Thomas R Kronhamn Ericsson Microwave Systems AB Mölndal, Sweden
|
|
- Charles Campbell
- 5 years ago
- Views:
Transcription
1 6HQVRU,QWHU1HW:RUNV Thomas R Kronhamn Ericsson Microwave Systems AB Mölndal, Sweden Thomas.Kronhamn@emw.ericsson.se $EVWUDFW It is shown how distributed sensors, networked by Internet techniques, can interact to create not only a common, wide area situation picture but also to support each other in the measurement and tracking process. The paper gives a framework for how the networked system can accommodate sensors of different sophistication and for the system to be developed in an evolutionary way. Specifically, a solution to the truly distributed sensor fusion problem is described. In this solution sensors cooperate directly sensor-to-sensor, in a totally flat architecture. By making the fusion support the primary data sources, the sensors, it is implicated that it also benefits the system as a hole..h\zrugv Sensor networks, Internet communication, sensor data fusion, distributed fusion.,qwurgxfwlrq Networks and data fusion are hot topics in many areas today. Primarily, this paper deals with sensor networks for air surveillance. Traditionally, sensors were connected to centers/hubs designed to create, from the specific sensors used, a common situation picture for the area covered by the sensors. This could be the case for sensors distributed over an area or for multi-sensor platforms, often ships or aircraft. However, new demands on coordinating assets in a flexible and robust way and the advent of Internet communication have made new solutions both wanted and possible. This paper will show how networks can be built from very diverse pieces of equipment, to build "a system of systems". Particularly, it is shown how different levels of sophistication can be accommodated and how the network fusion functionality can be developed in an evolutionary way. Fundamental to such a process is to formulate the fusion objectives and to have a clear strategy in relation to the classical data fusion problems. The paper defines three levels of ambitions for the sensor data fusion and gives corresponding solutions. A specific section is devoted to DISSY, the "ultimate" distributed sensor system solution. Architectures for multiple sensor tracking have been discussed in the literature, e.g. in [1,2,3]. DISSY, first presented in [4,5], shares ideas with the "distributed composite tracking" concept of [3]. The main differences to [3] are in the measures to ensure a truly common air picture. First, in DISSY, it is favored that all measurements in a vicinity of a track are communicated, leaving the association task to the receiving sensor. This prevents that association errors are spread to others. Second, communicating data is not enough to ensure a common picture, because of bandwidth constraints. A "hand shake" procedure is necessary between sensors to establish which one that should be responsible globally for each track. Otherwise, the result would be similar, but not truly identical, air pictures. 7KHQHWZRUNLGHD 2SHUDWLRQDOEHQHILWV The network idea, from an operational point of view, is to create a multi-source, multi-user system with key qualities such as flexibility and robustness. Indirectly this favors a flat, distributed architectural solution. Other operational objectives are to give, all units involved, both a common unified situation picture as well as an increase in the quality of information.
2 1HWZRUNFRPSRQHQWV From a sensor point of view some sensors may be dedicated to the network, others may be sensors belonging to taskoriented platforms or systems of different kinds. These could be units of fighter aircraft, ships, air-defense systems, AEW-systems, etc.. One of the network ideas is to exploit the different qualities of sensors such as radar, ESM, IR, etc. to the benefit of track continuity and target classification. Some sensors may be designed functionally to work together and to be supported by specific high performance data links. Many sensors today may, on the other side, be of local use only. The paper addresses the question of how to make them work together, to be a "system of systems", see Figure 1. Figure 1. A system of systems
3 Figure 2. The Internet world. 2.3 An Inter-Net-Work Logically we think of the sensor system as in Figure 2 that is as sensors connected by way of an Intranet. In this way the physical location or the physical communication links are not an issue from a functional point of view. Functionally, sensors may now cooperate because they observe the same targets and not because they have been connected to specific centers or fusion nodes. 6RPHIXVLRQDVSHFWV 'DWDIXVLRQDPELWLRQV Sensor data fusion may be done in numerous ways. From an engineering point of view, customer needs (expressed as system requirements) should be the leading star. This means that solutions should not be unnecessarily complicated. Here we define/distinguish three levels of ambition, in increasing order of complexity: A1: Creation of a unified situation picture. A2: Performance improvements by use of all data available. A3: Performance improvement by support of local sensor measurement and track. With "a unified situation picture" is here understood that all users shall have the same situation picture. With "use of all data" means that data, from different sensors, concerning the same target should be used to improve the result compared to the single sensor performance. With "by support of local sensor measurement and track" means that the basic measurement and track processes of the sensors themselves should benefit from the data of the other sensors. This may be achieved by feedback from a fusion node or, as advocated in this paper, by direct sensor-tosensor communication.
