PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2014, 909601 (2014) https://doi.org/10.1117/12.2074480
This PDF file contains the front matter associated with SPIE Proceedings Volume 9096 including the Title Page, Copyright information, Table of Contents, Introduction, and Conference Committee listing.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2014, 909602 (2014) https://doi.org/10.1117/12.2050224
With an increasing demand for spectrum, dynamic spectrum access (DSA) has been proposed as viable means for providing the flexibility and greater access to spectrum necessary to meet this demand. Within the DSA concept, unlicensed secondary users temporarily "borrow" or access licensed spectrum, while respecting the licensed primary user's rights to that spectrum. As key enablers for DSA, cognitive radios (CRs) are based on software-defined radios which allow them to sense, learn, and adapt to the spectrum environment. These radios can operate independently and rapidly switch channels. Thus, the initial setup and maintenance of cognitive radio networks are dependent upon the ability of CR nodes to find each other, in a process known as rendezvous, and create a link on a common channel for the exchange of data and control information. In this paper, we propose a novel rendezvous protocol, known as QLP, which is based on Q-learning and the p-persistent CSMA protocol. With the QLP protocol, CR nodes learn which channels are best for rendezvous and thus adapt their behavior to visit those channels more frequently. We demonstrate through simulation that the QLP protocol provides a rendevous capability for DSA environments with different dynamics of PU activity, while attempting to achieve the following performance goals: (1) minimize the average time-to-rendezvous, (2) maximize system throughput, (3) minimize primary user interference, and (4) minimize collisions among CR nodes.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2014, 909604 (2014) https://doi.org/10.1117/12.2049924
Procurement and design of system architectures capable of network centric operations demand for an assessment scheme in order to compare different alternative realizations. In this contribution an assessment method for system architectures targeted at the C4ISR domain is presented. The method addresses the integration capability of software systems from a complex and distributed software system perspective focusing communication, interfaces and software. The aim is to evaluate the capability to integrate a system or its functions within a system-of-systems network. This method uses approaches from software architecture quality assessment and applies them on the system architecture level. It features a specific goal tree of several dimensions that are relevant for enterprise integration. These dimensions have to be weighed against each other and totalized using methods from the normative decision theory in order to reflect the intention of the particular enterprise integration effort. The indicators and measurements for many of the considered quality features rely on a model based view on systems, networks, and the enterprise. That means it is applicable to System-of-System specifications based on enterprise architectural frameworks relying on defined meta-models or domain ontologies for defining views and viewpoints. In the defense context we use the NATO Architecture Framework (NAF) to ground respective system models. The proposed assessment method allows evaluating and comparing competing system designs regarding their future integration potential. It is a contribution to the system-of-systems engineering methodology.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2014, 909605 (2014) https://doi.org/10.1117/12.2049559
Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures – proximity and risk – and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject’s mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2014, 909606 (2014) https://doi.org/10.1117/12.2050802
The efficiency of military mobile network operations at the tactical edge is challenging due to the practical Disconnected, Intermittent, and Limited (DIL) environments at the tactical edge which make it hard to maintain persistent end-to-end wireless network connectivity. Opportunistic mobile networks are hence devised to depict such tactical networking scenarios. Social relations among warfighters in tactical opportunistic mobile networks are implicitly represented by their opportunistic contacts via short-range radios, but were inappropriately considered as stationary over time by the conventional wisdom. In this paper, we develop analytical models to probabilistically investigate the temporal dynamics of this social relationship, which is critical to efficient mobile communication in the battlespace. We propose to formulate such dynamics by developing various sociological metrics, including centrality and community, with respect to the opportunistic mobile network contexts. These metrics investigate social dynamics based on the experimentally validated skewness of users’ transient contact distributions over time.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2014, 909607 (2014) https://doi.org/10.1117/12.2053133
This paper explores challenges in implementing an end-to-end communications architecture for Condition-Based Maintenance Plus (CBM+) data transmission which aligns with the Army's Network Modernization Strategy. The Army's Network Modernization strategy is based on rolling out network capabilities which connect the smallest unit and Soldier level to enterprise systems. CBM+ is a continuous improvement initiative over the life cycle of a weapon system or equipment to improve the reliability and maintenance effectiveness of Department of Defense (DoD) systems. CBM+ depends on the collection, processing and transport of large volumes of data. An important capability that enables CBM+ is an end-to-end network architecture that enables data to be uploaded from the platform at the tactical level to enterprise data analysis tools. To connect end-to-end maintenance processes in the Army's supply chain, a CBM+ network capability can be developed from available network capabilities.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2014, 90960A (2014) https://doi.org/10.1117/12.2059323
We report GeTe-based phase change material RF switches with on-state resistance of 0.07 ohm*mm and off-state capacitance of 20 fF/mm. The RF switch figure-of-merit, Ron*Coff is comparable to RF MEMS ohmic switches. The PCM RF shunt and series switches were fabricated for the first time in a lateral FET configuration to reduce parasitics, different from the vertical via switches. In a shunt switch configuration, isolation of 30 dB was achieved up to 67 GHz with return loss of 15 dB. RF power handling was tested with ~10 W for series and 3 W for shunt configurations. Harmonic powers were suppressed more than 100 dBc at fundamental power of 1 W, for future tunable and reconfigurable RF technology.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Pavel Borodulin, Nabil El-Hinnawy, Ferdinand C. Kuss, Robert M. Young, Robert S. Howell, Mike Lee
