Smart Surveillance Systems

Author(s):  
L. J. M. Rothkrantz

To enable effective and efficient command and control in military operations it is necessary to have full awareness of all the actions in the field. In traditional C2 systems, human operators play key roles varying from observation in the field up to semantic interpretation of observed data in the Command and Control Centre. Networks are mainly used to transmit data between different components of the network. Observation by human operators will be replaced by sensor networks. The huge amount of incoming data is far beyond the capacity of operators, so the heterogeneous, multimodal data from the different sensor systems has to be fused, aggregated, and filtered. Automated surveillance sensor networks are discussed in this chapter. Sensors are modelled as a distributed system of smart agents. Methods and technology from Artificial Intelligence such as expert systems, semantic networks, and probabilistic reasoning is used to give a semantic interpretation of the sensed data from the environment.

Biometrics ◽  
2017 ◽  
pp. 1619-1642
Author(s):  
L. J. M. Rothkrantz

To enable effective and efficient command and control in military operations it is necessary to have full awareness of all the actions in the field. In traditional C2 systems, human operators play key roles varying from observation in the field up to semantic interpretation of observed data in the Command and Control Centre. Networks are mainly used to transmit data between different components of the network. Observation by human operators will be replaced by sensor networks. The huge amount of incoming data is far beyond the capacity of operators, so the heterogeneous, multimodal data from the different sensor systems has to be fused, aggregated, and filtered. Automated surveillance sensor networks are discussed in this chapter. Sensors are modelled as a distributed system of smart agents. Methods and technology from Artificial Intelligence such as expert systems, semantic networks, and probabilistic reasoning is used to give a semantic interpretation of the sensed data from the environment.


2012 ◽  
Vol 12 (3) ◽  
pp. 555-573 ◽  
Author(s):  
M. Hammitzsch ◽  
M. Lendholt ◽  
M. Á. Esbrí

Abstract. The command and control unit's graphical user interface (GUI) is a central part of early warning systems (EWS) for man-made and natural hazards. The GUI combines and concentrates the relevant information of the system and offers it to human operators. It has to support operators successfully performing their tasks in complex workflows. Most notably in critical situations when operators make important decisions in a limited amount of time, the command and control unit's GUI has to work reliably and stably, providing the relevant information and functionality with the required quality and in time. The design of the GUI application is essential in the development of any EWS to manage hazards effectively. The design and development of such GUI is performed repeatedly for each EWS by various software architects and developers. Implementations differ based on their application in different domains. But similarities designing and equal approaches implementing GUIs of EWS are not quite harmonized enough with related activities and do not exploit possible synergy effects. Thus, the GUI's implementation of an EWS for tsunamis is successively introduced, providing a generic approach to be applied in each EWS for man-made and natural hazards.


2005 ◽  
Vol 8 (1) ◽  
pp. 149-172
Author(s):  
Taeyoung Yoon

This article seeks to examine the development of the ROK-U.S. combined command and control system and crisis management procedures in South Korea. In particular, it explores the four crises which occurred between 1968 and 1999 in order to identify its implications for the ROK-U.S. combined crisis management. During a crisis, command and control over the armed forces are critical issues, in order to co-ordinate military movements and alert operations in the context of overall crisis objectives. Within the ROK-U.S. alliance, the ROK command and control chain of armed forces was highly integrated with the command and control chains of the UNC until 1978 and with the CFC from 1978. This CFC combined command structure has enabled the ROK to participate in the chain of operational control of its own forces and to strengthen its position in the ROK-U.S. combined crisis management procedures. Although both co-operated closely to cope with Korean crises in the past, there were some tensions in the use of military force and in the co-ordination of the detailed operational dimension of military operations. However, it can be argued that as long as the ROK crisis objectives and strategy were achieved through a consensus of alliance crisis options, these arrangements provided an effective crisis management system for ROK to resolve Korean crises. To some extent, the combined crisis management system enabled ROK to use America's massive military and intelligence capabilities to deter North Korea and to manage crises effectively. In the face of an era of transition and transformation in the ROK-U.S. alliance relationships following the September 11 2001, the ROK and U.S. need to minimise potential negative effects on combined crisis management system and maintain coherent deterrence capability and alliance stability on the Korean peninsula.


2019 ◽  
pp. 1050-1079
Author(s):  
J. Sigholm

Emerging information and communications technology has had significant importance for military operations during the last decades. Development within such technology areas as sensors, computers, and wireless communications has allowed for faster and more efficient collection, transmission, storage, processing, analysis, and distribution of data. This has led to new and improved military capabilities within command and control, intelligence, targeting, and logistics. However, the increased complexity and interdependencies of networked systems, the continuously growing amounts of data, changing non-technical requirements, and evolving adversary threats makes upholding cyber security in command and control systems a challenging task. Although some best-practice approaches have been developed, finding good solutions for protecting critical infrastructure and important information assets is still an open research question requiring an interdisciplinary approach. This chapter describes recent developments within emerging network technology for command and control, and suggests focus areas where further research is needed in order to attain sufficient operational effect from the employed systems. While a gradual and evolutionary progress of military cyber security has been seen, a long-term commitment is required within such areas as procurement, standardization, training, doctrinal, and legal development, in order to achieve military utility of command and control systems.


Author(s):  
Ericka Rovira ◽  
Kathleen McGarry ◽  
Raja Parasuraman

The effectiveness of automated decision aids used by human operators in command and control systems may depend not only on automation reliability, but also on the type (stage) and level the automated support provides. Automation can be applied to information acquisition, information integration and analysis, decision choice selection, or action implementation (Parasuraman, Sheridan, & Wickens, 2000). The present study examined the effects of variations in the stage of automation support on performance in a “Sensor to Shooter” targeting simulation of command and control. Independent variables included the type and level of automation support (complete listing, priority listing, top choices, and recommendation of decision choice) and the reliability of the automation (60% and 80%). Dependent variables included accuracy and reaction time of target engagement decisions. Compared to manual performance, reliable automation did not affect the accuracy of target engagement decisions but did significantly reduce decision times. When the automation was unreliable, under the higher reliability condition (80%) there was a greater cost in accuracy performance for higher levels of automation aiding (priority listing, top choice, and recommendation) than at a lower level (complete listing). The results support the view that automation unreliability has a greater performance cost for decision automation than for information automation. This performance cost generalizes across a number of different forms of decision-aiding.


2005 ◽  
Vol 8 (3) ◽  
pp. 147-155 ◽  
Author(s):  
Damian Green ◽  
Neville Stanton ◽  
Guy Walker ◽  
Paul Salmon

Author(s):  
Alessandro Zocco ◽  
Matteo D. Zocco ◽  
Antonella Greco ◽  
Salvatore Livatino ◽  
Lucio Tommaso De Paolis

Sign in / Sign up

Export Citation Format

Share Document