4 Figure 3. A sensor block diagram showing points of potential benefits for a sensor from external data. In Figure 3, three potential areas of performance improvements from external data are shown for a sensor target track function. These are association, filtering and track load. In the figure, two alternative entry points are shown for external data into the target data processing chain. The preferred alternative is the plot data entry into the association block. For full advantage "high bandwidth" plot data is required. In case track data is received, this still can be beneficial, depending on the status and quality of the own sensor track data. For adaptive sensors, with data arriving at a rate comparable with its own adaptive loop bandwidth, track load savings can be made. Within each level of ambition described above there are still many alternative solutions. In this paper, an engineering design approach is taken that has its focus on the system requirements and tries to find simple ways to avoid or solve the problems encountered. Below, some data fusion issues are discussed. 'DWDIXVLRQLVVXHV &RUUHODWHGGDWD However, even if known, correlated data represents an additional communication and processing load. Three different situations with correlated data can be distinguished: - "common process noise", - shared measurement data, - data feedback. Common process noise is present in track data from different sensors. This means that dynamic track errors are correlated, while the measurement errors are not. Shared measurement data may be present if data can take different routes in a network. This may happen if sensor data, no matter if measurement data or track data, is sent to sensors or fusion nodes without control. Data feedback, here primarily thought of as data from a fusion node that is fed back to sensors, often leads to the sensor s own data coming back to an unknown extent. A general comment on these problems is that they should be avoided if possible. In high performance applications this can be done by direct communication of measurement data sensor-to-sensor. In low performance applications it can be avoided by selection (of track data) rather than fusion. Correlated data is often a problem in data fusion. This is especially the case if the degree of correlation is not known.
5 &RPPXQLFDWLRQEDQGZLGWK Sensor data fusion is always affected by the communication bandwidth. With narrow band, fixed protocol communication links the transmission of track data often is preferred over plot data. With high bandwidth links and flexible protocols the question is open and the answer may be both. In a network, of the kind here considered, the situation may be that bandwidth levels can not be guaranteed and that equipment may be of very different kinds in terms of fusion functionality. Often argued in the past was that track data was more communication efficient than plot data. This was certainly true in the early days, with poor false alarm control. This paper favors plot data for fusion performance reasons (see above). In this solution, however, only a selection of data is communicated and only from selected sensors (those actually observing the target). Another reason is that track data today, to give the full picture, often is of multiple model complexity, far outweighing measurement reports (plot data) in terms of data content. A conclusion must be that solutions must be adapted to the conditions at hand. When high performance solutions are required communication performance must be guaranteed or flexibly controlled. 'DWDIXVLRQVROXWLRQV Given the levels of ambitions (A1-A3) and the different problems presented above, some straightforward solutions (S1-S3) can be found. There are of course numerous possible variants, but solutions are given here with the purpose to match the level of performance ambition, without unnecessary involvement in the problems mentioned. Below the word "selected" is used when one out of two or more pieces of data is chosen, as opposed to "fused" when the data is filtered or otherwise weighted together. Included in the notion "selected" is the possibility to "combine" data from different sensors, which may complement each other in different ways. Such a typical situation is to combine radar or laser range data with IRST angular data when these sensors are co-located on platforms. The three solutions (S1-S3) are as follows: S1: Track data from the best sensor or node is selected. This solution means that no extra fusion is performed for the sake of the net. S2: Plot data should be fused at nodes, where possible. If done at several locations for a particular target, or where there are sensors not connected to these nodes, track data from the best location should then be selected. This solution should be used when sensors and communication links are known and dependable, such as in multisensor platforms and specifically designed local sensor nets. The solution results in that extra track functions are introduced at the nodes. Sensors may have (probably have) track functions of their own. Plot data, not all but selected, potentially belonging to the track in question, should be communicated. S3: Plot data should be shared among sensors or nodes and fused in a way that all data concerning each target is available at the fusion point (sensor). The best node or sensor should then be selected. In this solution fusion nodes should only exist where sensors do not have a tracking capability of their own. Common for all the solutions are the interface to the net and that there are no correlated data problems. 7KH',66<VROXWLRQ In a perfect world where all sensors are built, with the highest ambitions, for the network, a truly distributed Sensor Inter-Net-Works can be obtained in the way shown in this section. Here, a solution is shown that satisfies the highest standards in - performance; all data fused, direct sensor-tosensor support, - robustness; fusion at sensors, no extra fusion nodes introduced. This is done without suffering from the problems mentioned above. 7KH',66<SULQFLSOH The solution of DISSY, DIstributed Sensor SYstem, is depicted in figure 4. Each participating sensor is connected to the network by the three services shown in the figure. Full functional standard is not necessary for participation. The services are: 1. One service finds out, for each specific target, if any other sensor observe the same target. This is based on the location of the own target track. These sensors send data, from an area around the actual track, to each other. 2. Another service adapts the received data to the functionality of the host sensor. The received data can be plots or tracks with different amounts of delay. 3. The third service is negotiating with the other sensors for the global responsibility of the target data. This is based on rules and data quality. The DISSY principle results in a flat architecture, as opposed to a solution with local and global fusion nodes (of which there are many variants). Sensor cooperation is logically the same irrespective of local physical connections.
