nasa scientific and technical aerospace reports phần 5 pptx

60 289 0
nasa scientific and technical aerospace reports phần 5 pptx

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

The MONARCH project is sponsored by DARPA under the Polymorphous Computer Architecture Program. MONARCH is developing a revolutionary chip distinguished from other PCA systems by unifying two radically different architectures into a single flexible VLSI device. MONARCH architecture combines the DIVA PIM architecture, developed by USC/ISI as part of the DARPA-sponsored Data Intensive Program, and HPPS (High Performance Processing System) developed by Raytheon with IRAD funds. We previously presented the motivation for merging these two architectures (HPEC 2002). We have since developed the detailed specifications for the micro architecture of the MONARCH chip and also the software environment, run time system and on-chip communication network. Furthermore, we have completed the evaluation of several benchmarks and we have shown that the MONARCH architecture is capable of achieving a very high stability factor that allows the MONARCH architecture to process data at near peak throughput speeds. DTIC Architecture (Computers); Chips; Computer Programs; Supercomputers 20050173494 Hampshire Coll., Amherst, MA USA Multi-Type Self Adaptive Genetic Programming for Complex Applications Spector, Lee; Mar. 2005; 39 pp.; In English; Original contains color illustrations Contract(s)/Grant(s): F30602-01-2-0507; DARPA ORDER-K545; Proj-DAML Report No.(s): AD-A432974; AFRL-IF-RS-TR-2005-94; No Copyright; Avail: Defense Technical Information Center (DTIC) The focus of this project was the development of new forms of genetic and evolutionary computation and their application to problems in the automatic development and programming of multi-agent systems. This report summarizes the project’s methods, assumptions, procedures and results, and also provides links to related publications and software packages that were produced during the project. DTIC Computer Programs; Genetics 20050173502 State Univ. of New York, Stony Brook, NY USA Integrated Environment for Control Software Engineering Smolka, Scott A.; Stark, Eugene; Cleaveland, Rance; Apr. 2005; 6 pp.; In English Contract(s)/Grant(s): DAAD19-01-1-0003 Report No.(s): AD-A432985; ARO-40026.1-C1; No Copyright; Avail: Defense Technical Information Center (DTIC) Significant scientific progress has been made during the final year of the grant. We have continued the development of PIOAL, the process-algebraic specification language for Probabilistic I/O Automata that forms the basis for our tool integration effort. We have also developed a Monte Carlo model checking algorithm a Hybrid-automaton model of cardiac; and a safety-liveness semantics for UML 2.0 Sequence Diagrams. We have moreover pursued the development of mathematical formalisms for the combined modeling of functional and performance aspects of systems, and for software architecture specification. DTIC Computer Programming; Environmental Control; Software Engineering 20050173527 Army Research Lab., Aberdeen Proving Ground, MD USA Virtual Experiments to Determine Behind-Armor Debris for Survivability Analysis Prakash, Anand; Dec. 2004; 7 pp.; In English; Original contains color illustrations Report No.(s): AD-A433014; No Copyright; Avail: Defense Technical Information Center (DTIC) When a projectile perforates the armor of a vehicle, the residual projectile entering the vehicle is accompanied by a much wider cloud of behind-armor debris (BAD) generated by stress wave interactions. BAD plays an important role in the evaluation of survivability of crew and components in a vehicle under fire. Survivability and vulnerability analysis codes (e.g., MUVES) require an input of BAD characteristics of the armor for each threat projectile. This data is currently generated by conducting laboratory experiments in a standard set-up in which each threat projectile is fired on the actual armor and the BAD pattern is captured on witness plates. Conducting survivability analyses of vehicles in the design phase, before the armor is actually built, poses a challenging problem. To solve this problem, we have come up with an innovative approach to determine BAD characteristics by conducting virtual experiments of the standard set-up. We do this by conducting physics-based three-dimensional (3-D) computer simulations with the CTH wave code. We obtain BAD characteristics for impacts of kinetic energy rods and shaped charges on metal and ceramics plates, including some yawed rod impacts. An additional advantage of these simulations is that they provide important details of the debris field that are difficult to obtain in laboratory 235 experiments. The expected impact of this work would be to improve the timeliness, accuracy, and cost of survivability analyses for Army’s decision makers. DTIC Armor; Computerized Simulation; Debris; Kinetic Energy; Military Vehicles; Projectiles; Vulnerability 20050173529 Air Force Research Lab., Rome, NY USA Amending Moore’s Law for Embedded Applications Linderman, Richard W.; Sep. 2004; 13 pp.; In English; Original contains color illustrations Report No.(s): AD-A433016; No Copyright; Avail: Defense Technical Information Center (DTIC) CONTRIBUTION of Moore’s Law to Improvements of Embedded Systems: * Price/ Performance: Gigaflops/$M affordability * Memory Capacity: programming simplifications * Steep memory hierarchy: programming inefficiencies and complexities * New flexibilities: e.g., reconfigurable hardware * New complexities: software and parallelism * Dramatic new system capabilities. DTIC Computer Programs; Embedding; Exponential Functions 62 COMPUTER SYSTEMS Includes computer networks and distributed processing systems. For information systems see 82 Documentation and Information Science. For computer systems applied to specific applications, see the associated category. 20050169863 Lawrence Livermore National Lab., Livermore, CA SLURM: Simple Linux Utility for Resource Management Jette, M. A.; Yoo, A. B.; Grondona, M.; Apr. 03, 2003; 22 pp.; In English Report No.(s): DE2004-15003520; UCRL-JC-147996; No Copyright; Avail: Department of Energy Information Bridge A new cluster resource management system called Simple Linux Utility Resource Management (SLURM) is developed and presented in this paper. SLURM, initially developed for large Linux clusters at the Lawrence Livermore National Laboratory (LLNL), is a simple cluster manager that can scale to thousands of processors. SLURM is designed to be flexible and fault-tolerant and can be ported to other clusters of different size and architecture with minimal effort. We are certain that SLURM will benefit both users and system architects by providing them with a simple, robust, and highly scalable parallel job execution environment for their cluster system. NTIS Unix (Operating System); Computer Systems Design 20050173138 Naval Postgraduate School, Monterey, CA USA Evaluation of the Embedded Firewall System Rumelioglu, Sertac; Mar. 2005; 97 pp.; In English; Original contains color illustrations Report No.(s): AD-A432226; No Copyright; Avail: Defense Technical Information Center (DTIC) The performance aspect and security capabilities of the Embedded Firewall (EFW) system are studied in this thesis. EFW is a host-based, centrally controlled firewall system consisting of network interface cards and the Policy Server software. A network consisting of EFW clients and a Policy Server is set up in the Advanced Network Laboratory at the Naval Postgraduate School. The Smartbits packet generator is used to simulate realistic data transfer environment. The evaluation is performed centered on two main categories: performance analysis and security capability tests. TTCP program and a script written in TCL are used to perform throughput and packet loss tests respectively. The penetration and vulnerability tests are conducted in order to analyze the security capabilities of EFW. Symantec Personal Firewall is used as a representative application firewall for comparing test results. Our study shows that EFW has better performance especially in connections with high amounts of encrypted packets and more effective in preventing insider attacks. However, current implementation of EFW has some weaknesses such as not allowing sophisticated rules that application firewalls usually do. We recommend that EFW be used as one of the protection mechanisms in a system based on the defense-in-depth concept that consists of application firewalls, intrusion detection systems and gateway protocols. DTIC Computer Networks; Security 236 20050173168 Massachusetts Univ., Amherst, MA USA Infrastructure Vulnerability Assessment and Defense Gao, Lixin; Mar. 2005; 27 pp.; In English; Original contains color illustrations Contract(s)/Grant(s): F30602-03-2-0008; Proj-AIPT Report No.(s): AD-A432277; AFRL-IF-RS-TR-2005-102; No Copyright; Avail: Defense Technical Information Center (DTIC) The goal of this Infrastructure Vulnerability Assessment and Defense Project was to develop models for characterizing the worse-case scenarios for the Internet’s routing infrastructure. In addition, sub-goals were to propose counter-measures to these vulnerabilities, implement, and experiment the proposed counter-measures, and evaluate their potential impact. DTIC Countermeasures; Vulnerability 20050173331 Mitre Corp., McLean, VA USA An Alternative Paradigm for Routing in Wireless Ad Hoc Networks Stine, John A.; Dec. 2004; 3 pp.; In English Report No.(s): AD-A432644; No Copyright; Avail: Defense Technical Information Center (DTIC) We propose a new paradigm for routing in ad hoc networks based on the collection and dissemination of node states. This paradigm assumes nodes have location awareness and can measure the received signal strength of incoming transmissions. Thus, nodes can discover the pathloss in their environment. This information along with other information relevant to the node is combined into a node’s state that is disseminated throughout the network. This state information not only supports all nodes discovering the network’s topology but provides the very information that makes network management, network engineering, traffic engineering, and spectrum management feasible. This contribution of this summary is a brief description of how node state routing (NSR) paradigm enables these management and engineering capabilities. DTIC Networks; Wireless Communication 20050173334 Army War Coll., Carlisle Barracks, PA USA The Dark Fruit of Globalization: Hostile Use of the Internet Megill, Todd A.; Mar. 2005; 23 pp.; In English; Original contains color illustrations Report No.