To see the other types of publications on this topic, follow the link: C4ISR; Architecture; Command and control system.

Journal articles on the topic 'C4ISR; Architecture; Command and control system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'C4ISR; Architecture; Command and control system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wang, Mingqian, and Shuai Cao. "A survey on C4ISR system architecture technique." Global Journal of Engineering and Technology Advances 2, no. 3 (2020): 054–66. https://doi.org/10.5281/zenodo.4467417.

Full text
Abstract:
With the rapid development of information technique, the warfare modes changes continuously, converting from &ldquo;Platform Centric Warfare&rdquo; to &ldquo;Network Centric Warfare&rdquo; gradually. C<sup>4</sup>ISR system becomes networking, service oriented and intelligent. C<sup>4</sup>ISR systems are required to possess higher capability of situation awareness and coordination decision-making due to the integrative joint operations. In this paper, C<sup>4</sup>ISR systems are studied comprehensively. The development and main technique of C<sup>4</sup>ISR are outlined, and the current research states of its architecture are reviewed in detail. Finally, the major problems confronting in the research are summarized
APA, Harvard, Vancouver, ISO, and other styles
2

McCoy, M. S. "System of systems force structure optimisation." Aeronautical Journal 110, no. 1109 (2006): 457–62. http://dx.doi.org/10.1017/s0001924000001354.

Full text
Abstract:
Abstract A system of systems study plan was developed and a prototype was executed to optimise a recommended military force structure. This methodology defined the optimal force structure, using constrained optimisation to reflect budget limitations and desired mission performance. The force structure included surface and air assets, a command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) architecture, and a recommended logistics infrastructure. A second aspect of the study plan defined the total acquisition strategy, which accounted for: retiring legacy assets, extending the service life of existing assets until new replacements became available, and acquiring new assets for deployment, within the budget allocation. This methodology combined various modeling and simulation techniques to meet three study objectives. First, a nonlinear mixed integer programming model maximised performance, subject to cost constraints, cost as an independent variable (CAIV). Second, a dynamic programming model scheduled the transition from the legacy force structure to the future force, defined by the previous modeling technique. Third, a process simulation model simulated performance, over a one-year time period, for 25 areas of responsibility and five missions. This model verified performance estimates generated by the previous models.
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Yifan, Hong-Zhong Huang, and Tingyu Zhang. "Reliability Analysis of C4ISR Systems Based on Goal-Oriented Methodology." Applied Sciences 11, no. 14 (2021): 6335. http://dx.doi.org/10.3390/app11146335.

Full text
Abstract:
Hard-and-software integrated systems such as command and control systems (C4ISR systems) are typical systems that are comprised of both software and hardware, the failures of such devices result from complicated common cause failures and common (or shared) signals that make classical reliability analysis methods will be not applicable. To this end, this paper applies the Goal-Oriented (GO) methodology to detailed analyze the reliability of a C4ISR system. The reliability as well as the failure probability of the C4ISR system, are reached based on the GO model constructed. At the component level, the reliability of units of the C4ISR system is computed. Importance analysis of failures of such a system is completed by the qualitative analysis capability of the GO model, by which critical failures of hardware failures like communication module failures and motherboard module failures as well as software failures like network module application software failures and decompression module software failures are ascertained. This method of this paper contributes to the reliability analysis of all hard-and-software integrated systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Hordiichuk, Valerii, Petro Snitsarenko, Nina Andriianova, Bohdan Molodetskyi, and Yevhenii Kapran. "ADVANCED INFORMATION TECHNOLOGIES (C4ISR) IN THE PEACEKEEPING FIELD SERVICE." Advanced Information Systems 8, no. 4 (2024): 93–102. http://dx.doi.org/10.20998/2522-9052.2024.4.12.

Full text
Abstract:
Using and developing advanced information technologies are significant in the peacekeeping field service, as it could positively affect on mission implementation, decision-making, and even save lives. The purpose of the research is to analyze progressive field mission information technologies used in peace and security operations. Methods: the study is based on the use of empirical scientific methods of observation and study, based on the experience of personal participation in a UN peacekeeping mission, as well as general scientific methods, methods of OSINT analysis, etc. The tasks of the study are to analyze and summarize the main advanced technological solutions implemented in the activities of UN field peacekeeping missions in the area of C4ISR (the concept of command, control, communications, computers, intelligence, surveillance and reconnaissance). Results of the research indicate that peacekeeping missions differ from combat missions in the way they are conducted. The principle of protection, communication and reconnaissance is not the same; the integrated use of a variety of technologies has created a state-of-the-art information management system for UN peacekeeping operations. Conclusions: this study contributes to the peacekeeping field, information technologies sphere, by providing valuable information based on the personal practical experience, thereby aiding researchers and practitioners in selecting the most suitable tools for of command, control, communications, computers, intelligence, surveillance, and reconnaissance during peacekeeping mission. The information in the paper may be used to guide the planning and organization of communication and informatization systems in operations and missions of both as for multinational and as for homogeneous force units.
APA, Harvard, Vancouver, ISO, and other styles
5

Mattila, Juha, and Simon Parkinson. "Evolution of military information management." Zeszyty Naukowe Akademii Sztuki Wojennej 105, no. 4 (2017): 188–207. http://dx.doi.org/10.5604/01.3001.0010.3531.

Full text
Abstract:
The paper focuses on information dimension in the structure of Information and Communication Technology architecture and searches for better models to describe the structure of blue force information, especially from Enterprise Architecture (EA) approach. Enterprise Architecture has been developed better to communicate the complex structures of military capabilities. Major EA frameworks (TOGAF, DODAF, NAF) recognize the layer of information between business and technology. Nevertheless, in practice, the focus tends to turn more to the technology as has happened in several Command, Control, Communications, Computing, Information, Surveillance, and Reconnaissance (C4ISR) or Enterprise Resource Management (ERM) programs. The paper develops a tool for architects to use in measuring the maturity of information management in the current military organization and in defining the possible paths of evolution in information management available for military. The outcome is a roadmap that describes the evolution of past and probable future for military information management and explains different drivers and constraints on roads. The roadmap is tested against experiences gained from several C4ISR, and ERM focused military transformations. The overall research approach is following the hypothetico-deductive model, and the roadmap part is applying the theory of evolution in sociotechnical systems. Since information is essential for cognitive level sense making, decision making, and learning, Enterprise Architects should include information maturity in their roadmaps of technical and business process development. The roadmap for military information management is to help the analysing of the current situation and provide possible paths towards future stages aligned through business, information, and technical layers.
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Jie, Xue Min Zhang, Tao Ge, and Hai Tao Sun. "Research on Command & Control Simulation System Architecture." Applied Mechanics and Materials 347-350 (August 2013): 643–47. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.643.

Full text
Abstract:
The Key Problem of Command&amp;Control Simulation is to solve how to communicate between Command&amp;Control information and operation models of simulation system. Aiming at such problem, the BML and BOM technical are used together. Meanwhile, both models are presented in XML. Thus the Command&amp;Control Simulation System Framework is built. At the same time , the basic solution thought for the key problems during the building of the simulation system has been put forward .
APA, Harvard, Vancouver, ISO, and other styles
7

Tang, Xue Song, Qing Hua Meng, Zhi Hong Dong, and Da Guang Lou. "Command and Control System Executable Modeling Researching." Advanced Materials Research 629 (December 2012): 864–67. http://dx.doi.org/10.4028/www.scientific.net/amr.629.864.