6 Figure 4. DISSY, DIstributed Sensor SYstem. Each participating sensor, or sensor sub-system, is functionally a part of the distributed sensor system by use of the three services shown in the figure. 0RWLYDWLRQDFDVHVWXG\ Consider a target crossing the area of interest. There is always (almost) one sensor to be the first to detect and start tracking. This sensor learns (service no 1) that no other sensors are tracking this particular target and sets up a global track. When another sensor gets its first detection from this target, it finds out (service no 1) that there is already a global track at this location. These two sensors now start to exchange data. This same thing takes place for each new sensor observing the target. The data exchanged by the sensors may be of many different kinds and not known in advance. One basic idea behind the distributed network is that sensor cooperation FDQ QRW EH SUHSODQQHG in terms of which sensors that observe a particular target at a particular time and that sensor cooperation VKRXOG QRW EH SUHSODQQHG because of requirements on flexibility and mobility of sensors. This means that data may come in many different forms, such as plot or track data and of one, two or three space dimensions. Not only data come in different kinds but so does also the receiving sensor functionality. The purpose of "service no 2" is to flexibly adapt the data to the sensor. This range from doing nothing to taking care of everything. At the low end, this can be a sensor that cannot benefit from external data and only delivers local track data. At the high end, a sensor has the ability to accept and to use, to the advantage possible, data from all kinds of sensors. A requirement for an Intranet of sensors is to accept the plurality of sensor sophistication, as the first goal is to make the net work and then gradually hone its abilities. At each instant of time there is always one sensor that is the "best", in terms of target measurements. By the sensorto-sensor communication, this sensor has the possibility to improve further by means of the received data. It is hard to imagine that, from a performance point of view, anything could be gained from sending data to a third party (such as a fusion node) instead of sensor-to-sensor. A third party would always be worse off than the best sensor in terms of data and can not generally be better positioned in relation to users, in a flexible, distributed multi-user network. The remaining thing, sending data to each other, is to decide bilaterally between the sensors which will produce
7 the best result, "service 3". The best sensor will be responsible to the users for the particular target data. For a target, passing through the area of interest, this responsibility is handed over from sensor to sensor all along the path. Criteria may be based on track quality measures and predetermined relations among sensors. Mostly the criteria are not critical, as data is shared among the sensors. $QHWZRUNHYROXWLRQSURFHVV Building a network is not necessarily only high-tech in terms of fusion. First thing is often to make things work together with existing equipment. Successively equipment may then be modified, or new material added that is adapted from the start. There will certainly always be equipment of different standards in terms of functionality. The challenge will be to manage the network development in an evolutionary way. The process advocated here is that sensors etc delivers track data to the net. A net service correlates and selects the best data; i.e. produces the unified picture for all users. This allows a unified situation picture to be created regardless of the fusion sophistication at various members. A net service, rather than a built-in function at the sensors and nodes, has the advantage of minimizing modifications in existing equipment. To raise the quality of the result, sensors and nodes may share data among themselves, when this is beneficial. This can be done without affecting the previously described process of creating the unified situation picture as shown with solutions 2 and 3 above. To raise the robustness of the net, the number of fusion nodes may be increased, but rather, the fusion functionality, both the data fusion itself and the responsibility negotiation, should be distributed directly at the sensors. The higher performance levels described will certainly come to use in the new generation of microwave sensors based on DGA-techniques (DGA: Digital Group Antennas), where time critical sensor-to-sensor co-operation will be exploited. Another application that will benefit from this solution is networks of passive sensors, where no natural fusion points can be found. 5HIHUHQFHV [1] Chong, C. Y., S. Mori and K. C. Chang, Distributed Multitarget Multisensor Tracking, in Multitarget- Multisensor Tracking: Advanced Applications, Vol. I (Y. Bar-Shalom, ed.), Artech House, 1990, pp [2] Blackman, S. S., and R. Popoli, Design and Analysis of Modern Tracking Systems, Artech House, [3] Moore, J. R. and W. D. Blair, Practical Aspects of Multisensor Tracking, in Multitarget-Multisensor Tracking: Applications and Advances, Vol. III (Y. Bar-Shalom and W. D. Blair, ed.), Artech House 2000, pp [4] Kronhamn, T. R., Sensorsamverkan i Omvandling, Milinf 2000, Enköping, sept (in Swedish). [5] Kronhamn, T. R., Sensor Fusion Revisited, Militärteknisk Tidskrift - Swedish Journal of Military Technology, No. 4, &RQFOXVLRQV The paper has shown a way to build wide area networks of sensors by Internet techniques. A framework has been given that allows system components of different sophistication to be included. This also makes it possible to develop the network in an evolutionary way. The DISSY solution results in a totally flat architecture without many of the problems in hierarchical solutions. This technique is considered especially important for high performance requirements when adaptive and passive sensors are involved.
Fusion of Radar and EO-sensors for Surveillance
of Radar and EO-sensors for Surveillance L.J.H.M. Kester, A. Theil TNO Physics and Electronics Laboratory P.O. Box 96864, 2509 JG The Hague, The Netherlands kester@fel.tno.nl, theil@fel.tno.nl Abstract
More informationA MATLAB TOOL FOR DEVELOPMENT AND TESTING OF TRACK INITIATION AND MULTIPLE TARGET TRACKING ALGORITHMS
I&S A MATLAB TOOL FOR DEVELOPMENT AND TESTING OF TRACK INITIATION AND MULTIPLE TARGET TRACKING ALGORITHMS Kiril ALEXIEV 1. Introduction Digital computer simulation is a valuable tool, used for the design,
More informationOutline. Target Tracking: Lecture 1 Course Info + Introduction to TT. Course Info. Course Info. Course info Introduction to Target Tracking
REGLERTEKNIK Outline AUTOMATIC CONTROL Target Tracking: Lecture 1 Course Info + Introduction to TT Emre Özkan emre@isy.liu.se Course info Introduction to Target Tracking Division of Automatic Control Department
More informationProbability Evaluation in MHT with a Product Set Representation of Hypotheses
Probability Evaluation in MHT with a Product Set Representation of Hypotheses Johannes Wintenby Ericsson Microwave Systems 431 84 Mölndal, Sweden johannes.wintenby@ericsson.com Abstract - Multiple Hypothesis
More informationMultisensor Data Fusion Using Two-Stage Analysis on Pairs of Plots Graphs
Multisensor Data Fusion Using Two-Stage Analysis on Pairs of Plots Graphs Rogério Perroti Barbosa 1,2, Frederic Livernet 3, Beatriz S. L. P. de Lima 1, José Gomes de Carvalho Jr 2 1 - COPPE/ Federal University
More informationUS and Swedish Industrial Support to Network Centric Warfare for US and Swedish Forces
US and Swedish Industrial Support to Network Centric Warfare for US and Swedish Forces October 9, 2003 Erik Löwenadler, President Ericsson Microwave Systems AB 10 th US-Sweden Defense Industry Conference
More informationSensor Networks: Evolution, Opportunities, and Challenges C. Y. Chong and S. P. Kumar Proceedings of the IEEE, 91, 8, 2003
Sensor Networks: Evolution, Opportunities, and Challenges C. Y. Chong and S. P. Kumar Proceedings of the IEEE, 91, 8, 2003 Allison Lee CS295-1 Sensor data management October 12, 2005 Outline Why is sensor
More informationOutline. EE793 Target Tracking: Lecture 2 Introduction to Target Tracking. Introduction to Target Tracking (TT) A Conventional TT System
Outline EE793 Target Tracking: Lecture 2 Introduction to Target Tracking Umut Orguner umut@metu.edu.tr room: EZ-12 tel: 4425 Department of Electrical & Electronics Engineering Middle East Technical University
More informationIntroduction and Statement of the Problem
Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network
More informationNetwork-Centric MFA Tracking Architectures
Network-Centric FA Tracking Architectures Suihua Lu Department of athematics Colorado State University Fort Collins, CO 80523 lu@mathcolostateedu Aubrey B Poore Numerica, Inc PO Box 271246 Fort Collins,
More informationWHY NETWORK FAILOVER PROTECTION IS A BUSINESS NECESSITY
WHY NETWORK FAILOVER PROTECTION IS A BUSINESS NECESSITY Since its early days in the 1990s, the Internet has truly transformed the world. It would be difficult, if not impossible, to find an industry that
More informationSOFTWARE-DEFINED NETWORKING WHAT IT IS, AND WHY IT MATTERS
SOFTWARE-DEFINED NETWORKING WHAT IT IS, AND WHY IT MATTERS When discussing business networking and communications solutions, the conversation seems invariably to revolve around cloud services, and more
More informationRadar Detection Improvement by Integration of Multi- Object Tracking
Radar Detection Improvement by Integration of Multi- Object Tracing Lingmin Meng Research and Technology Center Robert Bosch Corp. Pittsburgh, PA, U.S.A. lingmin.meng@rtc.bosch.com Wolfgang Grimm Research
More informationFUZZY INFERENCE SYSTEMS
CHAPTER-IV FUZZY INFERENCE SYSTEMS Fuzzy inference is the process of formulating the mapping from a given input to an output using fuzzy logic. The mapping then provides a basis from which decisions can
More informationExamining the Authority and Ranking Effects as the result list depth used in data fusion is varied
Information Processing and Management 43 (2007) 1044 1058 www.elsevier.com/locate/infoproman Examining the Authority and Ranking Effects as the result list depth used in data fusion is varied Anselm Spoerri
More informationTaxonomies and controlled vocabularies best practices for metadata
Original Article Taxonomies and controlled vocabularies best practices for metadata Heather Hedden is the taxonomy manager at First Wind Energy LLC. Previously, she was a taxonomy consultant with Earley
More informationChapter 1 - Introduction
Chapter 1-lntroduction Chapter 1 - Introduction The aim of this chapter is to provide a background to topics which are relevant to the subject of this thesis. The motivation for writing a thesis regarding
More informationA new parameterless credal method to track-to-track assignment problem
A new parameterless credal method to track-to-track assignment problem Samir Hachour, François Delmotte, and David Mercier Univ. Lille Nord de France, UArtois, EA 3926 LGI2A, Béthune, France Abstract.