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2014, 90960B (2014) https://doi.org/10.1117/12.2059324
A novel phase-change microelectronics technology is described to enable wideband reconfigurable RF systems and components for EW, RADAR and communications applications. This technology can lower the development time and cost of DoD systems for new missions by enabling factory or mission re-programmability. It can also support component redundancy in system architectures with little impact to system performance.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2014, 90960H (2014) https://doi.org/10.1117/12.2055259
The concept of operations (CONOPS) for unmanned maritime systems (UMS) continues to envision systems that are
multi-mission, re-configurable and capable of acceptable performance over a wide range of environmental and
contextual variability. Key enablers for these concepts of operation are an autonomy module which can execute
different mission directives and a mission payload consisting of re-configurable sensor or effector suites. This level of
modularity in mission payloads enables affordability, flexibility (i.e., more capability with future platforms) and
scalability (i.e., force multiplication). The modularity in autonomy facilitates rapid technology integration, prototyping,
testing and leveraging of state-of-the-art advances in autonomy research. Capability drivers imply a requirement to
maintain an open architecture design for both research and acquisition programs. As the maritime platforms become
more stable in their design (e.g. unmanned surface vehicles, unmanned underwater vehicles) future developments are
able to focus on more capable sensors and more robust autonomy algorithms. To respond to Fleet needs, given an
evolving threat, programs will want to interchange the latest sensor or a new and improved algorithm in a cost effective
and efficient manner. In order to make this possible, the programs need a reference architecture that will define for
technology providers where their piece fits and how to successfully integrate. With these concerns in mind, the US
Navy established the Unmanned Maritime Systems Reference Architecture (UMS-RA) Working Group in August 2011.
This group consists of Department of Defense and industry participants working the problem of defining reference
architecture for autonomous operations of maritime systems. This paper summarizes its efforts to date.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2014, 90960I (2014) https://doi.org/10.1117/12.2055262
Most of the motivations for open systems lie in the expectation of interoperability, sometimes referred to as “plug-and-play”. Nothing in the notion of “open-ness”, however, guarantees this outcome, which makes the increased interest in open architecture more perplexing. In this paper, we explore certain themes of open architecture. We introduce the concept of “windows of interoperability”, which can be used to align disparate portions of architecture. Such “windows of interoperability”, which concentrate on a reduced set of protocol and interface features, might achieve many of the broader purposes assigned as benefits in open architecture. Since it is possible to engineer proprietary systems that interoperate effectively, this nuanced definition of interoperability may in fact be a more important concept to understand and nurture for effective systems engineering and maintenance.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Keynote Session: Joint Session with Conferences 9096 and 9084
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2014, 90960K (2014) https://doi.org/10.1117/12.2055266
The Air Force Research Laboratory (AFRL) has postulated a new weapons concept known as Flexible Weapons to define and develop technologies addressing a number of challenges. Initial studies on capability attributes of this concept have been conducted and AFRL plans to continue systems engineering studies to quantify metrics against which the value of capabilities can be assessed. An important aspect of Flexible Weapons is having a modular “plug-n-play” hardware and software solution, supported by an Open Architecture and Universal Armament Interface (UAI) common interfaces. The modular aspect of Flexible Weapons is a means to successfully achieving interoperability and composability at the weapon level. Interoperability allows for vendor competition, timely technology refresh, and avoids costs by ensuring standard interfaces widely supported in industry, rather than an interface unique to a particular vendor. Composability provides for the means to arrange an open end set of useful weapon systems configurations. The openness of Flexible Weapons is important because it broadens the set of computing technologies, software updates, and other technologies to be introduced into the weapon system, providing the warfighter with new capabilities at lower costs across the life cycle. One of the most critical steps in establishing a Modular, Open Systems Architecture (MOSA) for weapons is the validation of compliance with the standard.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Proceedings Volume Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2014, 90960M (2014) https://doi.org/10.1117/12.2050366
The Robotics Collaborative Technology Alliance (RCTA) seeks to provide adaptive robot capabilities which move beyond traditional metric algorithms to include cognitive capabilities [1]. Research occurs in 5 main Task Areas: Intelligence, Perception, Dexterous Manipulation and Unique Mobility (DMUM), Human Robot Interaction (HRI), and Integrated Research (IR). This last task of Integrated Research is especially critical and challenging. Individual research components can only be fully assessed when integrated onto a robot where they interact with other aspects of the system to create cross-Task capabilities which move beyond the State of the Art. Adding to the complexity, the RCTA is comprised of 12+ independent organizations across the United States. Each has its own constraints due to development environments, ITAR, “lab” vs “real-time” implementations, and legacy software investments from previous and ongoing programs. We have developed three main components to manage the Integration Task. The first is RFrame, a data-centric transport agnostic middleware which unifies the disparate environments, protocols, and data collection mechanisms. Second is the modular Intelligence Architecture built around the Common World Model (CWM). The CWM instantiates a Common Data Model and provides access services. Third is RIVET, an ITAR free Hardware-In-The-Loop simulator based on 3D game technology. RIVET provides each researcher a common test-bed for development prior to integration, and a regression test mechanism. Once components are integrated and verified, they are released back to the consortium to provide the RIVET baseline for further research. This approach allows Integration of new and legacy systems built upon different architectures, by application of Open Architecture principles.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.