Full text
Abstract:
We proceed from the perspective of object-oriented analysis and design modeling, focusing on the model design of command and control automation system, using Colored Petri Net (CPN) to a command and control systems for dynamic design and simulation run. A method of mapping from UML product can be used for logical, behavioral and performance aspects of architecture evaluation methods of CPN executable models is proposed. We first descript the command and control system for UML modeling generally, and then elaborate the process from UML products are mapped to the CPN build executable model of the command and control system.
APA, Harvard, Vancouver, ISO, and other styles
8

TĂNASE (MĂXINEANU), Lavinia Elena, and Roxana MANEA (ALEXANDRU). "C5ISR-D – APPLICABILITY OF THE CONCEPT IN NAVAL FORCES." INTERNATIONAL SCIENTIFIC CONFERINCE "STRATEGIESXXI" 18, no. 1 (2022): 292–98. http://dx.doi.org/10.53477/2971-8813-22-34.

Full text
Abstract:
C5ISR is an acronym that stands for command, control, communications, combat systems, intelligence, surveillance, and reconnaissance. It plays a vital role in both combat missions and military operations by supplying real-time information to military forces so that they can make the necessary decisions while they are engaged in combat. This article aims to analyze how C5ISR systems may be effectively integrated onboard maritime platforms such as ships or submarines, including shore-based command centers, in order to enhance mission effectiveness. Incorporating artificial intelligence into the decision-making process (D), planners will be provided with optimal solutions for establishing mission objectives and priorities, as well as the most effective means of achieving them. The first aspect that will be covered, is a description of C2 architecture, which is really the foundation for C4ISR, C5ISR, and even C6ISR. Following, we connected this essential debate into a summarization of the differences between the aforementioned systems, providing answers regarding their implications, meaning, and constant upgrading. Throughout this study, after a process of data collection and analysis, we will also enumerate some of the major players in the C5ISR Market and mention a few technical systems that are already present in the maritime operational environment.
APA, Harvard, Vancouver, ISO, and other styles
9

Sheng, Lei, Lun Li, Hanbao Wu, and Peng Wang. "Target Threat Assessment in Air Combat with BP Neural Network for UAV." Journal of Physics: Conference Series 2506, no. 1 (2023): 012010. http://dx.doi.org/10.1088/1742-6596/2506/1/012010.

Full text
Abstract:
Abstract Target threat assessment is the most important element in command control communication and computer intelligence surveillance reconnaissance (C4ISR) system which is the key function in air combat situation analysis and can select the most valuable target to the commander. A threat assessment model of multi-UAV platform cooperative engagement built based on back propagate neural network (BPNN) is present in this paper, which provides a machine learning method for the threat assessment. The BPNN target threat assessment model has six input nodes, 10 hide nodes and 1 output node, which can fit the complicated nonlinear relationship between threat value and target behavior state. Simulation experiment is executed to verify the accuracy of the proposed BPNN target threat assessment method, and the result shows that the method is effective and can be applied to the real air combat.
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Ying Chun, Jian Yang, Yun Tao Zhao, Yue Dai, and Feng Yun Li. "The Research on Modeling Architecture of Command and Control System Based on SOA." Advanced Materials Research 926-930 (May 2014): 1468–71. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.1468.

Full text
Abstract:
The paper researched modeling methods for Architecture of Command and Control System Based on SOA and respectively established organization model, communication model, function model, and information model that can provide solutions and reference to the problems such as business services, communication standard, protocol unified that occur in the process of architecture of Command and Control System Based on SOA.
APA, Harvard, Vancouver, ISO, and other styles
11

Koo, Jahoon, Se-Ra Oh, Sang Hoon Lee, and Young-Gab Kim. "Security Architecture for Cloud-Based Command and Control System in IoT Environment." Applied Sciences 10, no. 3 (2020): 1035. http://dx.doi.org/10.3390/app10031035.

Full text
Abstract:
With the development of the fourth industrial technology, such as the Internet of Things (IoT) and cloud computing, developed countries including the U.S. are investigating the efficiency of national defense, the public sector and national innovation, and constructing the infrastructure for cloud computing environments through related policies. The Republic of Korea is enacting the related legislation and considering the fourth industrial technology in various fields. Particularly, it is considering the adaptation of the cloud to the command and control system in the national defense sector; hence, related research and pilot projects are being conducted. However, if the existing information system is converted to a cloud computing system by introducing IoT devices, existing security requirements cannot solve problems related to the security vulnerabilities of cloud computing. Therefore, to build a cloud-based secure command and control system, it is necessary to derive additional cloud computing-related security requirements that are lacking in the existing security requirements, and to build a secure national defense command and control system architecture based upon it. In this paper, we derive security requirements for a cloud-based command control system, propose a security architecture designed based thereupon, and implement a security architecture with an open-stack-based cloud platform, “OpenStack”.
APA, Harvard, Vancouver, ISO, and other styles
12

Tanaya, Prianggada Indra. "Preliminary Development of Subsumption Architecture Control for Automated Guided Vehicle." ROTASI 21, no. 4 (2019): 200. http://dx.doi.org/10.14710/rotasi.21.4.200-208.

Full text
Abstract:
Subsumption control architecture is an control architecture based on parallel system. Input of information of sensors is directly connected through modules in the control system, and further the decision making is connected to actuators. Automated Guided Vehicle or AGV is an automated component within integrated manufacturing system. In this article, this control architecture will be designed and implemented to an AGV. Commands are designed based on Object-Oriented technology. The commands are arranged in subsumption, where a command higher subsumed other command of its lower level. GPFO (Greater Priority First Out) technique is implemed for executing the commands by using multi-threading. Experimentation is performed to have the characteristics of commands being executed. This work introduce our effort to design an operating system for an AGV.
APA, Harvard, Vancouver, ISO, and other styles
13

Wang, Xing Zhong. "Multi-Agent Based Modeling of Warship Combat Command and Control System." Applied Mechanics and Materials 246-247 (December 2012): 898–902. http://dx.doi.org/10.4028/www.scientific.net/amm.246-247.898.

Full text
Abstract:
To solving the inefficiency-problem in warship combat command and control system, this paper builds multi-agent oriented system architecture. It uses CORBA to support communication among heterogeneous systems and uses UML to design system prototype. Taking our two warships chasing an enemy-warship collaboratively for example, this paper illustrates the agent-oriented modeling process, including the role model, interaction model, state model and class model. This approach is able to meet the needs of modeling the warship combat command and control system.
APA, Harvard, Vancouver, ISO, and other styles
14

Shang, Hui Ping, Ying Jia, and Jian Xing Wang. "An Integrated Architecture for Satellite Control Center System." Advanced Materials Research 951 (May 2014): 269–73. http://dx.doi.org/10.4028/www.scientific.net/amr.951.269.