More informationGoing With the (Data) Flow
1 of 6 1/6/2015 1:00 PM Going With the (Data) Flow Publish Date: May 20, 2013 Table of Contents 1. Natural Data Dependency and Artificial Data Dependency 2. Parallelism in LabVIEW 3. Overuse of Flat Sequence
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationHigh Performance Computing Prof. Matthew Jacob Department of Computer Science and Automation Indian Institute of Science, Bangalore
High Performance Computing Prof. Matthew Jacob Department of Computer Science and Automation Indian Institute of Science, Bangalore Module No # 09 Lecture No # 40 This is lecture forty of the course on
More informationPedestrian Detection Using Correlated Lidar and Image Data EECS442 Final Project Fall 2016
edestrian Detection Using Correlated Lidar and Image Data EECS442 Final roject Fall 2016 Samuel Rohrer University of Michigan rohrer@umich.edu Ian Lin University of Michigan tiannis@umich.edu Abstract
More informationNo Time for Zero-Day Solutions John Muir, Managing Partner
No Time for Zero-Day Solutions John Muir, Managing Partner Executive Summary Innovations in virus construction and propagation have created a zero-day threat from email attachments that can wreak significant
More information(Refer Slide Time: 00:02:04)
Computer Architecture Prof. Anshul Kumar Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture - 27 Pipelined Processor Design: Handling Control Hazards We have been
More informationCSE200 Lecture 6: RECURSION
Table of Contents Review of functions (using factorial example)... 1 Recursion... 1 Step by step run through of recursive factorial... 2 Recursion vs. iteration (for and while loops)... 3 Helper functions:...
More information(Refer Slide Time 6:48)
Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology Madras Lecture - 8 Karnaugh Map Minimization using Maxterms We have been taking about
More informationFuture Technologies and Developments In Sonar Systems For Conventional Submarines
Future Technologies and Developments In Sonar Systems For Conventional Submarines Cmde A Jai Singh (Retd), ATLAS ELEKTRONIK India 19 April 2016, FCCI - New Delhi a sound decision The ATLAS ELEKTRONIK Group/
More informationFuzzy Double-Threshold Track Association Algorithm Using Adaptive Threshold in Distributed Multisensor-Multitarget Tracking Systems
13 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing Fuzzy Double-Threshold Trac Association Algorithm Using
More informationSIEM FOR BEGINNERS EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK.
SIEM FOR BEGINNERS EVERYTHING YOU WANTED TO KNOW ABOUT LOG MANAGEMENT BUT WERE AFRAID TO ASK www.alienvault.com A Rose By Any Other Name SLM/LMS, SIM, SEM, SEC, SIEM Although the industry has settled on
More informationUse of n-vector for Radar Applications
Use of n-vector for Radar Applications Nina Ødegaard, Kenneth Gade Norwegian Defence Research Establishment Kjeller, NORWAY email: Nina.Odegaard@ffi.no Kenneth.Gade@ffi.no Abstract: This paper aims to
More informationActive Adaptation in QoS Architecture Model
Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex
More informationDIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS
DIGITAL TELEVISION 1. DIGITAL VIDEO FUNDAMENTALS Television services in Europe currently broadcast video at a frame rate of 25 Hz. Each frame consists of two interlaced fields, giving a field rate of 50
More informationAn Approach to Task Attribute Assignment for Uniprocessor Systems
An Approach to ttribute Assignment for Uniprocessor Systems I. Bate and A. Burns Real-Time Systems Research Group Department of Computer Science University of York York, United Kingdom e-mail: fijb,burnsg@cs.york.ac.uk
More informationWhat is a multi-model database and why use it?
What is a multi-model database and why use it? An When it comes to choosing the right technology for a new project, ongoing development or a full system upgrade, it can often be challenging to define the
More informationOptical networking technology
1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the
More informationTHE INFORMATION SYSTEM AS A SUPPORT OF THE EDUCATION PROCESS ON SCHOOL OF BUSINESS ADMINISTRATION OF SILESIAN UNIVERSITY IN KARVINA
THE INFORMATION SYSTEM AS A SUPPORT OF THE EDUCATION PROCESS ON SCHOOL OF BUSINESS ADMINISTRATION OF SILESIAN UNIVERSITY IN KARVINA VÁCLAV KRÓL Silesian University in Opava School of Business Administration
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationCryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 38 A Tutorial on Network Protocols
More informationTelematics I. Chapter 1 A Quick Tour. Goals of this chapter Examples Direct connection between two devices Multiple devices Errors
Telematics I Chapter 1 A Quick Tour Goals of this chapter Examples Direct connection between two devices Multiple devices Errors (Acknowledgement: these slides have been edited from Prof. Karl s set of
More informationWYSIWON T The XML Authoring Myths
WYSIWON T The XML Authoring Myths Tony Stevens Turn-Key Systems Abstract The advantages of XML for increasing the value of content and lowering production costs are well understood. However, many projects
More informationChapter 2 Basic Principles of the Object-Oriented Paradigm 2.1 Abstraction
Chapter 2 Basic Principles of the Object-Oriented Paradigm 2.1 Abstraction One of the most appreciated advantages of object-oriented versus other modern programming paradigms is the direct support for
More informationTransforming Security from Defense in Depth to Comprehensive Security Assurance
Transforming Security from Defense in Depth to Comprehensive Security Assurance February 28, 2016 Revision #3 Table of Contents Introduction... 3 The problem: defense in depth is not working... 3 The new
More informationA Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs
A Mobile-Sink Based Distributed Energy-Efficient Clustering Algorithm for WSNs Sarita Naruka 1, Dr. Amit Sharma 2 1 M.Tech. Scholar, 2 Professor, Computer Science & Engineering, Vedant College of Engineering
More informationMetrics for Feature-Aided Track Association
Metrics for eature-aided rack Association Chee-Yee Chong BAE Systems Los Altos, CA, U.S.A. chee.chong@baesystems.com Shozo Mori BAE Systems Los Altos, CA, U.S.A. shozo.mori@baesystems.com Abstract: rack
More informationIntroduction CHAPTER1. Strongly Recommend: Guidelines that, if not followed, could result in an unusable application.
sg-midp20.book Page 1 Wednesday, May 14, 2003 1:27 PM CHAPTER1 Introduction MOBILE Information Device Profile (MIDP) defines the Java application environment for mobile information devices (MIDs), such
More informationA Sequential ESM Track Association Algorithm Based on the Use of Information Theoretic Criteria
A Sequential ESM Track Association Algorithm Based on the Use of Information Theoretic Criteria Yifeng Zhou and Jim Mickeal Radar Electronic Warfare Section Defence R&D Canada - Ottawa 371 Carling Avenue,
More informationA New Parameterless Credal Method to Track-to-Track Assignment Problem
A New Parameterless Credal Method to Track-to-Track Assignment Problem Samir Hachour, François Delmotte, and David Mercier Univ. Lille Nord de France, UArtois, EA 3926 LGI2A, Béthune, France Abstract.
More informationCh.16 - Wireless WAN System Architectures
Ch.16 - Wireless WAN System Architectures 1 Wireless WAN 2 GSM via PSTN 3 GSM via ISDN 4 GPRS 5 Mobitex 6 CDPD 7 PPDC 8 UMTS 9 Future Systems 10 Systems Summary 1 11 Systems Summary 2 1 This section will
More informationOceanic Domain Awareness- A Concept Rear Admiral Dr. S Kulshrestha, retd
Oceanic Domain Awareness- A Concept Rear Admiral Dr. S Kulshrestha, retd He knows the course of the stars and can always orient himself. He knows the value of signs, both regular, accidental and abnormal,
More informationData-driven Programming
Data-driven Programming By Johan Nel A series of articles explaining the principles Article 1: Concepts and theory November 2014 Table of contents 1. FRUIT FOR THOUGHT...1 2. DATA-DRIVEN PROGRAMMING...2
More informationCharacter Recognition
Character Recognition 5.1 INTRODUCTION Recognition is one of the important steps in image processing. There are different methods such as Histogram method, Hough transformation, Neural computing approaches
More informationA Multi Agent System for MS Windows using Matlab-enabled Agents
A Multi Agent System for MS Windows using Matlab-enabled Agents Th.M. Hupkens a R.Thaens b a Royal Netherlands Naval College, Combat Systems Department, P.O. Box 10000, 1780 CA Den Helder, The Netherlands
More informationPassive Multi Target Tracking with GM-PHD Filter
Passive Multi Target Tracking with GM-PHD Filter Dann Laneuville DCNS SNS Division Toulon, France dann.laneuville@dcnsgroup.com Jérémie Houssineau DCNS SNS Division Toulon, France jeremie.houssineau@dcnsgroup.com
More informationHeadline. Improving Development Time of Complex Microwave Test Adapters by Incorporating COTS Components OVERVIEW RELIABLE DATA FIRST TIME EVERY TIME
Improving Development Time of Complex Microwave Test Adapters by Incorporating COTS Components OVERVIEW Creating a unique test system design dedicated to a specific target test article can often be costly,
More informationCOPYRIGHTED MATERIAL. An Introduction to Computers That Will Actually Help You in Life. Chapter 1. Memory: Not Exactly 0s and 1s. Memory Organization
Chapter 1 An Introduction to Computers That Will Actually Help You in Life Memory: Not Exactly 0s and 1s Memory Organization A Very Simple Computer COPYRIGHTED MATERIAL 2 Chapter 1 An Introduction to Computers
More informationUdaipur, Rajasthan, India. University, Udaipur, Rajasthan, India
ROLE OF NETWORK VIRTUALIZATION IN CLOUD COMPUTING AND NETWORK CONVERGENCE 1 SHAIKH ABDUL AZEEM, 2 SATYENDRA KUMAR SHARMA 1 Research Scholar, Department of Computer Science, Pacific Academy of Higher Education
More informationInformation Retrieval CSCI
Information Retrieval CSCI 4141-6403 My name is Anwar Alhenshiri My email is: anwar@cs.dal.ca I prefer: aalhenshiri@gmail.com The course website is: http://web.cs.dal.ca/~anwar/ir/main.html 5/6/2012 1
More informationModel Evaluation. ACT-R, IMPRINT, and Matlab Comparisons, Parameter Optimizations, and Opportunities. Bengt Fornberg
Model Evaluation Slide 1 of 12 ACT-R, IMPRINT, and Matlab Comparisons, Parameter Optimizations, and Opportunities - 'Unified test problems' Keystroke entry task, and RADAR - RADAR Some modeling results
More informationUser Assessment for Negotiating the Quality of Service for Streaming Media Applications
User Assessment for Negotiating the Quality of Service for Streaming Media Applications Adina Manoli Human Oriented Technology Lab, Department of Psychology, Carleton University, Ottawa, ON, K1S 5B6, Canada
More informationSIEM FOR BEGINNERS Everything You Wanted to Know About
SIEM FOR BEGINNERS Everything You Wanted to Know About Log Management But were Afraid to Ask www.alienvault.com A Rose By Any Other Name SLM/LMS, SIM, SEM, SEC, SIEM Although the industry has settled on
More informationLecture 5: Flow Control. CSE 123: Computer Networks Alex C. Snoeren
Lecture 5: Flow Control CSE 123: Computer Networks Alex C. Snoeren Pipelined Transmission Sender Receiver Sender Receiver Ignored! Keep multiple packets in flight Allows sender to make efficient use of
More informationSection 3 - Backplane Architecture Backplane Designer s Guide
Section 3 - Backplane Architecture Backplane Designer s Guide March 2002 Revised March 2002 The primary criteria for backplane design are low cost, high speed, and high reliability. To attain these often-conflicting
More informationEnhanced Performance of Search Engine with Multitype Feature Co-Selection of Db-scan Clustering Algorithm
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of Db-scan Clustering Algorithm K.Parimala, Assistant Professor, MCA Department, NMS.S.Vellaichamy Nadar College, Madurai, Dr.V.Palanisamy,
More informationQuestion. Reliable Transport: The Prequel. Don t parse my words too carefully. Don t be intimidated. Decisions and Their Principles.
