Listing 1 - 8 of 8 |
Sort by
|
Choose an application
Cyber-physical systems (CPS) involve deeply integrated, tightly coupled computational and physical components. These systems, spanning multiple scientific and technological domains, are highly complex and pose several fundamental challenges. They are also critically important to society’s advancement and security. The design and deployment of the adaptable, reliable CPS of tomorrow requires the development of a basic science foundation, synergistically drawing on various branches of engineering, mathematics, computer science, and domain specific knowledge. This book brings together 19 invited papers presented at the Workshop on Control of Cyber-Physical Systems, hosted by the Department of Electrical & Computer Engineering at The Johns Hopkins University in March 2013. It highlights the central role of control theory and systems thinking in developing the theory of CPS, in addressing the challenges of cyber-trust and cyber-security, and in advancing emerging cyber-physical applications ranging from smart grids to smart buildings, cars and robotic systems. .
Engineering. --- Systems theory. --- Control. --- Systems Theory, Control. --- Mechanical Engineering --- Engineering & Applied Sciences --- Mechanical Engineering - General --- Construction --- System theory. --- Control engineering. --- Control theory --- System theory --- Embedded Internet devices. --- Embedded networking hardware --- Internet-based embedded devices --- Embedded computer systems --- Internet of things --- Control and Systems Theory. --- Systems, Theory of --- Systems science --- Science --- Control engineering --- Control equipment --- Engineering instruments --- Automation --- Programmable controllers --- Philosophy
Choose an application
Cyber-physical systems (CPS) involve deeply integrated, tightly coupled computational and physical components. These systems, spanning multiple scientific and technological domains, are highly complex and pose several fundamental challenges. They are also critically important to society’s advancement and security. The design and deployment of the adaptable, reliable CPS of tomorrow requires the development of a basic science foundation, synergistically drawing on various branches of engineering, mathematics, computer science, and domain specific knowledge. This book brings together 19 invited papers presented at the Workshop on Control of Cyber-Physical Systems, hosted by the Department of Electrical & Computer Engineering at The Johns Hopkins University in March 2013. It highlights the central role of control theory and systems thinking in developing the theory of CPS, in addressing the challenges of cyber-trust and cyber-security, and in advancing emerging cyber-physical applications ranging from smart grids to smart buildings, cars and robotic systems. .
Choose an application
Despite its global advantages, the North Atlantic Treaty Organization (NATO)'s current deterrent posture in the Baltic states is militarily weak and generally questionable. A Russian invasion there would almost surely capture some or all of those states' capital cities within a few days, presenting NATO with a fait accompli. The United States is currently considering tailored deterrence strategies, including options to use nuclear weapons to deter Russian aggression in the Baltic states. This report examines what role nonstrategic nuclear weapons could play in deterring such an invasion. As part of that analysis, the authors review relevant deterrence theory and current NATO and Russian nuclear and conventional force postures in Europe. They draw on wargame exercises and qualitative modeling to characterize the potential outcomes if NATO, Russia, or both employ nonstrategic nuclear weapons during a war in the Baltic states. The authors then discuss implications for using such weapons to deter a Russian invasion. The insights derived from the research highlight the reality that, even if NATO makes significant efforts to modernize its nonstrategic nuclear weapons, it would have much stronger military incentives to end a future war than Russia would. That is, Russia would still enjoy escalation dominance.
Choose an application
This report presents a framework for the development of metrics—and a method for scoring them—that indicates how well a U.S. Air Force mission or system is expected to perform in a cyber-contested environment. These metrics are developed so as to be suitable for informing acquisition decisions during all stages of weapon systems' life cycles. There are two types of cyber metrics: working-level metrics to counter an adversary's cyber operations and institutional-level metrics to capture any cyber-related organizational deficiencies. The cyber environment is dynamic and complex, the threat is ubiquitous (in peacetime and wartime, deployed and at home), and no set of underlying "laws of nature" govern the cyber realm. A fruitful approach is to define cyber metrics in the context of a two-player cyber game between Red (the attacking side) and Blue (the side trying to ensure a mission). The framework helps, in part, to reveal where strengths in one area might partially offset weaknesses in another. Additional discussions focus on how those metrics can be scored in ways that are useful for supporting decisions. The metrics are aimed at supporting program offices and authorizing officials in risk management and in defining requirements, both operational requirements as well as the more detailed requirements for system design used in contracts, the latter often referred to as derived requirements.