Full text
Abstract:
This paper presents a layered and integrated approach to the SCC system in TT&amp;C area. The SCC system is developed to encapsulate this approach. A four-layer hierarchy is proposed for the SCC system among the following layers: user agent layer, application process layer, lower layer services and support, and hardware. The SCC system includes nine functional components: monitoring and control, data display, command operation, data processing, data storage and management, orbit calculation and analysis, interface computer software, duplex management and time service. The SCC system is implemented as five functional subsystems: data processing system, database management system, operation and control system, and interface computer system. Details of the overall system architecture and the integration of the above components and subsystems are included in the paper.
APA, Harvard, Vancouver, ISO, and other styles
15

Kitowski, Zygmunt. "System Architecture of Mission Planning and Autonomous Surface Vessel Control." Solid State Phenomena 210 (October 2013): 252–57. http://dx.doi.org/10.4028/www.scientific.net/ssp.210.252.

Full text
Abstract:
The paper presents system architecture of mission planning and autonomous surface vehicle (ASV) "Edredon" control. The modular structure of the system makes possible realization of many tasks related to an ASV management. Due to appropriate configuration of its modules, it can perform such tasks as: mission planning on the command post, autonomous control of an ASV, as well as to serve as a training simulator for operators training and a simulator for ASVs control algorithms evaluation.
APA, Harvard, Vancouver, ISO, and other styles
16

POPA, Cezar. "MODULAR COMMAND AND CONTROL STRUCTURES AND FORCE ORGANIZATION USABLE IN OPERATIONS AT HIGH ALTITUDES." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 10, no. 4 (2022): 96–111. http://dx.doi.org/10.53477/2284-9378-21-49.

Full text
Abstract:
Mountainous areas located at high altitudes, hardly accessible, are used as safe heavens and staging areas by various asymmetrical groups. Addressing these challenges in areas of operations located at high altitudes requires the existence of specific capabilities for command and control. C2 based on mission command must be adapted to the current requirements generated by conflicts with variable geometry, mosaic type conflicts, composite, multifaceted, multi-layered, multi-domain conflicts. Command and control systems should have architectural flexibility, intelligent digitised platforms and its modules should be perfectly functionall and interoperable (based on self-sufficiency ‒ extended capability to operate over time). We believe that, at high altitudes, the architecture of a complex command and control system must be modular and designed as a coherent integrator of sensors, decision-makers, performers and support capabilities, interconnected in subsystems that ensure the planning, preparation, execution and effective evaluation of military actions. In the conditions of diversification of risks and threats in the multidimensional operational environment, the architecture of the command and control systems must be permanently adapted in order to ensure real-time, horizontal and vertical communication between forces, support structures and command-control structures.&#x0D; &#x0D;
APA, Harvard, Vancouver, ISO, and other styles
17

Jian, Li. "Redundant architecture design and Human-machine system analysis of active side stick control system." Journal of Physics: Conference Series 2478, no. 10 (2023): 102019. http://dx.doi.org/10.1088/1742-6596/2478/10/102019.

Full text
Abstract:
Abstract This paper describes the advantages and disadvantages and principle of passive side stick and active side stick respectively. A redundant architecture of active side stick control system is proposed according to top-level function and safety requirements. The control unit with active-standby control channels, which has dissimilar command-monitoring hardware, can significantly improve the safety performance. Finally, the high angle of attack protection and high-speed protection of active side stick control system has been tested on one civil aircraft simulation platform, and it proves that the active side stick control system can effectively realize the tactile and warning function of envelope protection.
APA, Harvard, Vancouver, ISO, and other styles
18

Liao, Shu-hsien. "Case-based decision support system: Architecture for simulating military command and control." European Journal of Operational Research 123, no. 3 (2000): 558–67. http://dx.doi.org/10.1016/s0377-2217(99)00109-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

TOROI, George-Ion. "Rethinking military command and control systems." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, no. 4 (2025): 88–112. https://doi.org/10.53477/2284-9378-24-51.

Full text
Abstract:
The evolution of society and the new characteristics of armed conflict, as demonstrated in today’s wars, highlight the need to adapt the military system to meet current and future challenges. In an increasingly complex and contested operational environment, command and control systems must be the first priority in this endeavour because of their impact on all other components of the military domain. Moreover, the technologization of society and the increased transparency of the confrontational environment place additional pressure on ensuring the effective protection and functionality of command-and-control systems.This article explores the need to rethink the architecture and fundamentals of C2 systems, analysing the essential elements that support operational effectiveness: flexibility, modularity, survivability, small footprint and resilience. In the context of new multi-domain operational paradigms and accelerated technological progress, C2 adaptation involves the integration of emerging technologies such as artificial intelligence, automation and real-time response capabilities to optimize decision-making. In particular, it emphasizes the importance of modularity and redundancy to ensure the operation of systems under conditions of intense conflict, as well as reducing electromagnetic vulnerability and increasing mobility. The article’s conclusions propose practical solutions for adapting C2 systems organized around the four components of people, processes, technology systems and command posts, highlighting their essential role in achieving decision advantage, a critical element of operational success on the modern battlefield.
APA, Harvard, Vancouver, ISO, and other styles
20

Shahid, Muzna, Asad Ali, and Faheem Ashraf. "Integration of Hand Gesture and Voice Command Control for Smart Wheelchairs." International Journal of Emerging Engineering and Technology 3, no. 2 (2024): 24–28. https://doi.org/10.57041/cf3geg55.

Full text
Abstract:
The development of smart wheelchair systems has gained significant attention due to the increasing demand for assistive technologies that enhance the independence and mobility of individuals with disabilities. Traditional wheelchair control methods often limit the user’s ability to perform tasks with ease. This paper proposes an innovative dual-mode control system that integrates both hand gesture recognition and voice command technology to enable more intuitive, responsive, and adaptive control of wheelchairs. The proposed system combines the strengths of both gesture and voice recognition to provide a robust solution that adapts to the needs of users with various disabilities. A detailed description of the system architecture, implementation, and evaluation is provided.
APA, Harvard, Vancouver, ISO, and other styles
21

Wu, Luofang, Jianan Meng, and Wen Wang. "Construction of a flood control and drainage decision-making command systemA case study of Suzhou Industrial Park." Advances in Engineering Innovation 16, no. 1 (2025): None. https://doi.org/10.54254/2977-3903/2025.21543.

Full text
Abstract:
With the acceleration of urbanization, flood control and drainage management in cities are facing increasing challenges. As a nationally recognized model for effective flood control, Suzhou Industrial Park has experienced frequent extreme weather events in recent years, highlighting the urgent need for informatization in flood control and drainage management. This paper provides a detailed introduction to the design scheme of the flood control and drainage decision-making command information system for Suzhou Industrial Park, covering key aspects such as system requirement analysis, overall architecture, core technologies, and risk management. By integrating multi-source data, including meteorology, hydrology, waterlogging points, and the sewage pipeline network, the system establishes a comprehensive flood control and drainage decision-making platform featuring situational awareness, monitoring and early warning, and command and dispatching functions. The system aims to enhance the flood control and drainage capabilities of the park, ensure urban safety, and provide a reference for the informatization of flood management in other cities.
APA, Harvard, Vancouver, ISO, and other styles
22

Villani, Maria Luisa, Antonio De Nicola, Henri Bouma, et al. "A Modular Architecture of Command-and-Control Software in Multi-Sensor Systems Devoted to Public Security." Information 14, no. 3 (2023): 162. http://dx.doi.org/10.3390/info14030162.

Full text
Abstract:
Preventing terrorist attacks at soft targets has become a priority for our society. The realization of sensor systems for automatic threat detection in crowded spaces, such as airports and metro stations, is challenged by the limited sensing coverage capability of the devices in place due to the variety of dangerous materials, to the scanning rate of the devices, and to the detection area covered. In this context, effectiveness of the physical configuration of the system based on the detectors used, the coordination of the sensor data collection, and the real time data analysis for threat identification and localization to enable timely reactions by the security guards are essential requirements for such integrated sensor-based applications. This paper describes a modular distributed architecture of a command-and-control software, which is independent from the specific detectors and where sensor data fusion is supported by two intelligent video systems. Furthermore, the system installation can be replicated at different locations of a public space. Person tracking and later re-identification in a separate area, and tracking hand-over between different video components, provide the command-and-control with localization information of threats to timely activate alarm management and support the activity of subsequent detectors. The architecture has been implemented for the NATO-funded DEXTER program and has been successfully tested in a big city trial at a metro station in Rome both when integrated with two real detectors of weapons and explosives and as a stand-alone system. The discussion focuses on the software functions of the command-and-control and on the flexibility and re-use of the system in wider settings.
APA, Harvard, Vancouver, ISO, and other styles
23

Perju, V., I. Mastac, and A. Ameen. "MODERN MILITARY COMMAND AND CONTROL SYSTEMS AND THEIR SECURITY ENSURING BASED ON THE SDN TECHNOLOGY." POLISH JOURNAL OF SCIENCE, no. 69 (December 18, 2023): 45–50. https://doi.org/10.5281/zenodo.10400324.

Full text
Abstract:
In the article, a concept and architecture of a perspective military Command and Control (C2) system areproposed. Some effective algorithms and technologies for C2 systems security assuring based on cryptographythere were described. The new method of the military command and control systems security ensuring efficiencyassessment is described, based on using Petri Nets applications and a set of parameters such as the Reliability ofService, Defense Factor, Risk Factor, Modified Risk assessment, and the cost-effectiveness. An analytical comparison of the proposed parameters of the C2systems security assessment based on the suggested technologies andthe results of their simulation are presented.
APA, Harvard, Vancouver, ISO, and other styles
24

Bingham, Brian S., Jeffrey M. Walls, and Ryan M. Eustice. "Development of a Flexible Command and Control Software Architecture for Marine Robotic Applications." Marine Technology Society Journal 45, no. 3 (2011): 25–36. http://dx.doi.org/10.4031/mtsj.45.3.4.

Full text
Abstract:
AbstractThis paper reports the implementation of a supervisory control framework and modular software architecture built around the lightweight communication and marshalling (LCM) publish/subscribe message passing system. In particular, we examine two diverse marine robotics applications using this modular system: (i) the development of an unmanned port security vehicle, a robotic surface platform to support first responders reacting to transportation security incidents in harbor environments, and (ii) the adaptation of a commercial off-the-shelf autonomous underwater vehicle (the Ocean-Server Iver2) for visual feature-based navigation. In both cases, the modular vehicle software infrastructures are based around the open-source LCM software library for low-latency, real-time message passing. To elucidate the real-world application of LCM in marine robotic systems, we present the software architecture of these two successful marine robotic applications and illustrate the capabilities and flexibilities of this approach to real-time marine robotics. We present benchmarking test results comparing the throughput of LCM with the Mission-Oriented Operating Suite, another robot software system popular in marine robotics. Experimental results demonstrate the capacity of the LCM framework to make large amounts of actionable information available to the operator and to allow for distributed supervisory control. We also provide a discussion of the qualitative tradeoffs involved in selecting software infrastructure for supervisory control.
APA, Harvard, Vancouver, ISO, and other styles
25

Koo, Jahoon, Young-Gab Kim, and Sang Hoon Lee. "Design of Security Architecture for the Cloud-Based Korea Military Command and Control System." Journal of Korean Institute of Communications and Information Sciences 45, no. 2 (2020): 400–408. http://dx.doi.org/10.7840/kics.2020.45.2.400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Yongyong, Wei. "A Docker-based Operation and Maintenance Method for New-Generation Command and Control Systems." Journal of Physics: Conference Series 2460, no. 1 (2023): 012173. http://dx.doi.org/10.1088/1742-6596/2460/1/012173.

Full text
Abstract:
Abstract New-generation command and control systems face a number of problems in operation and maintenance, including different programming languages used for subsystems, complex environment configuration, and diverse data formats, leading to slow system deployment, various types of managed data, and difficult operation and maintenance. This paper proposes the use of the Docker containers to wrap the system, deploy the networked control system based on the encapsulated service processes and relevant environment configuration and dependencies, and build a Docker-based operation and maintenance model for command and control systems. As for the communication between containers, the mature RocketMQ architecture is adopted for interactions based on message buses. Container migration and restart are used to improve the deployment, operation and maintenance capabilities of the entire system. The design is realized and simulated on distributed machines. This paper explains relevant concepts, design ideas, and implementation pathways.
APA, Harvard, Vancouver, ISO, and other styles
27

Ayedi, Dorra, Maïssa Boujelben, and Chokri Rekik. "Hybrid Type-2 Fuzzy-Sliding Mode Controller for Navigation of Mobile Robot in an Environment Containing a Dynamic Target." Journal of Robotics 2018 (August 1, 2018): 1–10. http://dx.doi.org/10.1155/2018/8421848.

Full text
Abstract:
We are interested in developing a new control architecture to command a mobile robot in a partially known environment. For that purpose, a hybrid control architecture is adopted, combining the reactive and the deliberative method. The reactive method consists of the hierarchical fuzzy controllers based on Type-2 Fuzzy Logic System (T2-FLS), dedicated to commanding the robot towards a mobile target while avoiding unexpected obstacles. A comparative study is made to show the efficiency of T2-FLS against Type-1 Fuzzy Logic System (T1-FLS). Additionally, the used deliberative method is the sliding mode, allowing the robot to track the mobile goal trajectory. Simulation results are given finally to test the proposed architecture.
APA, Harvard, Vancouver, ISO, and other styles
28

Radulov, Ivo. "METHODS FOR DESCRIPTION, ANALYSIS AND EVALUATION OF COMMAND AND CONTROL SYSTEMS (C2)." ENVIRONMENT. TECHNOLOGY. RESOURCES. Proceedings of the International Scientific and Practical Conference 5 (June 8, 2025): 237–46. https://doi.org/10.17770/etr2025vol5.8475.

Full text
Abstract:
Every organization needs a clear understanding of its own processes, capabilities, products, technologies and relationships to effectively deliver its objectives in response to a changing environment. A clear understanding of the nature of management systems requires an integrated abstract representation of their multifaceted aspects through organisational modelling methods. When the system is complex, an approach that can provide a unified medium for representing all major functional and system perspectives is necessary for its comprehensive modelling. The purpose of this publication is to present an approach that provides an integration into one environment of organizational goals; policies, concepts, and doctrines; management systems; decision-making procedures; organizational structures, processes, information flows, and data; resources, capabilities, and technologies. In this approach, architecture refers to the fundamental organization of a system, which includes the system components, their relationships with each other and with the environment, and the principles that underlie system design and its development.
APA, Harvard, Vancouver, ISO, and other styles
29

Koskinen, Anne, and Jorma Jormakka. "Usability Monitoring – Extending Quality of Service Monitoring for Decision Making." Journal of Military Studies 1, no. 1 (2010): 68–99. http://dx.doi.org/10.1515/jms-2016-0173.

Full text
Abstract:
Abstract The paper presents a new concept, Usability Monitoring, and applies it for situational awareness applications in military Command, Control, Communication, Computers, Intelligence, Surveillance and Reconnaissance systems (C4ISR). Usability Monitoring means taking measurements of technical Quality of Service (QoS) parameters in end systems and comparing them to target values of reference cases. The concept differs from QoS monitoring in the goal and in the placement of measurement points: In QoS monitoring the goal is to verify that the network provides the promised service quality in the user system - network interface. QoS monitoring does not capture the actual end user experience, which is influenced also by the end system, and therefore it does not directly correspond to the service quality that a user sees. Usability Monitoring has exactly this goal. The Observe-Orient-Decide-Act-Loop (OODA) is a decision making concept that is widely used in the network-centric approach and it emphasizes fast decision making. The presented model for Usability Monitoring is based on the OODA-loop. It includes QoS measurements not only in the Act-phase, i.e., can the user perform the actions s/he wants or are there delays and losses that make the system less usable, but also in the Observe-phase, i.e., does the user get the information s/he subscribes to, and in the Orient-phase, i.e., does the user get confusing information and cannot orient, and also the Decide-phase, i.e. is the user able to make right decisions based on the previous steps. The measured technical QoS parameters are connected to user experience by Mean of Score (MOS) functions that are obtained by usability tests. A case study for partially evaluating the Usability Monitoring concept is from MNE5 MSA (Multinational Experimentation 5, Maritime Situational Awareness) Experimentation Event 3 that was conducted in partnership with the Navy Command Finland, Naval Warfare Centre of Sweden and NATO Allied Command Transformation (ACT) and the Singaporean Armed Forces (SAF) Future Systems Directorate. In the MNE5 MSA experimentation we were able to monitor end user experience, how the user sees the services and is able to work with the current tools and capabilities. In this article we describe how Usability Monitoring was addressed in the MNE5 MSA case study: meters for Usability Monitoring were selected and we investigated what aspects of usability affect the phases of the OODA-loop.
APA, Harvard, Vancouver, ISO, and other styles
30

Penizzotto, Franco, Sebastian García, Emanuel Slawiñski, and Vicente Mut. "Delayed Bilateral Teleoperation of Wheeled Robots including a Command Metric." Mathematical Problems in Engineering 2015 (2015): 1–13. http://dx.doi.org/10.1155/2015/460476.

Full text
Abstract:
This paper proposes a control scheme applied to the delayed bilateral teleoperation of wheeled robots with force feedback, considering the performance of the operator’s command execution. In addition, the stability of the system is analyzed taking into account the dynamic model of the master as well as the remote mobile robot under asymmetric and time-varying delays of the communication channel. Besides, the performance of the teleoperation system, where a human operator drives a 3D simulator of a wheeled dynamic robot, is evaluated. In addition, we present an experiment where a robot Pioneer is teleoperated, based on the system architecture proposed.
APA, Harvard, Vancouver, ISO, and other styles
31

Roopaei*, Mehdi, Hunter Durian, and Joey Godiska. "Explainable AI in Internet of Control System Distributed at Edge-Cloud Architecture." International Journal of Engineering and Advanced Technology 10, no. 3 (2021): 136–42. http://dx.doi.org/10.35940/ijeat.c2246.0210321.

Full text
Abstract:
Many current control systems are restricted to highly controlled environments. In complicated dynamic and unstructured environments such as autonomous vehicles, control systems must be able to deal with more and more complex state situations. In complex systems with large number of states, it is often too slow to use optimal planners and developing heuristic tactics for high level goals can be challenging. AI control is an attractive alternative to traditional control architectures due to their capability to approximate optimal solutions in high dimensional state spaces without requiring a human-designed heuristic. Explainable AI control attempts to produce a human readable control command which is both interpretable and manipulable. This paper is an attempt to propose an architecture for explainable AI control in edge-cloud environment in which there are connected autonomous agents that need to be controlled. In this architecture the designed controller is distributed across the edge and cloud platform using explainable AI. This architecture could be introduced as Internet of Control Systems (IoCS), which could be applied as distributed tactics to control of connected autonomous agents. The IoCS attempts to unleash AI services using resources at the edge near the autonomous agents and make intelligent edge for dynamic, adaptive, and optimized AI control.
APA, Harvard, Vancouver, ISO, and other styles
32

Mehdi, Roopaei, Durian Hunter, and Godiska Joey. "Explainable AI in Internet of Control System Distributed at Edge-Cloud Architecture." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 3 (2021): 136–24. https://doi.org/10.35940/ijeat.C2246.0210321.

Full text
Abstract:
Many current control systems are restricted to highly controlled environments. In complicated dynamic and unstructured environments such as autonomous vehicles, control systems must be able to deal with more and more complex state situations. In complex systems with large number of states, it is often too slow to use optimal planners and developing heuristic tactics for high level goals can be challenging. AI control is an attractive alternative to traditional control architectures due to their capability to approximate optimal solutions in high dimensional state spaces without requiring a human-designed heuristic. Explainable AI control attempts to produce a human readable control command which is both interpretable and manipulable. This paper is an attempt to propose an architecture for explainable AI control in edge-cloud environment in which there are connected autonomous agents that need to be controlled. In this architecture the designed controller is distributed across the edge and cloud platform using explainable AI. This architecture could be introduced as Internet of Control Systems (IoCS), which could be applied as distributed tactics to control of connected autonomous agents. The IoCS attempts to unleash AI services using resources at the edge near the autonomous agents and make intelligent edge for dynamic, adaptive, and optimized AI control.
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, Yu, Zongchun Wei, Haibo Bao, et al. "Intelligent support and command system based on WAPI terminal equipment." Journal of Physics: Conference Series 2113, no. 1 (2021): 012054. http://dx.doi.org/10.1088/1742-6596/2113/1/012054.

Full text
Abstract:
Abstract In order to solve the problem that the process of WAPI terminal connection is troublesome, this paper proposes an intelligent support and command system of WAPI terminal equipment based on centralized control AC + AP architecture. The system stores WAPI certificate on AC (centralized controller), WAPI terminal equipment is associated with AP (wireless access point), and AP equipment notifies AC of the associated events of the terminal, AC equipment and terminal equipment enter authentication and complete certificate authentication. Complete access authentication through AC and terminal equipment, and store the unicast and multicast keys generated by authentication negotiation on AC. This method is more convenient to maintain the certificate. At the same time, on the premise of ensuring the security of the certificate, it also improves the encryption and decryption efficiency and improves the user’s business experience.
APA, Harvard, Vancouver, ISO, and other styles
34

Al-Shareeda, Mahmood A., Ahmed Nader Jafer, Mohammed Tahseen Hashem, and Murtaza Salman Fajr. "Secure Offline Smart Office Automation System Using ESP32 and Bluetooth Control Architecture." Journal of Cyber Security and Risk Auditing 2024, no. 1 (2024): 3–13. https://doi.org/10.63180/jcsra.thestap.2024.1.2.

Full text
Abstract:
This paper describes the development and deployment of an affordable and secure smart office automation system which is completely offline and it use Bluetooth technology and ESP32 microcontroller. In situations where internet access is limited or security is of utmost concern, the system provides an app-based control over the office devices like lighting, blinds, door access and alert systems, in real- time. The design eliminates dependence on the cloud, which in turn mitigates security threats from the outside, meanwhile, local Bluetooth communication shortens response time and cuts power consumption. Primary security requirements are direct device linking, local command control and encryption-capable communication protocols. Experimental results substantiate quick response of devices (&lt;150) ms, low power consumption and robustness in the indoor range of Bluetooth (10 m). The device is designed to be modular to enable extension of the system itself including however not limited to environmental sensors, GUI based mobile applications and cutting edge authentication protocols. This paper presents proof to ant small-to-medium sized enterprises about the availability of a secure and offline smart office system which is cost-effective, user-friendly and immune against security threats from outside.
APA, Harvard, Vancouver, ISO, and other styles
35

Max, Ndoumbé Matéké, Njock Batake Emmanuel Eric, Nyobe Yomé Jean Maurice, et al. "Artificial intelligence-enhanced DTC command methods used for a four-wheel-drive system." International Journal of Power Electronics and Drive Systems (IJPEDS) 14, no. 4 (2023): 1983. http://dx.doi.org/10.11591/ijpeds.v14.i4.pp1983-1994.

Full text
Abstract:
This paper presents an artificial intelligence direct torque control (DTC) method for an electric vehicle (EV) drive system. The architecture of the proposed electric vehicle is that of four wheels each with an induction motor (IM). A comparative study of the different torque and speed controllers proposed in this paper is made. An electronic differential is used to control the speed of each wheel as well as a variable master-slave control (VMSC) for the management of the magnetic quantities because the motors on the same side are fed by the same converter. This study allows highlights the performance of the propulsion system in terms of dynamics and safety of the vehicle and better stability. The different controllers are implemented by the MATLAB/Simulink software and the simulation results obtained show better flexibility in the control of the vehicle. It is worth noting that direct torque control with fuzzy logic (DTFC) performs better than DTC associated with neural networks in terms of a time reduction increase of 1.47%, an overshoot of less than 5.33, and a static steady-state error close to zero.
APA, Harvard, Vancouver, ISO, and other styles
36

Ndoumbé, MatékéMax, Batake Emmanuel Eric Njock, Yomé Jean Maurice Nyobe, et al. "Artificial intelligence-enhanced DTC command methods used for a four-wheel-drive system." Artificial intelligence-enhanced DTC command methods used for a four-wheel-drive system 14, no. 4 (2023): 1983–94. https://doi.org/10.11591/ijpeds.v14.i4.pp1983-1994.

Full text
Abstract:
This paper presents an artificial intelligence direct torque control (DTC) method for an electric vehicle (EV) drive system. The architecture of the proposed electric vehicle is that of four wheels each with an induction motor (IM). A comparative study of the different torque and speed controllers proposed in this paper is made. An electronic differential is used to control the speed of each wheel as well as a variable master-slave control (VMSC) for the management of the magnetic quantities because the motors on the same side are fed by the same converter. This study allows highlights the performance of the propulsion system in terms of dynamics and safety of the vehicle and better stability. The different controllers are implemented by the MATLAB/Simulink software and the simulation results obtained show better flexibility in the control of the vehicle. It is worth noting that direct torque control with fuzzy logic (DTFC) performs better than DTC associated with neural networks in terms of a time reduction increase of 1.47%, an overshoot of less than 5.33, and a static steady-state error close to zero.
APA, Harvard, Vancouver, ISO, and other styles
37

Lu, Chen Hong, and Yue Li Hu. "Speech Control System for Robot Based on Raspberry Pi." Advanced Materials Research 791-793 (September 2013): 663–67. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.663.

Full text
Abstract:
Raspberry Pi is a credit card sized Linux computer based on ARM11 architecture. Because of its small size, low power consumption and powerful performance, a robot controller is a suitable role for it to play. As a robot with artificial intelligence, speech recognition for controlling the robot and voice feedback to users is key parts of the entire system. In this essay, a robot called Lisa is assembled, and a speech control and interactive system is implemented based on Google voice API which is a voice recognition engine provided as a cloud service. In order to analysis complex voice commands, a semantic method is developed to catch key words from command sentences. Then try to make a pattern match between key words and instruction set build-in the robot control system. The speech recognition control and interactive system is effective and well behaved after experimental verification.
APA, Harvard, Vancouver, ISO, and other styles
38

Liu, Gang, Xubing Xiao, Zhicheng Zhou, Gang Sun, and Yunqiang Si. "Design and application of new power load management system." Journal of Physics: Conference Series 2387, no. 1 (2022): 012025. http://dx.doi.org/10.1088/1742-6596/2387/1/012025.

Full text
Abstract:
Abstract In order to improve the load management ability of the new power system, this paper proposes a design scheme of the new power load management system. The design scheme is based on the cloud platform and adopts the micro service and micro application architecture to build applications such as load control customer management, equipment file management, load monitoring, load characteristic analysis, load control scheme formulation, load regulation and implementation, load implementation monitoring, implementation effect analysis, operation management, power safety, early warning monitoring, command and drill, and realize the real-time monitoring and accurate control of load resources on the customer side. The practical application proves the effectiveness of this scheme in improving the management of customer side load resources.
APA, Harvard, Vancouver, ISO, and other styles
39

Modrick, John A. "Presto: Multi-Media Distributed Network for Collaborative Work in Command and Control." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 40, no. 15 (1996): 758–61. http://dx.doi.org/10.1177/154193129604001502.

Full text
Abstract:
The human factors requirements are discussed in terms of support for individuals in a distributed C2 network and interactions to do collaborative work. PRESTO provides access to an orbiting Global Infosphere, a multi-source, multi-media data base on operational conditions and events. The system should facilitate development of shared situation awareness and coordinated actions. The approach to user interface is a concept of “Active View.” The content of each active view is defined by operational tasks and area of responsibility. The diversity of users requires a diversity of active views, each constructed to fit the characteristics of each application. The challenge to human factors is to develop an architecture of collaborative activities which can be mapped into PRESTO's software architecture and modules. These activities can be divided into single multi-media workstation, individual's active views in integrated multi-media format, collaborative transactions between workstations, and data integration into a shared situational representation. Taxonomies for collaborative behaviors and use of multi-media will have to be developed. An application to Joint Task Force is a probable implementation. The JTF is a distributed command group for rapid deployment and control of interservice forces in crisis management.
APA, Harvard, Vancouver, ISO, and other styles
40

Guettier, Christophe, Willy Lamal, Israel Mayk, and Jacques Yelloz. "Design and Experiment of a Collaborative Planning Service for NetCentric International Brigade Command." Proceedings of the AAAI Conference on Artificial Intelligence 29, no. 2 (2015): 3967–74. http://dx.doi.org/10.1609/aaai.v29i2.19055.

Full text
Abstract:
Complex operational environments require improved tactical mission command capabilities with a high level of interoperability among coalition control and command (C2) systems. This paper focuses on two areas of interest: decision support based on automated planning and Service Oriented Architecture (SOA) for rapid service development. Previous experiments were performed bilaterally by US, France and Germany to focus on collaborative mission planning using Web Services (WSs). The results reported herein were obtained from a unified experiment performed by US, France and Germany involving a common scenario. The operational benefit from the experimentation has been to improve mutual understanding among allied forces, to dynamically plan for assistance among ground support troops (logistics, MEDEVAC, and other areas) as well as to improve their coordination. The effort addressed system design, and integration within an experimental framework. It enabled the evolution of the CERDEC Mission Command Gateway (MCG) architecture as well as a constraint based planner ORTAC, developed by French DGA and Sagem. It takes into account near real-time multimodal Situation Awareness and readiness status from tactical edge units. The trilateral experiment, entitled From Data to Decision included Net-Centric manned and unmanned assets from all three nations (France Germany US) operating as a cohesive coalition force while preserving command and support relationships as required through their respective chains of command.
APA, Harvard, Vancouver, ISO, and other styles
41

Lu, Ke, and Chunsheng Liu. "A L1 Adaptive Control Scheme for UAV Carrier Landing Using Nonlinear Dynamic Inversion." International Journal of Aerospace Engineering 2019 (May 2, 2019): 1–8. http://dx.doi.org/10.1155/2019/6917393.

Full text
Abstract:
This paper presents a L1 adaptive controller augmenting a dynamic inversion controller for UAV (unmanned aerial vehicle) carrier landing. A three axis and a power compensator NDI (nonlinear dynamic inversion) controller serves as the baseline controller for this architecture. The inner-loop command inputs are roll-rate, pitch-rate, yaw-rate, and thrust commands. The outer-loop command inputs come from the guidance law to correct the glide slope. However, imperfect model inversion and nonaccurate aerodynamic data may cause degradation of performance and may lead to the failure of the carrier landing. The L1 adaptive controller is designed as augmentation controller to account for matched and unmatched system uncertainties. The performance of the controller is examined through a Monte Carlo simulation which shows the effectiveness of the developed L1 adaptive control scheme based on nonlinear dynamic inversion.
APA, Harvard, Vancouver, ISO, and other styles
42

Su, Jian Xin, Le Jiang Guo, Hai Lin Wang, Yan Lin Wu, and Yan Zhang. "The Research on Scenario Demonstration Engine of Plan Demonstration in the Detection System." Applied Mechanics and Materials 203 (October 2012): 13–17. http://dx.doi.org/10.4028/www.scientific.net/amm.203.13.

Full text
Abstract:
Through research and analysis of the detection system plan demonstration system from the topology, software architecture and the basic systems functions, this paper discusses the basic components, the model library and run the process of scenario demonstration engine of plan demonstration in the detection system. It introduces the running control algorithms of scenario demonstration engine, the obscured corner priority judgment method, the command processor, scenario processor, and model design to achieve some of the key technology in scenario demonstration engine.
APA, Harvard, Vancouver, ISO, and other styles
43

Islam, Md Badrul. "Space and Counter-Space Activities of Great Powers in Outer Space." Vestnik RUDN. International Relations 22, no. 2 (2022): 397–410. http://dx.doi.org/10.22363/2313-0660-2022-22-2-397-410.

Full text
Abstract:
The article is dedicated to outer space as a space, including the Moon and other celestial bodies, open for exploration and use by all. Celestial bodies are natural resources of the common heritage of humanity. Their exploration and use for the benefit and discovery of all countries is the result of the ownership of all mankind. However, since the end of the 20th century and especially in the 21st century, outer space has gradually become militarized. This is due to changes in the system of warfare, which is likely to be heavily transformed in the coming future. In this transformational system, all domains of warfare will be interlinked and outer space will play a significant role. One example of such processes is the Gulf War, also called the First Space War, in which the US Army successfully used the outer space systems for its Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) activities. Since then, outer space has become an integral part of US military operations. Consequently, other great powers like Russian Federation and People’s Republic of China are also trying to develop the same capability to counter US dominance in outer space. Simultaneously, the US is continuing its counter-space capabilities to maintain the dominance in outer space. The growing dependence on outer space is not only applicable to the military operation but also to commercial and civilian activities. As a result, great powers are more actively engaging in various space and counter-space activities to pursue their national interests; such activity turns outer space into an arena for inter-state rivalry.
APA, Harvard, Vancouver, ISO, and other styles
44

Alexakis, George, Spyros Panagiotakis, Alexander Fragkakis, Evangelos Markakis, and Kostas Vassilakis. "Control of Smart Home Operations Using Natural Language Processing, Voice Recognition and IoT Technologies in a Multi-Tier Architecture." Designs 3, no. 3 (2019): 32. http://dx.doi.org/10.3390/designs3030032.

Full text
Abstract:
The Internet of Things (IoT) is an emerging Internet-based architecture, enabling the exchange of data and services in a global network. With the advent of the Internet of Things, more and more devices are connecting to the Internet in order to help people get and share data or program actions. In this paper, we introduce an IoT Agent, a Web application for monitoring and controlling a smart home remotely. The IoT Agent integrates a chat bot that can understand text or voice commands using natural language processing (NLP). With the use of NLP, home devices are more user-friendly and controlling them is easier, since even when a command or question/command is different from the presets, the system understands the user’s wishes and responds accordingly. Our solution exploits several available Application Programming Interfaces (APIs), namely: the Dialogflow API for the efficient integration of NLP to our IoT system, the Web Speech API for enriching user experience with voice recognition and synthesis features, MQTT (Message Queuing Telemetry Transport) for the lightweight control of actuators and Firebase for dynamic data storage. This is the most significant innovation it brings: the integration of several third-party APIs and open source technologies into one mash-up, highlighting how a new IoT application can be built today using a multi-tier architecture. We believe that such a tiered architecture can be very useful for the rapid development of smart home applications.
APA, Harvard, Vancouver, ISO, and other styles
45

Treesatayapun, Chidentree. "Model-Free Robotic Architecture with Task-Multiplexer and Discrete-Time Adaptive Control." Applied System Innovation 2, no. 2 (2019): 12. http://dx.doi.org/10.3390/asi2020012.

Full text
Abstract:
Robotic systems equipped with a task-multiplexer unit are considered as a class of unknown non-linear discrete-time systems, where the input is a command voltage of the driver unit and the output is the feedback signal obtained by the multiplexer unit. With only the input and output data available, an equivalent identification is formulated by a multi-input fuzzy rule emulated network. An online-learning algorithm is proposed to tune all adjustable parameters by using convergence analysis. Using the equivalent model, a controller is developed when the convergence of the tracking error and internal signals can be guaranteed. An experimental system validates the performance of the proposed scheme. Furthermore, the comparative results are also included, to demonstrate the advantage of the proposed controller.
APA, Harvard, Vancouver, ISO, and other styles
46

Ikeoluwa Kolawole, Jesudunsin O. Olaobaju, and Omolola A. Akinola. "Deployment of a novel breach-resistant data offloading protocol from tactical edge to cloud via hardened fog gateways." World Journal of Advanced Engineering Technology and Sciences 15, no. 3 (2025): 946–60. https://doi.org/10.30574/wjaets.2025.15.3.1021.

Full text
Abstract:
Military navigation and command systems face escalating challenges in GPS-degraded or denied environments, necessitating architectures that are both resilient and secure. This study proposes and evaluates a fog-to-cloud framework engineered for real-time, low-latency communication across edge devices—including UAVs, ground vehicles, and maritime units—linked to cloud-based central command. The architecture incorporates adaptive routing algorithms, lightweight encryption, and AI-driven anomaly detection to maintain operational continuity in hostile or electromagnetically contested scenarios. Extensive simulations assessed performance under variable node loads, link disruptions, and cyber-attack conditions. Results revealed that adaptive fog node configurations reduced command latency by up to 48% compared to baseline systems, while maintaining throughput consistency even under high-traffic loads. Packet delivery rates exceeded 95% in predictive routing conditions, and command success ratios remained stable above 92% despite node failure events. Fault tolerance mechanisms, including trust-based link reconfiguration and traffic rerouting, demonstrated resilience and rapid recovery. The architecture also supports horizontal scalability across multi-domain platforms, making it suitable for Joint All-Domain Command and Control (JADC2) strategies and aligned with Department of Defense zero-trust mandates. By integrating distributed intelligence at the fog layer and ensuring encrypted pathways to the cloud, this system offers a robust solution for mission-critical military operations. Future deployments can extend the model to incorporate post-quantum cryptography and real-world testbeds in tactical field environments.
APA, Harvard, Vancouver, ISO, and other styles
47

Leroux, Fabrice, Lionel Ducobu, and Frédéric Milleville. "CAREDAS: a Comprehensive Architecture for a Redundant and Evolutive Data Acquisition System for JHR reactor." EPJ Web of Conferences 253 (2021): 04008. http://dx.doi.org/10.1051/epjconf/202125304008.

Full text
Abstract:
A new material testing reactor Jules Horowitz Reactor is under construction at CEA Cadarache. The materials to be irradiated will be placed into experimental devices around the reactor. Process and measurements of experimental devices will be carried out by command control. A data acquisition system having processing performances will be associated to the programmable logic controller. The challenge is to design and realize for twenty experiment devices a high availability data acquisition system architecture for 50 years of sustainability. The real time target will achieve 24/7 data acquisition and real time processing. This scalable architecture could be use as well for JHR experimental devices with high availability as for testbed. This architecture could be run on a standalone station for a measuring bench or deployed on cluster for high availability. CAREDAS’s design is modular and use proven widely used open source solutions. All parts are independent from each other and can be replaced with another technology with the same functionalities. This ensures sustainability and control of software sources.
APA, Harvard, Vancouver, ISO, and other styles
48

Obriadin, V., S. Horielyshev, and О. Bondarenko. "PROBLEM QUESTIONS OF CREATION AND USE OF AUTOMATED EDUCATIONAL COMMAND POST IN THE EDUCATIONAL PROCESS OF HIGHER EDUCATIONAL INSTITUTIONS." Scientific journal of the National Academy of National Guard "Honor and Law" 2, no. 85 (2023): 36–44. http://dx.doi.org/10.33405/2078-7480/2023/2/85/282531.

Full text
Abstract:
The most important reserve for increasing the effectiveness of the military management activities of the commander and headquarters of the unit in the preparation of combined arms combat is to provide the command and control body with more complete, reliable and operational information about the situation and conditions of hostilities and, on this basis, conduct high-quality and quick analysis to form a plan of action, get ahead of the enemy and achieving surprise. A promising way to improve the process of military decision-making by command and control units is the introduction of a decision support system. The decision support system is the central component of the automated command and control system that adequately reflects the real conditions, means of armed struggle and takes into account the laws of their functioning and mutual relations between them. The article deals with the issues of creating and introducing into the educational process an automated training command post for command and control of troops and subunits. On the basis of the simulation class of the academy, a project of an automated TCP control unit (subdivision) was developed, which makes it possible to automatically reproduce the process of making a military decision by G/S-structural units of the headquarters of a military formation according to NATO standards in an automated mode using a PC-based workstation. It is proposed to build a local network using a mixed type topology: "ring" and "passive star". Such a network structure simplifies the procedure for increasing the number of workstations and facilitates the maintenance and operation of the TCP. The composition of the tactical control unit includes a server, workstations of officers of the structural divisions of the headquarters, multi-channel communication consoles and an interactive whiteboard. The minimum requirements for the proposed network architecture are substantiated. It is shown that a geographic information system is a necessary component of the automated workplace, which implements a full set of functions for working with geodata necessary for a military command and control body. This was done on the basis of the Arc View GIS software package version 3.3. The list of capabilities of the proposed hardware-software complex of the TCP allows us to assert that this complex meets the requirements of at least a class C2 automated control system. The benefits of the implementation of the TCP are in the growth of the volume of information that the staff officers analyze, the high quality and reliability of the data, the comprehensive validity of the conclusions and proposals made, the reduction in the time spent on assessing the situation and making informed rational decisions throughout all seven stages of the standardized MDMP process.
APA, Harvard, Vancouver, ISO, and other styles
49

Ahanda, Joseph Jean-Baptiste Mvogo, Jean Bosco Mbede, Achille Melingui, and Bernard Essimbi Zobo. "Robust adaptive command filtered control of a robotic manipulator with uncertain dynamic and joint space constraints." Robotica 36, no. 5 (2018): 767–86. http://dx.doi.org/10.1017/s0263574718000036.

Full text
Abstract:
SUMMARYThe problem of robust adaptive control of a robotic manipulator subjected to uncertain dynamics and joint space constraints is addressed in this paper. Command filters are used to overcome the time derivatives of virtual control, thus reducing the need for desired trajectory differentiations. A barrier Lyapunov function is used to deal with the joint space constraints. A robust adaptive support vector regression architecture is used to reduce filtering errors, approximation errors and handle dynamic uncertainties. The stability analysis of the closed-loop system using the Lyapunov theory permits to highlight adaptation laws and to prove that all signals of the closed-loop system are bounded. Simulations show the effectiveness of the proposed control strategy.
APA, Harvard, Vancouver, ISO, and other styles
50

Mohammad Ali, Mohammad Ali. "Up-Gradation of Power System Protection Scheme through TCP/IP Using GUI in MATLAB/Simulink." journal of King Abdulaziz University Engineering Sciences 23, no. 1 (2012): 21–36. http://dx.doi.org/10.4197/eng.23-2.2.

Full text
Abstract:
The paper is concerned with the Power System Protection schemes and the resulting design requirement that enhances stability as well as control with the implementation of TCP/IP. It discusses the architecture that upgrades the existing scheme by controlling all the control signals traffic between generating units, transmission system, connected loads and protection devices that are sensitive to control signals using TCP/IP and results are compared using Graphics User Interface (GUI) in MATLAB/Simulink. Protection system describes latest breakers circuit using indirect tripping command from generating units that protects load side through load breakers that receives action signal from local controllers that have a direct communication linkage with main server having strong data base, directly monitors everything through TCP/IP platform using GUI.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography