Technologies - Program 124

Smart Distribution Applications and Technologies - Program 124 Smart Distribution Applications and Technologies - Program 124 Program Description Program Overview New technologies will be critical to future smart grid operation. These technologies will include advanced

More information

Evolutionary Differences Between CMM for Software and the CMMI

Evolutionary Differences Between CMM for Software and the CMMI Evolutionary Differences Between CMM for Software and the CMMI Welcome WelKom Huan Yín Bienvenue Bienvenido Wilkommen????S???S??? Bienvenuto Tervetuloa Välkommen Witamy - 2 Adapting an An Integrated Approach

More information

PREPARING FOR EFFICIENT RESPONSE AND RAPID RECOVERY

PREPARING FOR EFFICIENT RESPONSE AND RAPID RECOVERY SAP Solution in Detail SAP for Public Sector Emergency Management HELP from SAP and Business Objects PREPARING FOR EFFICIENT RESPONSE AND RAPID RECOVERY The SAP Emergency Management for Public Sector package

More information

Human Behavior in the Infantry Warrior Simulation (IWARS)

Human Behavior in the Infantry Warrior Simulation (IWARS) Human Behavior in the Infantry Warrior Simulation (IWARS) Applications of BRIMS Alicia Borgman General Dynamics Information Technology Objectives IWARS Overview HBR in IWARS Future HBR Development Directions

More information

TOGAF 9.1 in Pictures

TOGAF 9.1 in Pictures TOGAF 9. in Pictures The TOGAF ADM Cycle Stage Set up an EA team and make sure it can do its work The ADM is about understanding existing architectures and working out the best way to change and improve

More information

Outline. Concept of Development Stage. Engineering Development Stage. Post Development Stage. Systems Engineering Decision Tool

Outline. Concept of Development Stage. Engineering Development Stage. Post Development Stage. Systems Engineering Decision Tool Outline Course Outline Introduction to the Course Introduction to Systems Engineering Structure of Complex System System Development Process Needs Analysis Concept Exploration Concept Definition Advanced

More information

Integrating Self-Health Awareness in Autonomous Systems

Integrating Self-Health Awareness in Autonomous Systems Integrating Self-Health Awareness in Autonomous Systems Karl. M. Reichard The Applied Research Laboratory The Pennsylvania State University P.O. Box 30, State College, PA 16804 Email: kmr5@psu.edu Abstract

More information

Executive Summary. Revision chart and history log "UNMANNED GROUND TACTICAL VEHICLE (UGTV)" Contract B-0068-GEM3-GC

Executive Summary. Revision chart and history log UNMANNED GROUND TACTICAL VEHICLE (UGTV) Contract B-0068-GEM3-GC Project "UNMANNED GROUND TACTICAL VEHICLE (UGTV)" under Contract B-0068-GEM3-GC Executive Summary Period covered: 04.08.09 31.05.10 Issue Date: 30.06.2010 Start date of project: 04.08.09 Duration: 9 months

More information

TOGAF 9.1 Phases E-H & Requirements Management

TOGAF 9.1 Phases E-H & Requirements Management TOGAF 9.1 Phases E-H & Requirements Management By: Samuel Mandebvu Sources: 1. Primary Slide Deck => Slide share @ https://www.slideshare.net/sammydhi01/learn-togaf-91-in-100-slides 1. D Truex s slide

More information

Addressing the Challenges of Systems Engineering Estimation

Addressing the Challenges of Systems Engineering Estimation Addressing the Challenges of Systems Engineering Estimation Karen McRitchie/Kathy Kha, Galorath Incorporated 2016 Copyright Galorath Incorporated 1 ABSTRACT Cost is a crucial factor in evaluating the viability

More information

INFORMATION MANAGEMENT/ INFORMATION TECHNOLOGY (IM/IT) 8 September Advanced Planning Briefing to Industry

INFORMATION MANAGEMENT/ INFORMATION TECHNOLOGY (IM/IT) 8 September Advanced Planning Briefing to Industry DRAFT INFORMATION MANAGEMENT/ INFORMATION TECHNOLOGY (IM/IT) 8 September 2011 Advanced Planning Briefing to Industry MR. SCOTT WHITE IM/IT TRAIL BOSS Joint Program Executive Office for Chemical and Biological

More information

Given design trade studies, interpret the results to recommend the most cost-effective concept for development.

Given design trade studies, interpret the results to recommend the most cost-effective concept for development. 1 Summarize the Planning, Programming, Budgeting and Execution (PPBE) process. Analyze the financial structure and the movement of funds within the PPBE. 2 Given a scenario, develop an appropriate PMO

More information