Choose an application
The 2019 National Defense Authorization Act mandated a study on artificial intelligence (AI) topics. In this report, RAND Corporation researchers assess the state of AI relevant to the U.S. Department of Defense (DoD), and address misconceptions about AI; they carry out an independent and introspective assessment of the Department of Defense's posture for AI; and they share a set of recommendations for internal actions, external engagements, and potential legislative or regulatory actions to enhance the Department of Defense's posture in AI.
Choose an application
RAND researchers explored the capabilities and limitations of future weapon systems incorporating artificial intelligence and machine learning (AI/ML) through two wargame experiments. The researchers modified and augmented the rules and engagement statistics used in a commercial tabletop wargame to enable (1) remotely operated and fully autonomous combat vehicles and (2) vehicles with AI/ML–enabled situational awareness to show how the two types of vehicles would perform in company-level engagements between Blue (U.S.) and Red (Russian) forces. Those rules sought to realistically capture the capabilities and limitations of those systems, including their vulnerability to selected enemy countermeasures, such as jamming. Future work could improve the realism of both the gameplay and representation of AI/ML–enabled systems. In this experiment, participants played two games: a baseline game and an AI/ML game. Throughout play in the two game scenarios, players on both sides discussed the capabilities and limitations of the remotely operated and fully autonomous systems and their implications for engaging in combat using such systems. These discussions led to changes in how the systems were employed by the players and observations about which limitations should be mitigated before commanders were likely to accept a system and which capabilities needed to be fully understood by commanders so that systems could be employed appropriately. This research demonstrated how such games, by bringing together operators and engineers, could be used by the requirements and acquisition communities to develop realizable requirements and engineering specifications for AI/ML systems.
Choose an application
Artificial intelligence (AI) technologies hold the potential to become critical force multipliers in future armed conflicts. The People's Republic of China has identified AI as key to its goal of enhancing its national competitiveness and protecting its national security. If its current AI plan is successful, China will achieve a substantial military advantage over the United States and its allies. That has significant negative strategic implications for the United States. How much of a lead does the United States have, and what do the United States and the U.S. Air Force (USAF) need to do to maintain that lead? To address this question, the authors conducted a comparative analysis of U.S. and Chinese AI strategies, cultural and structural factors, and military capability development, examining the relevant literature in both English and Chinese. They looked at literature on trends and breakthroughs, business concerns, comparative cultural analysis, and military science and operational concepts. The authors found that the critical dimensions for the U.S. Department of Defense (DoD) involve development and engineering for transitioning AI to the military; advances in validation, verification, testing, and evaluation; and operational concepts for AI. Significantly, each of these dimensions is under direct DoD control.
Choose an application
The acquisition process for a new weapon system involves developing a set of technical requirements - a set of statements or models defining what a system should do and how well it should do it - for the system's design to ensure that the system provides the needed operational capability within budget and schedule constraints. However, oversights during this process can result in cost or schedule overruns, unsuitable operational performance, or outright cancellation. The U.S. Department of the Air Force (DAF) asked RAND Project AIR FORCE to develop an approach to help improve DAF's technical requirements development process. To do so, the authors consulted policies and the literature, held discussions with DAF stakeholders and subject-matter experts, conducted two case studies, and assessed various tools that might assist development of technical requirements. This report describes the resulting approach, which has been informed by systems-based methods and tools, and includes an exploration of the applicability and feasibility of one specific emerging hazard-analysis tool: system-theoretic process analysis (STPA).
Systems engineering. --- Engineering mathematics. --- United States. --- Procurement. --- Weapons systems.
Listing 1 - 8 of 8 |
Sort by
|