Question How many people have not yet participated? Reliable Transport: The Prequel EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica,
More informationDynamic Service Definition in the future mixed Surveillance environment
Dynamic Service Definition in the future mixed Surveillance environment Dr. Christos M. Rekkas Jean-Marc Duflot Pieter van der Kraan Surveillance Unit EUROCONTROL Rue de la Fusée 96, Brussels 1130, Belgium
More informationAdvanced Threat Defense Certification Testing Report. Symantec Corporation Symantec Advanced Threat Protection
Advanced Threat Defense Certification Testing Report Symantec Advanced Threat Protection ICSA Labs Advanced Threat Defense December 8, 2015 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg,
More informationThe Industrial Intranet: a Cause For Change
The Industrial Intranet: a Cause For Change by S Graham, Schneider Automation Electricity + Control March 2000 Most plant data collection applications today use a batch approach, where data is transmitted
More informationBridging and Switching Basics
CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device
More informationFROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE
FROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE David C. Hay Essential Strategies, Inc In the buzzword sweepstakes of 1997, the clear winner has to be Data Warehouse. A host of technologies and techniques
More informationUBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT
2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer
More informationStorage Area Networks SAN. Shane Healy
Storage Area Networks SAN Shane Healy Objective/Agenda Provide a basic overview of what Storage Area Networks (SAN) are, what the constituent components are, and how these components fit together to deliver
More informationAction TU1208 Civil Engineering Applications of Ground Penetrating Radar. SPOT-GPR: a freeware tool for target detection and localization in GPR data
Action TU1208 Civil Engineering Applications of Ground Penetrating Radar Final Conference Warsaw, Poland 25-27 September 2017 SPOT-GPR: a freeware tool for target detection and localization in GPR data
More informationThe Need for Speed: Understanding design factors that make multicore parallel simulations efficient
The Need for Speed: Understanding design factors that make multicore parallel simulations efficient Shobana Sudhakar Design & Verification Technology Mentor Graphics Wilsonville, OR shobana_sudhakar@mentor.com
More informationInput/Output Management
Chapter 11 Input/Output Management This could be the messiest aspect of an operating system. There are just too much stuff involved, it is difficult to develop a uniform and consistent theory to cover
More informationLecture 30 Key Enables of Industrial IoT: Connectivity Part 3
Introduction to Industry 40 and Industrial Internet of Things Prof Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 30 Key Enables of Industrial
More informationWhite Paper: VANTIQ Digital Twin Architecture
Vantiq White Paper www.vantiq.com White Paper: VANTIQ Digital Twin Architecture By Paul Butterworth November 2017 TABLE OF CONTENTS Introduction... 3 Digital Twins... 3 Definition... 3 Examples... 5 Logical
More informationDesigning the Right Ethernet Interconnect to Increase High-Speed Data Transmission in Military Aircraft. White Paper
Designing the Right Ethernet Interconnect to Increase High-Speed Data Transmission in Military Aircraft White Paper May 216 Abstract: Designing the right high-speed Interconnect that enables systems to
More informationDATA CENTRE & COLOCATION
DATA CENTRE & COLOCATION RISING DEMAND FOR HOSTED SERVICES When it comes to hosted IT infrastructure, organisations are looking for highly resilient, highly available and highly scalable facilities at
More information1: Introduction to Object (1)
1: Introduction to Object (1) 김동원 2003.01.20 Overview (1) The progress of abstraction Smalltalk Class & Object Interface The hidden implementation Reusing the implementation Inheritance: Reusing the interface
More informationContext Based Shared Understanding for Situation Awareness
Distribution Statement A: Approved for public release; distribution is unlimited. Context Based Shared Understanding for Situation Awareness June 9, 2004 David G. Cooper Lockheed Martin Advanced Technology
More information(Refer Slide Time 3:31)
Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology Madras Lecture - 5 Logic Simplification In the last lecture we talked about logic functions
More informationThree-Dimensional Multiple Layer Extended Target Modeling for Inverse Synthetic Aperture Radar Studies in Target Identification
Three-Dimensional Multiple Layer Extended Target Modeling for Inverse Synthetic Aperture Radar Studies in Target Identification Theodoros G. Kostis & Sokratis K. Katsikas Department of Information & Communication
More informationUse of Fibe-Channel Full Fabric and Storage Area Network Technology. Are you ready for the Challenge?
Use of Fibe-Channel Full Fabric and Storage Area Network Technology. Are you ready for the Challenge? Ian D Norman, GRADINE Technical Director UK Ministry of Defence, Washington DC Rod Roderique, Principal
More informationTELEMETRY SYSTEMS OF THE FUTURE
TELEMETRY SYSTEMS OF THE FUTURE Item Type text; Proceedings Authors Rauch, William D. Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings Rights
More informationMOVING OBJECT DETECTION USING BACKGROUND SUBTRACTION ALGORITHM USING SIMULINK
MOVING OBJECT DETECTION USING BACKGROUND SUBTRACTION ALGORITHM USING SIMULINK Mahamuni P. D 1, R. P. Patil 2, H.S. Thakar 3 1 PG Student, E & TC Department, SKNCOE, Vadgaon Bk, Pune, India 2 Asst. Professor,
More informationThe Parallel Software Design Process. Parallel Software Design
Parallel Software Design The Parallel Software Design Process Deborah Stacey, Chair Dept. of Comp. & Info Sci., University of Guelph dastacey@uoguelph.ca Why Parallel? Why NOT Parallel? Why Talk about
More informationENERGY SCHEMING 1.0. G.Z. Brown, Tomoko Sekiguchi. Department of Architecture, University of Oregon Eugene, Oregon USA
ENERGY SCHEMING 1.0 G.Z. Brown, Tomoko Sekiguchi Department of Architecture, University of Oregon Eugene, Oregon 97403 USA ABSTRACT This paper describes software for the Apple Macintosh microcomputer that
More information5G radio access. ericsson White paper Uen June research and vision
ericsson White paper 284 23-3204 Uen June 2013 5G radio access research and vision 5G will enable the long-term Networked Society and realize the vision of unlimited access to information for anyone and
More informationObject Classification Using Tripod Operators
Object Classification Using Tripod Operators David Bonanno, Frank Pipitone, G. Charmaine Gilbreath, Kristen Nock, Carlos A. Font, and Chadwick T. Hawley US Naval Research Laboratory, 4555 Overlook Ave.
More informationInstructor: Craig Duckett. Lecture 04: Thursday, April 5, Relationships
Instructor: Craig Duckett Lecture 04: Thursday, April 5, 2018 Relationships 1 Assignment 1 is due NEXT LECTURE 5, Tuesday, April 10 th in StudentTracker by MIDNIGHT MID-TERM EXAM is LECTURE 10, Tuesday,
More informationHigh Performance Computer Architecture Prof. Ajit Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
High Performance Computer Architecture Prof. Ajit Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 23 Hierarchical Memory Organization (Contd.) Hello
More informationPayload Length and Rate Adaptation for Throughput Optimization in Wireless LANs
Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs Sayantan Choudhury and Jerry D. Gibson Department of Electrical and Computer Engineering University of Califonia, Santa Barbara
More informationIn this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more
In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more detail in CS 168, and many slides are taken from there.
More informationThe telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings.
Samsung C6112 telephone for protection of conversations against control via a GSM service provider as well as via active and semi-active GSM interception complexes, catchers. The telephone supports 2 SIM
More informationImplementation of Storing Data Algorithm for Tracking Targets using LABVIEW
Implementation of Storing Data Algorithm for Tracking Targets using LABVIEW Hazem Kamel Radar Department, Military Technical College Cairo, Egypt Abstract Human operators of any radar or aviation system
More informationCA Host-Based Intrusion Prevention System r8
PRODUCT BRIEF: CA HOST-BASED INTRUSION PREVENTION SYSTEM CA Host-Based Intrusion Prevention System r8 CA HOST-BASED INTRUSION PREVENTION SYSTEM (CA HIPS) BLENDS A STAND-ALONE FIREWALL WITH INTRUSION DETECTION
More informationUNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING
1 UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING Syllabus: Physical layer and overview of PL Switching: Multiplexing: frequency division multiplexing, wave length division multiplexing, synchronous
More informationUnified Application Delivery
The vision of a unified application delivery network gets more clear with F5 BIG-IP v10. White Paper by Lori MacVittie The Vision For every problem that arises out of the dust left behind as new technologies
More informationConcept as a Generalization of Class and Principles of the Concept-Oriented Programming
Computer Science Journal of Moldova, vol.13, no.3(39), 2005 Concept as a Generalization of Class and Principles of the Concept-Oriented Programming Alexandr Savinov Abstract In the paper we describe a
More informationDesign Principles : Fundamentals of Computer Networks Bill Nace
Design Principles 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia No Paper Review for today
More information