(s): AD-A432655; No Copyright; Avail: Defense Technical Information Center (DTIC) One of the goals of the current National Security Strategy is to expand world economic activity and prosperity. This goal for economic prosperity is linked to globalization and this information technologies that tie the world’s economics and occupants together. A primary means of communication and information sharing is the Internet. The USA (US) is currently the world’s largest user and proponent of the Internet. The massive sharing of information is crucial for US economic development and expansion and is in line with the American concept of itself. However the Internet as a method of sharing information has a dark side. The information accessible level of communications linkages and sheer interconnectiveness of the World-Wide-Web leaves the US vulnerable to violent non-state actors using the Internet. These groups will use the Internet and its architecture to command & control collect information target possibly attack access and disseminate the results of their activities with minimal exposure to traditional means of national intelligence collection and detection. The architecture is allowing violent non-state actors to attack the US over its own systems and designs. This paper will look at this phenomenon the scope of the problem draw conclusions and make some recommendations. DTIC Fruits; Internets; Security 20050173349 Telcordia Technologies, Inc., Piscataway, NJ USA Secure Service Provision for Reliable Server Pooling in MANET Di Crescenzo, Giovanni; Ge, Renwei; Arce, Gonzalo R.; Dec. 2004; 3 pp.; In English; Original contains color illustrations Contract(s)/Grant(s): DAAD19-01-2-0011 Report No.(s): AD-A432693; No Copyright; Avail: Defense Technical Information Center (DTIC) The unique characteristics of battlefield mobile ad hoc networks bring severe security challenges to the application of reliable server pooling (rSerPool). This paper uses a novel threshold signature scheme with the features of ad hoc sever selection and dynamic group membership to secure the service provision phase of the rSerPool application in MANET. Our distributed and survivable threshold signature scheme can tolerate single point of failure and Byzantine attacks. Its ad hoc 237 server selection increases service availability and decreases service latency. Our signature scheme provides essential authentication service in rSerPool and can be further used as part of distributed certificate authority in MANET. DTIC Client Server Systems; Communication Networks; Reliability; Security; Signatures 20050173350 Army Research Lab., Adelphi, MD USA Identity-Based Random Key Predistribution for Army MANETs Carman, D. W.; Cirincione, G. H.; Dec. 2004; 3 pp.; In English; Original contains color illustrations Contract(s)/Grant(s): DAAD19-01-2-0011 Report No.(s): AD-A432694; No Copyright; Avail: Defense Technical Information Center (DTIC) We address a challenge to developing the Future Force Army tactical networks require cryptographic keys to implement security services such as encryption and authentication, but current pairwise key establishment approaches using interactive public key techniques are too time-consuming. This paper describes identity-based cryptographic solutions that enable strong security and significantly reduce bandwidth consumption and latency, and provides three main contributions: (a) a description of how identity-based random key predistribution (IBRKP) can be used as a secure and efficient component within an Army tactical mobile ad hoc network (MANET) key management infrastructure; (b) a description of an attack on IBRKP resulting from targeted node compromises as opposed to random node compromises; and (c) a technique that creates grainy pool keys that increases security against targeted and random node compromise attacks. DTIC Communication Networks; Cryptography; Identities; Military Operations; Security 20050173354 Maryland Univ., College Park, MD USA Domain Formation and Maintenance in Large Ad hoc Networks Chandrashekar, Karthikeyan; Morera, Raquel; McAuley, Anthony; Dec. 2004; 3 pp.; In English; Original contains color illustrations Contract(s)/Grant(s): DAAD19-01-2-0011 Report No.(s): AD-A432699; No Copyright; Avail: Defense Technical Information Center (DTIC) The stability and performance of domains or clusters in MANETs is determined by the election metrics used to generate and maintain these domains. In this paper, we evaluate the performance of the distributed Beacon protocol as the topology changes and as a function of the election metric under various conditions. We propose the ‘domain age’ as the primary election metric to maintain more stable domains than ‘lowest ID’, yet requires no more information be collected. We quantify the increased stability using OPNET simulations. We believe that a combination of domain age, node degree and domain strength will provide the Beacon protocol with the ability to maintain good domains in future battlefield networks. DTIC Communication Networks; Maintenance; Protocol (Computers); Topology 20050173369 Naval Postgraduate School, Monterey, CA USA A Case Study of Internet Protocol Telephony (IPT) Implementation at USA Coast Guard Headquarters Patton, Mark B.; Mar. 2005; 205 pp.; In English; Original contains color illustrations Report No.(s): AD-A432727; No Copyright; Avail: Defense Technical Information Center (DTIC) Recent advances in information technology communications have brought about increases to bandwidth and processing speeds to encourage the growth or Internet protonic Telephony (TPT), a method of transmitting voice conversations over data networks. Many organizations are replacing portions of their traditional phone systems to gain the benefit of cost savings and enhanced feature sets through the use of IPT. The Coast Guard has an interest in exploiting this technology, and has taken its first steps by implementing IPT at Headquarters Support command in Washinton D. C. This thesis investigates the successful implementation practices and security policies of commercial, educationa, and goverment organizations in order to create recommendations for IPT security policies recommendations for IPT security policies and implementation practices relevant to the Coast Guard. It includes the discussion of the public switched telephone network, an overview of IPT, IPT security issues, the safeguards available to counter security threata, the tradeoffs (e.g., voice quality, cost) reguired to mitigate security risks, and current TPT security policy and implementation guidance. It is supported by the study and analyaia of the IPT system at Coast Guard Headguarters. The Coast Guard gains an understanding ci the advantages, limitations, and security issues that it will face as it considers further implementation of IPT. DTIC Coasts; Internets; Protocol (Computers); Telephony; United States 238 20050173380 Department of Defense, Arlington, VA USA Information Technology: DoD FY 2004 Implementation of the Federal Information Security Management Act for Information Technology Training and Awareness Davis, Sarah; Mitchell, James; Palmer, Kevin A.; Riggins, Liyang; Truex, Kathryn; Williams, Zachary; Dec. 2004; 47 pp.; In English Report No.(s): AD-A432754; IG/DOD-2005-025; No Copyright; Avail: Defense Technical Information Center (DTIC) The overall audit objective was to assess DoD implementation of title III, section 301, ‘Federal Information Security Management Act,’ of the E-Government Act of 2002 (Public Law 107-347). Specifically, we evaluated whether all agency employees, including contractors, received IT security training and awareness and whether employees with significant IT security responsibilities were properly trained for their level of responsibility. DTIC Contractors; Education; Information Management; Information Systems; Management Information Systems; Personnel; Security 20050173468 Army Command and General Staff Coll., Fort Leavenworth, KS USA Intelligence Collection: Supporting Full Spectrum Dominance and Network Centric Warfare? Moses, Bruce D.; Jan. 2004; 82 pp.; In English Report No.(s): AD-A432929; No Copyright; Avail: Defense Technical Information Center (DTIC) This monograph examines whether the Army’s information collection efforts are supporting the goal of full spectrum dominance and whether these are in harmony with the concepts of network centric warfare. Full spectrum dominance and network centric warfare are central themes in Department of Defense and Army transformation literature and both require information collection and an understanding of the role of cognition empowered by networking for success. More specifically, it examines whether Army collection efforts are focusing too heavily on collection for combat operations and leaving it unable to fully exploit the access to adversary systems during stability operations. This study found that the institutional Army is not fully supporting the goal of full spectrum dominance or network centric warfare but is still myopically investing heavily in efforts to defeat the adversary’s conventional capabilities with standoff collection technology and is not creating the organizational, systems and technical architectures necessary to leverage the power of a fully networked force. DTIC Communication Networks; Dominance; Intelligence; Military Operations; Spectra; Warfare 63 CYBERNETICS, ARTIFICIAL INTELLIGENCE AND ROBOTICS Includes feedback and control theory, information theory, machine learning, and expert systems. For related information see also 54 Man/System Technology and Life Support. 20050169772 California Univ., Lawrence Berkeley National Lab., Berkeley, CA, USA Slow Orbit Feedback at the ALS Using Matlab Portmann, G.; Mar. 1999; 12 pp.; In English Report No.(s): DE2004-7377; LBNL-43030; No Copyright; Avail: Department of Energy Information Bridge The third generation Advanced Light Source (ALS) produces extremely bright and finely focused photon beams using undulatory, wigglers, and bend magnets. In order to position the photon beams accurately, a slow global orbit feedback system has been developed. The dominant causes of orbit motion at the ALS are temperature variation and insertion device motion. This type of motion can be removed using slow global orbit feedback with a data rate of a few Hertz. The remaining orbit motion in the ALS is only 1-3 micron rms. Slow orbit feedback does not require high computational throughput. At the ALS, the global orbit feedback algorithm, based on the singular valued decomposition method, is coded in MATLAB and runs on a control room workstation. Using the MATLAB environment to develop, test, and run the storage ring control algorithms has proven to be a fast and efficient way to operate the ALS. NTIS Light Sources; Storage Rings (Particle Accelerators); Algorithms; Feedback Control; Control Simulation 239 20050170449 NASA Langley Research Center, Hampton, VA, USA Real-Time System Verification by Kappa-Induction Pike, Lee S.; April 2005; 66 pp.; In English Contract(s)/Grant(s): 23-063-30-RF Report No.(s): NASA/TM-2005-213751; L-19110; No Copyright; Avail: CASI; A04, Hardcopy We report the first formal verification of a reintegration protocol for a safety-critical, fault-tolerant, real-time distributed embedded system. A reintegration protocol increases system survivability by allowing a node that has suffered a fault to regain state consistent with the operational nodes. The protocol is verified in the Symbolic Analysis Laboratory (SAL), where bounded model checking and decision procedures are used to verify infinite-state systems by k-induction. The protocol and its environment are modeled as synchronizing timeout automata. Because k-induction is exponential with respect to k, we optimize the formal model to reduce the size of k. Also, the reintegrator’s event-triggered behavior is conservatively modeled as time-triggered behavior to further reduce the size of k and to make it invariant to the number of nodes modeled. A corollary is that a clique avoidance property is satisfied. Author Real Time Operation; Program Verification (Computers); Fault Tolerance 20050170456 NASA Lewis Research Center, Cleveland, OH, USA EWB: The Environment WorkBench Version 4.0 1995; 2 pp.; In English; No Copyright; Avail: CASI; A01, Hardcopy The Environment WorkBench EWB is a desktop integrated analysis tool for studying a spacecraft’s interactions with its environment. Over 100 environment and analysis models are integrated into the menu-based tool. EWB, which was developed for and under the guidance of the NASA Lewis Research Center, is built atop the Module Integrator and Rule-based Intelligent Analytic Database (MIRIAD) architecture. This allows every module in EWB to communicate information to other modules in a transparent manner from the user’s point of view. It removes the tedious and error-prone steps of entering data by hand from one model to another. EWB runs under UNIX operating systems (SGI and SUN workstations) and under MS Windows (3.x, 95, and NT) operating systems. MIRIAD, the unique software that makes up the core of EWB, provides the flexibility to easily modify old models and incorporate new ones as user needs change. The MIRIAD approach separates the computer assisted engineering (CAE) tool into three distinct units: 1) A modern graphical user interface to present information; 2)Adata dictionary interpreter to coordinate analysis; and 3) A database for storing system designs and analysis results. The user interface is externally programmable through ASCII data files, which contain the location and type of information to be displayed on the screen. This approach provides great flexibility in tailoring the look and feel of the code to individual user needs. MIRIADbased applications, such as EWB, have utilities for viewing tabulated parametric study data, XY line plots, contour plots, and three-dimensional plots of contour data and system geometries. In addition, a Monte Carlo facility is provided to allow statistical assessments (including uncertainties) in models or data. Derived from text Computer Systems Programs; Workstations; Systems Integration; Spacecraft Environments 20050170917 Swedish Defence Research Establishment, Linkoeping, Sweden Instrusion Analysis in Military Networks File Systems and Logging Vidstroem, A.; Persson, M.; Karresand, M.; Dec. 2004; 40 pp.; In English Report No.(s): PB2005-103074; FOI-R-1518-SE; No Copyright; Avail: CASI; A03, Hardcopy This report presents a study of the technical aspects of four file systems, NTFS. FAT32, Ext2, and Ext3. Their structure on disk and organization of data, files, and directories is described at a level enabling further research of the field. This report does, however, not describe how writing, changing, and deleting files is done in the respective file system. Apart from file systems the report also covers the basics of logging and different tools for doing system integrity checking. The report is concluded with a chapter presenting suggested future work sprung from the file system and logging studies. NTIS Intrusion Detection (Computers); Deletion 20050173213 Army Tank-Automotive Research and Development Command, Warren, MI USA Robots at War - Experiences in Iraq and Afghanistan Smuda, W. J.; Freiburger, L.; Rogan, S.; Gerhart, G.; Dec. 2004; 9 pp.; In English; Original contains color illustrations Report No.(s): AD-A432400; No Copyright; Avail: Defense Technical Information Center (DTIC) 240 Recent activities in Iraq and Afghanistan have shown the importance of robotic technology as a force multiplier and a tool for moving soldiers out of harms way. Early user involvement in innovative and aggressive development and acquisition strategies are the key to moving robotic and associated technology into the hands of the user. This paper updates activity associated with rapid development of the Omni-Directional Inspection System (ODIS) robot for under vehicle inspection and reports on our field experience with robotics in Iraq and Afghanistan. DTIC Afghanistan; Iraq; Robotics; Robots; Warfare 20050173253 Space and Naval Warfare Systems Command, San Diego, CA USA Supporting the Joint Warfighter by Development, Training, and Fielding of Man-Portable UGVs Ebert, Kenneth A.; Stratton, Benjamin V.; Jan. 2005; 11 pp.; In English; Original contains color illustrations Report No.(s): AD-A432485; No Copyright; Avail: Defense Technical Information Center (DTIC) The Robotic Systems Pool (RSP), sponsored by the Joint Robotics Program (JRP), is an inventory of small robotic systems, payloads, and components intended to expedite the development and integration of technology into effective. supportable. fielded robotic assets. The RSP loans systems to multiple users including the military, first- responders, research organizations, and academia. These users provide feedback in their specific domain, accelerating research and development improvements of robotic systems. which in turn allow the joint warfighter to benefit from such changes more quickly than from traditional acquisition cycles. Over the past year, RSP assets have been used extensively for pre-deployment operator and field training of joint Explosive Ordnance Disposal (EOD) teams, and for the training of Navy Reservist repair technicians. These Reservists are part of the Robotic Systems Combat Support Platoon (RSCSP), attached to Space and Naval Warfire Systems Center, San Diego. The RSCSP maintains and repairs RSP assets and provides deployable technical support for users of robotic systems. Currently, a small team from the RSCSP is deployed at Camp Victory repairing and maintaining man-portable unmanned ground vehicles (UGVs) used by joint EOD teams in Operation Iraqi Freedom. The focus of this paper is to elaborate on the RSP and RSCSP and their role as invaluable resources for spiral development in the robotics community by gaining first-hand technical feedback from the warfighter and other users. DTIC Education; Portable Equipment; Robotics 20050173286 Voltage Security, Inc., Palo Alto, CA USA Voltage Identify Based Encryption (VIBE) Schertler, Mark J.; Koppula, Prashanth; Mar. 2005; 36 pp.; In English; Original contains color illustrations Contract(s)/Grant(s): FA8750-04-C-0217; DARPA ORDER-8702; Proj-S702 Report No.(s): AD-A432563; AFRL-IF-RS-TR-2005-96; No Copyright; Avail: Defense Technical Information Center (DTIC) Invented by Dr. Dan Boneh and Dr. Matt Franklin in 2001, Identity-Based Encryption, or IBE, is a breakthrough in cryptography that, for the first time, enables users to simply use an identity, such as an email address, to secure business communications. This replaces the digital certificates that a traditional X.509 based public key infrastructure (PKI) relies on. Moreover, unlike existing security solutions, secure communication based on IBE technology can be conducted online as wall as offline, from anywhere in the world, without the complexity of certificates, Certificate Revocation Lists (CRLs) and other costly infrastructure. IBE is transparent to end users, easy to deploy and manage, and can scale to millions of users on the internet. Contract FA8750-04-C-0217 was awarded to Voltage Security, Inc., to demonstrate the effectiveness of the technology developed to implement the Boneh-Franklin IBE. This contract provided for the necessary hardware and software needed to demonstrate the Voltage technology, as well as necessary supporting services needed to implement the technology. DTIC Cryptography; Electric Potential; Identities 20050173307 Massachusetts Inst. of Tech., Lexington, MA USA Self-Organizing Networks (SONets) with Application to Target Tracking Sinno, Dana; Mar. 2004; 5 pp.; In English; Original contains color illustrations Report No.(s): AD-A432609; No Copyright; Avail: Defense Technical Information Center (DTIC) The growing interest in large arrays of deployable sensors is not only the result of recent advances in technology that make cheap expendable sensors readily available, but is also due to the limitations of current large expensive assets in some applications of timely importance such as urban warfare and complex terrain surveillance. Large distributed arrays of deployable configurable sensors cooperating to achieve system-level goals may provide the solution for such problems 241 whether acting as independent networks or as agents gathering localized information to aid large assets. The primary challenge of dynamic allocation of network assets (DANA) is the cost of computation and communication of global optimization and real-time configuration of individual sensors. Scaling of network size generally yields an exponential increase in optimization computation and a prohibitive need for communication bandwidth for scheduling of individual sensors making such approaches of limited real-time use. This paper presents the novel methodology of Self-Organizing Networks (SONets) where small sensors with local decision capabilities and overall system performance knowledge yield an emergent behavior aimed at maximizing system information in a communication-constrained architecture while eliminating (or reducing) the need for sensors to be actively scheduled. Preliminary results demonstrate promising performance in a multi-target/ multi-sensor environment. The SONets methodology is based on sensors making local decisions on which mode to operate in including data collection broadcast, etc. based on perceived value of expected return and thresholding with the capability of adaptively self-organizing Sensors update learning indices (adaptive weights) based on expected return and observation of overall system knowledge. The result is an emergent behavior that may be supervised and altered through general broadcasts from a centralized unit. DTIC Targets; Tracking (Position) 20050173329 ElanTech, Inc., Greenbelt, MD USA Focused Knowledge for the Battlefield Emmerman, Philip J.; Allen, Swati D.; Dec. 2004; 6 pp.; In English; Original contains color illustrations Report No.(s): AD-A432635; No Copyright; Avail: Defense Technical Information Center (DTIC) The USA Army is in the midst of a major transformation. The Future Force must be highly mobile, agile, and lethal to ensure its dominance in the future battlefield. This dominance is reliant on the ability to see and understand first (situational awareness). Persistent and pervasive sensing and processing, coupled with greatly increased speed of information flow, information assimilation, and decisive action, at and between all levels of our force, are necessary to fulfill this requirement. The USA Army is most vulnerable in urban terrain. This highly constrained, complex environment presents a significant challenge to US forces, particularly dismounted infantry and military intelligence because opposing force activity is readily masked or obscured by background noise (commerce, schools, religious activity etc.). This paper proposes an intelligent interaction between the digitized dismounted units and military intelligence, for the significant benefit to both. DTIC Intelligence; Personnel; Pulse Communication; Situational Awareness; Warfare 20050173414 Redlands Univ., CA USA Sustaining the Army Training Mission by Re-Thinking Decision Support Systems: Shifting from Decision-Making Individuals to Sense-Making Agents Ekbia, Hamid R.; Dec. 2004; 10 pp.; In English; Original contains color illustrations Report No.(s): AD-A432829; No Copyright; Avail: Defense Technical Information Center (DTIC) Decision Support Systems (DSS), as computerized systems that implement and support complex decision processes, have evolved significantly during the last four decades. However, this evolution has been dominantly bottom-up and technology- driven, with new emerging technologies supporting the traditional concept of decision making as a basically rational process. In an effort to reconceptualize decision making, this paper follows a top-down approach, starting with a new conceptual framework and then exploring the technologies and tools that can support it. To this end, the paper proposes four major conceptual shifts: a pragmatic shift from problems in the mind to problematic situations in the world, a constructive shift from passive decision making to active sense making, a normative shift from accuracy and certainty to plausibility and transparency, and a technical shift in our understanding of technology as enabler to technology as transformer of human activity. These shifts are in harmony with current theoretical trends in DSS and related disciplines, e.g., the growing emphasis on multiple perspectives in DSS, on multi-agent systems in Artificial Intelligence, on distributed cognition in psychology, and on sense making in organization science. By focusing our attention on the collective, distributed, and constructive character of cognition, the framework that results from these shifts provides a useful way of thinking about DSS. Furthermore, ideas from science and technology studies portray a tightly interwoven picture of technologies and their social and organizational context, which is very different from the traditional view of technologies as mere tools. Brought to the realm of DSS, this calls for a fresh look at the relationship between information technologies and decision-making processes. DTIC Decision Making; Decision Support Systems; Education 242 20050173438 Carnegie-Mellon Univ., Pittsburgh, PA USA Robust Path Planning With Imperfect Maps Ferguson, Dave; Stentz, Anthony; Dec. 2004; 8 pp.; In English; Original contains color illustrations Contract(s)/Grant(s): DAAD19-01-2-0012 Report No.(s): AD-A432878; No Copyright; Avail: Defense Technical Information Center (DTIC) We describe an efficient method for path planning in environments for which prior maps are plagued with uncertainty. Our approach processes the map to determine key areas whose uncertainty is crucial to the planning task. It then incorporates the uncertainty associated with these areas using the recently developed PAO* algorithm to produce a fast, robust solution to the original planning task. We present results from a simulated outdoor navigation scenario. DTIC Algorithms; Autonomous Navigation; Planning; Trajectory Planning 20050173446 Carnegie-Mellon Univ., Pittsburgh, PA USA Market-Based Complex Task Allocation for Multirobot Teams Zlot, Robert; Stentz, Anthony; Dec. 2004; 9 pp.; In English; Original contains color illustrations Contract(s)/Grant(s): DAAD19-01-2-0012 Report No.(s): AD-A432898; No Copyright; Avail: Defense Technical Information Center (DTIC) In order for a team of autonomous robots to perform a complex mission effectively, an efficient assignment of tasks to robots must be determined. Existing multirobot task allocation algorithms treat tasks as simple, indivisible entities. However, when dealing with complex tasks, the structure and semantics of the tasks can be exploited to produce more efficient team plans by giving individual robots the ability to come up with new ways to perform a task, or by allowing multiple robots to cooperate by sharing the subcomponents of a task, or both. In this paper we detail a method for efficiently allocating a set of complex tasks to a robot team. The advantages of explicitly modeling complex tasks during the allocation process is demonstrated by a comparison of our approach with existing task allocation algorithms in an area reconnaissance scenario. An implementation on a team of outdoor robots further validates our approach. DTIC Allocations; Robots 20050173449 Michigan Univ., Ann Arbor, MI USA Computational Neuromechanics: Programming Work in Biological Systems *AND* RHex: The CNM Hexapod Koditschek, Daniel E.; Jan. 2004; 9 pp.; In English Contract(s)/Grant(s): N00014-98-1-0747; N66001-00-C-8026 Report No.(s): AD-A432902; PG-C080469; No Copyright; Avail: CASI; A02, Hardcopy Most legged animals whose running has been studied exhibit mass center trajectories closely resembling those of a pogo-stick. Over the course of our five year DARPA/ONR/SPAWAR sponsored project in Computational Neuromechanics and its application to robotics, we have begun to answer the questions, how, why, and when, in a mathematically rigorous and biologically testable manner. Addressing these simple questions has simultaneously helped advance animal motion science as well as accelerated progress in the design and control of useful legged robots. DTIC Animals; Computer Programming; Locomotion; Motion; Robotics 20050173459 Army Tank-Automotive Research and Development Command, Warren, MI USA Dynamic Waypoint Navigation Using Voronoi Classifier Methods Overholt, J.; Hudas, G.; Fiorani, G.; Skalny, M.; Tucker, A.; Dec. 2004; 7 pp.; In English; Original contains color illustrations Report No.(s): AD-A432915; No Copyright; Avail: Defense Technical Information Center (DTIC) This paper details the development of a dynamic waypoint navigation method which introduces and utilizes Voronoi classifiers as the control mechanism for an autonomous mobile robot. A Voronoi diagram may be generated by any finite set of points in a plane. For mobile robot control each point in the plane represents a Voronoi classifier. The classifiers are used to generate Voronoi regions. As a robot comes into a Voronoi region the classifier will act as a control input; providing a new waypoint for the vehicle to follow. The robot moves towards the new waypoint unless interrupted by an obstacle or wall. The robot will get a new waypoint from the classifier in the robot’s current Voronoi region. This process continues until the robot has terminated at a desired position (goal) or runs out of power. DTIC Autonomous Navigation; Classifications; Classifiers; Control; Navigation; Robots 243 [...]... Beach, FL, USA Space Shuttle Operations and Infrastructure: A Systems Analysis of Design Root Causes and Effects McCleskey, Carey M.; Apr 20 05; 264 pp.; In English Report No.(s): NASA/ TP-20 05- 21 151 9; No Copyright; Avail: CASI; A12, Hardcopy 261 This NASA Technical Publication explores and documents the nature of Space Shuttle operations and its supporting infrastructure and addresses fundamental questions... Performance of Sierpinski Fractal Antennas and Networks Borja, C.; Puente, C.; IEEE Antennas and Propagation Society International Symposium, Volume 1; [1999], pp 652 - 655 ; In English; See also 20 050 16 956 5; Copyright; Avail: Other Sources Two simple, fast numerical models to predict the input parameters of antennas and networks whose topologies are that of the Sierpinski Gasket and Carpet fractal shapes, are introduced... Includes iteration, differential and difference equations, and numerical approximation 20 050 16 957 9 Naples Univ., Italy A Kirchhoff Scattering Model for fBm Surfaces Franceschetti, Giorgio; Iodice, Antonio; Migliaccio, Maurizio; Riccio, Daniele; IEEE Antennas and Propagation Society International Symposium, Volume 1; [1999], pp 51 8 -52 1; In English; See also 20 050 16 956 5; Copyright; Avail: Other Sources... 20 050 169723 Motorola, Inc., Arlington Heights, IL, USA Numerical Study of Reflection and Transmission Coefficients for Different Inhomogeneous Walls Stratis, Glafkos; Demetriou, Demetrakis; IEEE Antennas and Propagation Society International Symposium, Volume 1; [1999], pp 59 0 -59 2; In English; See also 20 050 16 956 5; Copyright; Avail: Other Sources Analytical expressions such as Fresnel reflection and. .. Antennas and Propagation Society International Symposium, Volume 1; [1999], pp 51 4 -51 7; In English; See also 20 050 16 956 5; Copyright; Avail: Other Sources A comparison between the classical approach and a new general one to verify the applicability of the Kirchhoff Approximation (KA) in electromagnetic scattering from random surfaces is presented The analysis is conducted under the theoretical, numerical and. .. Processing 65 STATISTICS AND PROBABILITY Includes data sampling and smoothing; Monte Carlo method; time series analysis; and stochastic processes 20 050 170478 INTEL Ireland Ltd., Leixlip, Ireland Statistical Methods for Measurement Reduction in Semiconductor Manufacturing Babikian, Richard; Engelhard, Curt; 1998 IEEE/SEMI Advanced Semiconductor Manufacturing Conference And Workshop; [1998], pp 212-2 15; In... (Mathematics) 20 050 169626 Middle East Technical Univ., Ankara, Turkey Multilevel FMA for the Discrete Dipole Approximation Koc, S.; Chew, W C.; IEEE Antennas and Propagation Society International Symposium, Volume 1; [1999], pp 640-643; In English; See also 20 050 16 956 5; Copyright; Avail: Other Sources 2 45 The ‘Discrete Dipole Approximation’ (DDA) developed by Purcell and Pennyparker is a powerful and quite... Method of Moments; Multiplication 20 050 1697 05 National Taiwan Univ of Science and Technology, Taipei, Taiwan, Province of China Simulations and Measurements for Indoor Wave Propagation through Periodic Structures Yang, Chang-Fa; Wu, Boau-Cheng; IEEE Antennas and Propagation Society International Symposium, Volume 1; [1999], pp 384-387; In English; See also 20 050 16 956 5; Copyright; Avail: Other Sources... Conference And Workshop; [1998], pp 252 - 258 ; In English; See also 20 050 170 458 ; Copyright; Avail: Other Sources Increasingly stringent critical dimension design rules for semiconductor manufacturing have driven manufacturers of 258 automated CD SEMs to develop systems with improved linewidth measurement repeatability and reproducibility [1] However, in a multiple tool manufacturing environment, the technical. .. Approach Zahn, Daniel; Sarabandi, Kamal; IEEE Antennas and Propagation Society International Symposium, Volume 1; [1999], pp 53 0 -53 3; In English; See also 20 050 16 956 5; Copyright; Avail: Other Sources The application of a fast far-field iterative Physical Optics (FIPO) method in conjunction with a Monte Carlo simulation for characterizing the bistatic scattering coefficient of random rough surfaces is examined . inspection and reports on our field experience with robotics in Iraq and Afghanistan. DTIC Afghanistan; Iraq; Robotics; Robots; Warfare 20 050 173 253 Space and Naval Warfare Systems Command, San Diego,. Antennas and Propagation Society International Symposium, Volume 1; [1999], pp. 628-631; In English; See also 20 050 16 956 5 Contract(s)/Grant(s): N00014- 95- 1-0872; NSF ESC-93-021 45; F49620-96-1-00 25; . Matekovits, L.; Orefice, M.; IEEE Antennas and Propagation Society International Symposium, Volume 1; [1999], pp. 352 - 355 ; In English; See also 20 050 16 956 5; Copyright; Avail: Other Sources In this

Ngày đăng: 08/08/2014, 13:20

Từ khóa liên quan

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan