WorldWideScience

Sample records for networked underwater warfare

  1. Underwater sensor nodes and networks

    National Research Council Canada - National Science Library

    Lloret, Jaime

    2013-01-01

    .... This special issue is focused on collecting recent advances on underwater sensors and underwater sensor networks in order to measure, monitor, surveillance of and control of underwater environments...

  2. Underwater Acoustic Networking Techniques

    CERN Document Server

    Otnes, Roald; Casari, Paolo; Goetz, Michael; Husøy, Thor; Nissen, Ivor; Rimstad, Knut; van Walree, Paul; Zorzi, Michele

    2012-01-01

    This literature study presents an overview of underwater acoustic networking. It provides a background and describes the state of the art of all networking facets that are relevant for underwater applications. This report serves both as an introduction to the subject and as a summary of existing protocols, providing support and inspiration for the development of network architectures.

  3. Network Centric Warfare Implementation and Assessment

    National Research Council Canada - National Science Library

    Braunlinger, Thomas K

    2005-01-01

    ...) Are the military services implementing the network-centric warfare concept?, and (3) Is the network-centric warfare concept a new theory of warfare or rather a modification or extension of previous theories...

  4. Securing underwater wireless communication networks

    OpenAIRE

    Domingo Aladrén, Mari Carmen

    2011-01-01

    Underwater wireless communication networks are particularly vulnerable to malicious attacks due to the high bit error rates, large and variable propagation delays, and low bandwidth of acoustic channels. The unique characteristics of the underwater acoustic communication channel, and the differences between underwater sensor networks and their ground-based counterparts require the development of efficient and reliable security mechanisms. In this article, a compl...

  5. Full-Duplex Underwater Networking Using CDMA

    National Research Council Canada - National Science Library

    Bektas, Kurtulus

    2004-01-01

    Establishing a full-duplex underwater network, researching and applying a CDMA protocol to the network, providing a recommendation for a full-duplex underwater network and providing recommendations...

  6. Underwater Sensor Nodes and Networks

    Directory of Open Access Journals (Sweden)

    Jaime Lloret

    2013-09-01

    Full Text Available Sensor technology has matured enough to be used in any type of environment. The appearance of new physical sensors has increased the range of environmental parameters for gathering data. Because of the huge amount of unexploited resources in the ocean environment, there is a need of new research in the field of sensors and sensor networks. This special issue is focused on collecting recent advances on underwater sensors and underwater sensor networks in order to measure, monitor, surveillance of and control of underwater environments. On the one hand, from the sensor node perspective, we will see works related with the deployment of physical sensors, development of sensor nodes and transceivers for sensor nodes, sensor measurement analysis and several issues such as layer 1 and 2 protocols for underwater communication and sensor localization and positioning systems. On the other hand, from the sensor network perspective, we will see several architectures and protocols for underwater environments and analysis concerning sensor network measurements. Both sides will provide us a complete view of last scientific advances in this research field.

  7. Underwater sensor nodes and networks.

    Science.gov (United States)

    Lloret, Jaime

    2013-09-05

    Sensor technology has matured enough to be used in any type of environment. The appearance of new physical sensors has increased the range of environmental parameters for gathering data. Because of the huge amount of unexploited resources in the ocean environment, there is a need of new research in the field of sensors and sensor networks. This special issue is focused on collecting recent advances on underwater sensors and underwater sensor networks in order to measure, monitor, surveillance of and control of underwater environments. On the one hand, from the sensor node perspective, we will see works related with the deployment of physical sensors, development of sensor nodes and transceivers for sensor nodes, sensor measurement analysis and several issues such as layer 1 and 2 protocols for underwater communication and sensor localization and positioning systems. On the other hand, from the sensor network perspective, we will see several architectures and protocols for underwater environments and analysis concerning sensor network measurements. Both sides will provide us a complete view of last scientific advances in this research field.

  8. Sensor Network Architectures for Monitoring Underwater Pipelines

    Science.gov (United States)

    Mohamed, Nader; Jawhar, Imad; Al-Jaroodi, Jameela; Zhang, Liren

    2011-01-01

    This paper develops and compares different sensor network architecture designs that can be used for monitoring underwater pipeline infrastructures. These architectures are underwater wired sensor networks, underwater acoustic wireless sensor networks, RF (Radio Frequency) wireless sensor networks, integrated wired/acoustic wireless sensor networks, and integrated wired/RF wireless sensor networks. The paper also discusses the reliability challenges and enhancement approaches for these network architectures. The reliability evaluation, characteristics, advantages, and disadvantages among these architectures are discussed and compared. Three reliability factors are used for the discussion and comparison: the network connectivity, the continuity of power supply for the network, and the physical network security. In addition, the paper also develops and evaluates a hierarchical sensor network framework for underwater pipeline monitoring. PMID:22346669

  9. RSS-based sensor localization in underwater acoustic sensor networks

    NARCIS (Netherlands)

    Xu, T.; Hu, Y.; Zhang, Bingbing; Leus, G.J.T.; Dong, Min; Zheng, Thomas Fang

    2016-01-01

    Since the global positioning system (GPS) is not applicable underwater, source localization using wireless sensor networks (WSNs) is gaining popularity in oceanographic applications. Unlike terrestrial WSNs (TWSNs) which uses electromagnetic signaling, underwater WSNs (UWSNs) require underwater

  10. Simplified scheduling for underwater acoustic networks

    NARCIS (Netherlands)

    van Kleunen, W.A.P.; Meratnia, Nirvana; Havinga, Paul J.M.

    The acoustic propagation speed under water poses significant challenges to the design of underwater sensor networks and their medium access control protocols. Similar to the air, scheduling transmissions under water has significant impact on throughput, energy consumption, and reliability. In this

  11. Managing the Double Edged Sword of Network-Centric Warfare

    National Research Council Canada - National Science Library

    Wells, David

    2003-01-01

    Network Centric Warfare can tend to collapse the operational level war by allowing information to flow around or past hierarchical staff structures and directly between tactical and strategic level decision makers...

  12. A Network Coding Based Routing Protocol for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xin Guan

    2012-04-01

    Full Text Available Due to the particularities of the underwater environment, some negative factors will seriously interfere with data transmission rates, reliability of data communication, communication range, and network throughput and energy consumption of underwater sensor networks (UWSNs. Thus, full consideration of node energy savings, while maintaining a quick, correct and effective data transmission, extending the network life cycle are essential when routing protocols for underwater sensor networks are studied. In this paper, we have proposed a novel routing algorithm for UWSNs. To increase energy consumption efficiency and extend network lifetime, we propose a time-slot based routing algorithm (TSR.We designed a probability balanced mechanism and applied it to TSR. The theory of network coding is introduced to TSBR to meet the requirement of further reducing node energy consumption and extending network lifetime. Hence, time-slot based balanced network coding (TSBNC comes into being. We evaluated the proposed time-slot based balancing routing algorithm and compared it with other classical underwater routing protocols. The simulation results show that the proposed protocol can reduce the probability of node conflicts, shorten the process of routing construction, balance energy consumption of each node and effectively prolong the network lifetime.

  13. A network coding based routing protocol for underwater sensor networks.

    Science.gov (United States)

    Wu, Huayang; Chen, Min; Guan, Xin

    2012-01-01

    Due to the particularities of the underwater environment, some negative factors will seriously interfere with data transmission rates, reliability of data communication, communication range, and network throughput and energy consumption of underwater sensor networks (UWSNs). Thus, full consideration of node energy savings, while maintaining a quick, correct and effective data transmission, extending the network life cycle are essential when routing protocols for underwater sensor networks are studied. In this paper, we have proposed a novel routing algorithm for UWSNs. To increase energy consumption efficiency and extend network lifetime, we propose a time-slot based routing algorithm (TSR).We designed a probability balanced mechanism and applied it to TSR. The theory of network coding is introduced to TSBR to meet the requirement of further reducing node energy consumption and extending network lifetime. Hence, time-slot based balanced network coding (TSBNC) comes into being. We evaluated the proposed time-slot based balancing routing algorithm and compared it with other classical underwater routing protocols. The simulation results show that the proposed protocol can reduce the probability of node conflicts, shorten the process of routing construction, balance energy consumption of each node and effectively prolong the network lifetime.

  14. AURP: an AUV-aided underwater routing protocol for underwater acoustic sensor networks.

    Science.gov (United States)

    Yoon, Seokhoon; Azad, Abul K; Oh, Hoon; Kim, Sunghwan

    2012-01-01

    Deploying a multi-hop underwater acoustic sensor network (UASN) in a large area brings about new challenges in reliable data transmissions and survivability of network due to the limited underwater communication range/bandwidth and the limited energy of underwater sensor nodes. In order to address those challenges and achieve the objectives of maximization of data delivery ratio and minimization of energy consumption of underwater sensor nodes, this paper proposes a new underwater routing scheme, namely AURP (AUV-aided underwater routing protocol), which uses not only heterogeneous acoustic communication channels but also controlled mobility of multiple autonomous underwater vehicles (AUVs). In AURP, the total data transmissions are minimized by using AUVs as relay nodes, which collect sensed data from gateway nodes and then forward to the sink. Moreover, controlled mobility of AUVs makes it possible to apply a short-range high data rate underwater channel for transmissions of a large amount of data. To the best to our knowledge, this work is the first attempt to employ multiple AUVs as relay nodes in a multi-hop UASN to improve the network performance in terms of data delivery ratio and energy consumption. Simulations, which are incorporated with a realistic underwater acoustic communication channel model, are carried out to evaluate the performance of the proposed scheme, and the results indicate that a high delivery ratio and low energy consumption can be achieved.

  15. AURP: An AUV-Aided Underwater Routing Protocol for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sunghwan Kim

    2012-02-01

    Full Text Available Deploying a multi-hop underwater acoustic sensor network (UASN in a large area brings about new challenges in reliable data transmissions and survivability of network due to the limited underwater communication range/bandwidth and the limited energy of underwater sensor nodes. In order to address those challenges and achieve the objectives of maximization of data delivery ratio and minimization of energy consumption of underwater sensor nodes, this paper proposes a new underwater routing scheme, namely AURP (AUV-aided underwater routing protocol, which uses not only heterogeneous acoustic communication channels but also controlled mobility of multiple autonomous underwater vehicles (AUVs. In AURP, the total data transmissions are minimized by using AUVs as relay nodes, which collect sensed data from gateway nodes and then forward to the sink. Moreover, controlled mobility of AUVs makes it possible to apply a short-range high data rate underwater channel for transmissions of a large amount of data. To the best to our knowledge, this work is the first attempt to employ multiple AUVs as relay nodes in a multi-hop UASN to improve the network performance in terms of data delivery ratio and energy consumption. Simulations, which are incorporated with a realistic underwater acoustic communication channel model, are carried out to evaluate the performance of the proposed scheme, and the results indicate that a high delivery ratio and low energy consumption can be achieved.

  16. Hybrid Localization Approach for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Pei-Hsuan Tsai

    2017-01-01

    Full Text Available Underwater Wireless Sensor Networks (UWSNs are widely used to collect data in the marine environment. Location and time are essential aspects when sensors collect data, particularly in the case of location-aware data. Many studies on terrestrial sensor networks consider sensor locations as the locations where data is collected and focus on sensor positioning when sensors are fixed. However, underwater sensors are mobile networks and the sensor locations change continuously. Localization schemes designed for static sensor networks need to run periodically to update locations and consume considerable sensor power and increase the communication overhead; hence, they cannot be applied to UWSNs. This paper presents a hybrid localization approach with data-location correction, called Data Localization Correction Approach (DLCA, which positions data without additional communication overhead and power consumption on sensors. Without loss of generality, we simulate the ocean environment based on a kinematic model and meandering current mobility model and conduct extensive simulations. Our results show that DLCA can significantly reduce communication costs, while maintaining relatively high localization accuracy.

  17. An Architecture for Cooperative Localization in Underwater Acoustic Networks

    Science.gov (United States)

    2015-10-24

    An Architecture for Cooperative Localization in Underwater Acoustic Networks ∗ Jeffrey M. Walls University of Michigan Ann Arbor, Michigan jmwalls...umich.edu Ryan M. Eustice University of Michigan Ann Arbor, Michigan eustice@umich.edu ABSTRACT This paper outlines an architecture for underwater...underwater navigation framework. In this paper, we outline the design, implemen- tation, and deployment of a system architecture for multiple vehicle

  18. Event Coverage Detection and Event Source Determination in Underwater Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Zhou, Zhangbing; Xing, Riliang; Duan, Yucong; Zhu, Yueqin; Xiang, Jianming

    2015-01-01

    With the advent of the Internet of Underwater Things, smart things are deployed in the ocean space and establish underwater wireless sensor networks for the monitoring of vast and dynamic underwater environments...

  19. A Secure Communication Suite for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Angelica Lo Duca

    2012-11-01

    Full Text Available In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confidentiality and the integrity of underwater communication while taking into account the unique characteristics and constraints of the acoustic channel. By means of experiments and simulations based on real data, we show that the suite is suitable for an underwater networking environment as it introduces limited, and sometimes negligible, communication and power consumption overhead.

  20. Energy Efficiency in Underwater Sensor Networks: a Research Review

    Directory of Open Access Journals (Sweden)

    V. Kanakaris

    2010-01-01

    Full Text Available In an energy-constrained underwater system environment it is very important to find ways to improve the life expectancy ofthe sensors. Compared to the sensors of a terrestrial Ad Hoc Wireless Sensor Network (WSN, underwater sensors cannotuse solar energy to recharge the batteries, and it is difficult to replace the batteries in the sensors. This paper reviews theresearch progress made to date in the area of energy consumption in underwater sensor networks (UWSN and suggestsfurther research that needs to be carried out in order to increase the energy efficiency of the UWSN system.

  1. A secure communication suite for underwater acoustic sensor networks.

    Science.gov (United States)

    Dini, Gianluca; Lo Duca, Angelica

    2012-11-07

    In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confidentiality and the integrity of underwater communication while taking into account the unique characteristics and constraints of the acoustic channel. By means of experiments and simulations based on real data, we show that the suite is suitable for an underwater networking environment as it introduces limited, and sometimes negligible, communication and power consumption overhead.

  2. A Secure Communication Suite for Underwater Acoustic Sensor Networks

    Science.gov (United States)

    Dini, Gianluca; Duca, Angelica Lo

    2012-01-01

    In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confidentiality and the integrity of underwater communication while taking into account the unique characteristics and constraints of the acoustic channel. By means of experiments and simulations based on real data, we show that the suite is suitable for an underwater networking environment as it introduces limited, and sometimes negligible, communication and power consumption overhead. PMID:23202204

  3. Topology Optimisation for Energy Management in Underwater Sensor Networks

    Science.gov (United States)

    2015-01-01

    sensing and communication models for underwater environment. The approximate Pareto - optimal surface is obtained as a trade-off between network...lifetime and probability of successful search over the surveillance region. Keywords: underwater sensor network; energy management; Pareto optimisation...horizon power trade-off problem with the probability π ss (Wettergren, 2008) of successful search as the cost function , where π ss is shown to be a

  4. Performance Evaluation of Hybrid Acoustic-Optical Underwater Swarm Networks

    Directory of Open Access Journals (Sweden)

    Samuela PERSIA

    2016-04-01

    Full Text Available The Underwater Swarm is a particular Underwater Network configuration characterized by nodes very close one to each other, with mobility capability. The structure of the network is that of a distributed network, in which the nodes, through the exchange of control information, will take decisions in collaborative manner. This type of network raises challenges for its effective design and development, for which the only use of acoustic communication as traditionally suggested in underwater communication could be not enough. A new emerging solution could be a hybrid solution that combines the use of acoustic and optical channel in order to overcome the acoustic channel limitations in underwater environment. In this work, we want to investigate how the acoustic and optical communications influence the Underwater Swarm performance by considering the Low Layers Protocols (Physical Layer, Data Link Layer and Network Layer effects over the two different propagation technologies. Performance simulations have been carried out to suggest how the new hybrid system could be designed. This study will permit to provide useful analysis for the real implementation of an Underwater Swarm based on hybrid communication technology.

  5. Trade-off Analysis of Underwater Acoustic Sensor Networks

    Science.gov (United States)

    Tuna, G.; Das, R.

    2017-09-01

    In the last couple of decades, Underwater Acoustic Sensor Networks (UASNs) were started to be used for various commercial and non-commercial purposes. However, in underwater environments, there are some specific inherent constraints, such as high bit error rate, variable and large propagation delay, limited bandwidth capacity, and short-range communications, which severely degrade the performance of UASNs and limit the lifetime of underwater sensor nodes as well. Therefore, proving reliability of UASN applications poses a challenge. In this study, we try to balance energy consumption of underwater acoustic sensor networks and minimize end-to-end delay using an efficient node placement strategy. Our simulation results reveal that if the number of hops is reduced, energy consumption can be reduced. However, this increases end-to-end delay. Hence, application-specific requirements must be taken into consideration when determining a strategy for node deployment.

  6. Implications for Network-Centric Warfare

    Science.gov (United States)

    2006-03-01

    organizational characteris- tics of bureaucracies is the strong separation of the personal from the professional persona . In a pure bureaucracy...orders given, but sug- gestions are made. Network members can be convinced to engage in certain types of activities, not required. Since networks

  7. Optimal Node Placement in Underwater Acoustic Sensor Network

    KAUST Repository

    Felemban, Muhamad

    2011-10-01

    Almost 70% of planet Earth is covered by water. A large percentage of underwater environment is unexplored. In the past two decades, there has been an increase in the interest of exploring and monitoring underwater life among scientists and in industry. Underwater operations are extremely difficult due to the lack of cheap and efficient means. Recently, Wireless Sensor Networks have been introduced in underwater environment applications. However, underwater communication via acoustic waves is subject to several performance limitations, which makes the relevant research issues very different from those on land. In this thesis, we investigate node placement for building an initial Underwater Wireless Sensor Network infrastructure. Firstly, we formulated the problem into a nonlinear mathematic program with objectives of minimizing the total transmission loss under a given number of sensor nodes and targeted volume. We conducted experiments to verify the proposed formulation, which is solved using Matlab optimization tool. We represented each node with a truncated octahedron to fill out the 3D space. The truncated octahedrons are tiled in the 3D space with each node in the center where locations of the nodes are given using 3D coordinates. Results are supported using ns-3 simulator. Results from simulation are consistent with the obtained results from mathematical model with less than 10% error.

  8. A comparative view of routing protocols for underwater wireless sensor networks

    NARCIS (Netherlands)

    Bayrakdar, Y.; Meratnia, Nirvana; Kantarci, Aylin

    2011-01-01

    Design of efficient routing protocols for underwater sensor networks is challenging because of the distinctive characteristics of the water medium. Currently, many routing protocols are available for terrestrial wireless sensor networks. However, specific properties of underwater medium such as

  9. Enhancing the reliability of head nodes in underwater sensor networks.

    Science.gov (United States)

    Min, Hong; Cho, Yookun; Heo, Junyoung

    2012-01-01

    Underwater environments are quite different from terrestrial environments in terms of the communication media and operating conditions associated with those environments. In underwater sensor networks, the probability of node failure is high because sensor nodes are deployed in harsher environments than ground-based networks. The sensor nodes are surrounded by salt water and moved around by waves and currents. Many studies have focused on underwater communication environments in an effort to improve the data transmission throughput. In this paper, we present a checkpointing scheme for the head nodes to quickly recover from a head node failure. Experimental results show that the proposed scheme enhances the reliability of the networks and makes them more efficient in terms of energy consumption and the recovery latency compared to the previous scheme without checkpointing.

  10. Proctoring the Joint Force: Networks, Hierarchy, and 21st Century Warfare

    Science.gov (United States)

    2005-06-01

    PROCTORING THE JOINT FORCE: NETWORKS, HIERARCHY, AND 21ST CENTURY WARFARE BY MAJOR DANIEL W. TIPPETT A THESIS PRESENTED...4. TITLE AND SUBTITLE Proctoring the Joint Force: Networks, Hierarchy, and 21st Century Warfare 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  11. SOUNET: Self-Organized Underwater Wireless Sensor Network.

    Science.gov (United States)

    Kim, Hee-Won; Cho, Ho-Shin

    2017-02-02

    In this paper, we propose an underwater wireless sensor network (UWSN) named SOUNET where sensor nodes form and maintain a tree-topological network for data gathering in a self-organized manner. After network topology discovery via packet flooding, the sensor nodes consistently update their parent node to ensure the best connectivity by referring to the timevarying neighbor tables. Such a persistent and self-adaptive method leads to high network connectivity without any centralized control, even when sensor nodes are added or unexpectedly lost. Furthermore, malfunctions that frequently happen in self-organized networks such as node isolation and closed loop are resolved in a simple way. Simulation results show that SOUNET outperforms other conventional schemes in terms of network connectivity, packet delivery ratio (PDR), and energy consumption throughout the network. In addition, we performed an experiment at the Gyeongcheon Lake in Korea using commercial underwater modems to verify that SOUNET works well in a real environment.

  12. SOUNET: Self-Organized Underwater Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Hee-won Kim

    2017-02-01

    Full Text Available In this paper, we propose an underwater wireless sensor network (UWSN named SOUNET where sensor nodes form and maintain a tree-topological network for data gathering in a self-organized manner. After network topology discovery via packet flooding, the sensor nodes consistently update their parent node to ensure the best connectivity by referring to the timevarying neighbor tables. Such a persistent and self-adaptive method leads to high network connectivity without any centralized control, even when sensor nodes are added or unexpectedly lost. Furthermore, malfunctions that frequently happen in self-organized networks such as node isolation and closed loop are resolved in a simple way. Simulation results show that SOUNET outperforms other conventional schemes in terms of network connectivity, packet delivery ratio (PDR, and energy consumption throughout the network. In addition, we performed an experiment at the Gyeongcheon Lake in Korea using commercial underwater modems to verify that SOUNET works well in a real environment.

  13. Optimal Node Placement in Underwater Wireless Sensor Networks

    KAUST Repository

    Felamban, M.

    2013-03-25

    Wireless Sensor Networks (WSN) are expected to play a vital role in the exploration and monitoring of underwater areas which are not easily reachable by humans. However, underwater communication via acoustic waves is subject to several performance limitations that are very different from those used for terresstrial networks. In this paper, we investigate node placement for building an initial underwater WSN infrastructure. We formulate this problem as a nonlinear mathematical program with the objective of minimizing the total transmission loss under a given number of sensor nodes and targeted coverage volume. The obtained solution is the location of each node represented via a truncated octahedron to fill out the 3D space. Experiments are conducted to verify the proposed formulation, which is solved using Matlab optimization tool. Simulation is also conducted using an ns-3 simulator, and the simulation results are consistent with the obtained results from mathematical model with less than 10% error.

  14. Non-line-of-sight underwater optical wireless communication network.

    Science.gov (United States)

    Arnon, Shlomi; Kedar, Debbie

    2009-03-01

    The growing need for ocean observation systems has stimulated considerable interest within the research community in advancing the enabling technologies of underwater wireless communication and underwater sensor networks. Sensors and ad hoc sensor networks are the emerging tools for performing extensive data-gathering operations on land, and solutions in the subsea setting are being sought. Efficient communication from the sensors and within the network is critical, but the underwater environment is extremely challenging. Addressing the special features of underwater wireless communication in sensor networks, we propose a novel non-line-of-sight network concept in which the link is implemented by means of back-reflection of the propagating optic signal at the ocean-air interface and derive a mathematical model of the channel. Point-to-multipoint links can be achieved in an energy efficient manner and broadcast broadband communications, such as video transmissions, can be executed. We show achievable bit error rates as a function of sensor node separation and demonstrate the feasibility of this concept using state-of-the-art silicon photomultiplier detectors.

  15. Task Allocation and Path Planning for Collaborative Autonomous Underwater Vehicles Operating through an Underwater Acoustic Network

    Directory of Open Access Journals (Sweden)

    Yueyue Deng

    2013-01-01

    Full Text Available Dynamic and unstructured multiple cooperative autonomous underwater vehicle (AUV missions are highly complex operations, and task allocation and path planning are made significantly more challenging under realistic underwater acoustic communication constraints. This paper presents a solution for the task allocation and path planning for multiple AUVs under marginal acoustic communication conditions: a location-aided task allocation framework (LAAF algorithm for multitarget task assignment and the grid-based multiobjective optimal programming (GMOOP mathematical model for finding an optimal vehicle command decision given a set of objectives and constraints. Both the LAAF and GMOOP algorithms are well suited in poor acoustic network condition and dynamic environment. Our research is based on an existing mobile ad hoc network underwater acoustic simulator and blind flooding routing protocol. Simulation results demonstrate that the location-aided auction strategy performs significantly better than the well-accepted auction algorithm developed by Bertsekas in terms of task-allocation time and network bandwidth consumption. We also demonstrate that the GMOOP path-planning technique provides an efficient method for executing multiobjective tasks by cooperative agents with limited communication capabilities. This is in contrast to existing multiobjective action selection methods that are limited to networks where constant, reliable communication is assumed to be available.

  16. Event localization in underwater wireless sensor networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew John Robert

    2012-08-01

    We propose m-courses (Monitoring Courses), a novel solution to localize events in an underwater wireless sensor network. These networks consists of surface gateways and relay nodes. GPS can localize the position of surface gateways which can then distribute their locations through the network using acoustic modems. Relay nodes are deployed to remain static, but these untethered nodes may drift due to water currents, resulting in disruption of communication links. We develop a novel underwater alarm system using a cyclic graph model. In the event of link failure, a series of alarm packets are broadcast in the network. These alarms are then captured by the underwater m-courses, which can also be used to assure network connectivity and identify node failures. M-courses also allow the network to localize events and identify network issues locally before forwarding results upwards to a Surface Gateway node. This reduces communication overhead and allows for efficient management of nodes in a mobile network. Our results show that m-course routing reduces the number of sends required to report an event to a Surface Gateway by up to 80% when compared to a naïve routing implementation.

  17. Network lifetime-aware data collection in Underwater Sensor ...

    Indian Academy of Sciences (India)

    Development of energy-efficient data collection and routing schemes for Underwater Wireless Sensor Networks (UWSNs) is a challenging issue due to the peculiarities of the underlying physical layer technology. Since the recharging or replacement of sensor nodes is almost impossible after deployment, the critical issue of ...

  18. MAC Scheduling in Large-scale Underwater Acoustic Networks

    NARCIS (Netherlands)

    van Kleunen, W.A.P.; Meratnia, Nirvana; Havinga, Paul J.M.

    2011-01-01

    The acoustic propagation speed under water poses significant challenges to the design of underwater sensor networks and their medium access control protocols. Scheduling allows reducing the effects of long propagation delay of the acoustic signal and has significant impacts on throughput, energy

  19. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available Information warfare has surfaced as an emerging concept that affects not only military institutions but ordinary organisations as well. Information warfare in itself consists of various components ranging from its electronic and psychological...

  20. Cognitive Routing in Software-Defined Underwater Acoustic Networks

    Directory of Open Access Journals (Sweden)

    Huma Ghafoor

    2017-12-01

    Full Text Available There are two different types of primary users (natural acoustic and artificial acoustic, and there is a long propagation delay for acoustic links in underwater cognitive acoustic networks (UCANs. Thus, the selection of a stable route is one of the key design factors for improving overall network stability, thereby reducing end-to-end delay. Software-defined networking (SDN is a novel approach that improves network intelligence. To this end, we propose a novel SDN-based routing protocol for UCANs in order to find a stable route between source and destination. A main controller is placed in a surface buoy that is responsible for the global view of the network, whereas local controllers are placed in different autonomous underwater vehicles (AUVs that are responsible for a localized view of the network. The AUVs have fixed trajectories, and sensor nodes within transmission range of the AUVs serve as gateways to relay the gathered information to the controllers. This is an SDN-based underwater communications scheme whereby two nodes can only communicate when they have a consensus about a common idle channel. To evaluate our proposed scheme, we perform extensive simulations and improve network performance in terms of end-to-end delay, delivery ratio, and overhead.

  1. Topology Optimization for Energy Management in Underwater Sensor Networks

    Science.gov (United States)

    2015-02-01

    and communication. This multi-objective cost functional leads to non-dominant optimization. Such a problem is formulated as a Pareto -optimal trade...K. Jha1 Thomas A. Wettergren2 Asok Ray1 Kushal Mukherjee3 Keywords: Underwater Sensor Network, Energy Management, Pareto Optimization, Adaptation...communication models for under- water environment. The approximate Pareto -optimal surface is obtained as a trade-off between network lifetime and probability

  2. Warfare Ecology on an Underwater Demolition Range: Acoustic Observations of Marine Life and Shallow Water Detonations in Hawai`i

    Science.gov (United States)

    Shannon, Lee H.

    Most studies investigating the effects of military-associated anthropogenic noise concentrate on deep sea or open ocean propagation of sonar and its effect on marine mammals. In littoral waters, U.S. military special operations units regularly conduct shallow water explosives training, yet relatively little attention has been given to the potential impact on nearshore marine ecosystems from these underwater detonations. This dissertation research focused on the Pu'uloa Underwater Detonation Range off the coast of O`ahu, and examined multiple aspects of the surrounding marine ecosystem and the effects of detonations using acoustic monitoring techniques. The soundscape of a nearshore reef ecosystem adjacent to the UNDET range was characterized through analysis of passive acoustic recordings collected over the span of 6 years. Snapping shrimp were the predominant source of noise, and a diel pattern was present, with increased sound energy during the night hours. Results revealed a difference of up to 7dB between two Ecological Acoustic Recorder locations 2.5km apart along the 60ft isobath. Passive acoustic recording files were searched visually and aurally for odontocete whistles. Whistles were detected in only 0.6% of files analyzed, indicating this area is not frequently transited by coastal odontocete emitting social sounds. The study also opportunistically captured a humpback whale singing during a detonation event, during which the animal showed no obvious alteration of its singing behavior. Four separate underwater detonation events were recorded using a surface deployed F-42C transducer, and the resulting analysis showed no measurable drop in the biologically produced acoustic energy in reaction to the explosive events. Coral reef fishes were recorded visually and acoustically during detonation events at a known distance and bearing from a known explosive sound source. Individual fish behavioral responses to the explosion varied, and a sharp uptick in fish

  3. Event Localization in Underwater Wireless Sensor Networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew

    2011-11-01

    In this thesis we consider different methods to localize events in a multi-hop wireless sensor network operating underwater using acoustic modems. The network consists of surface gateway nodes and relay nodes. Localization of surface gateways can be achieved through GPS, but we cannot rely on this technology for localizing underwater nodes. Surface Gateway nodes can distribute their locations through the network using the incoming signals by the acoustic modems from the relay nodes. Relay nodes are deployed to remain static but due to water currents, floating, and the untethered nature of the nodes, they often suffer from frequent drifting which can result in a deployed network suffering link failures. In this work, we developed a novel concept of an underwater alarming system, which adapts a cyclic graph model. In the event of link failure, a series of alarm packets are broadcasted in the network. These alarms are then captured through a novel concept of underwater Monitoring Courses (M-Courses), which can also be used to assure network connectivity and identify node faults. M-Courses also allow the network to localize events and identify network issues at a local level before forwarding any results upwards to a Surface Gateway nodes. This reduces the amount of communication overhead needed and allowing for distributed management of nodes in a network which may be constantly moving. We show that the proposed algorithms can reduce the number of send operations needed for an event to be localized in a network. We have found that M-Course routing reduces the number of sends required to report an event to a Surface Gateway by up to 80% in some cases when compared to a naive routing implementation. But this is achieved by increasing the time for an event to reach a Surface Gateway. These effects are both due to the buffering effect of M-Course routing, which allows us to efficiently deal with multiple events in an local area and we find that the performance of M

  4. Localization of Energy Harvesting Empowered Underwater Optical Wireless Sensor Networks

    KAUST Repository

    Saeed, Nasir

    2017-12-20

    In this paper, a received signal strength (RSS) based localization technique is developed for energy harvesting underwater optical wireless sensor networks (EH-UOWSNs), where the optical noise sources and channel impairments of seawater pose significant challenges for range estimation. Energy limitation is another major problem due to the limited battery power and difficulty in replacing or recharging the battery of an underwater sensor node. In the proposed framework, sensor nodes with insufficient battery, harvest the energy and starts communicating once it has sufficient energy storage. Network localization is carried out by measuring the RSSs of active nodes, which are modeled based on the underwater optical communication channel characteristics. Thereafter, block kernel matrices are computed for the RSS based range measurements. Unlike the traditional shortest-path approach, the proposed technique reduces the shortest path estimation for each block kernel matrix. Once the complete block kernel matrices are available, a closed form localization technique is developed to find the location of every optical sensor node in the network. Furthermore, an analytical expression for Cramer Rao lower bound (CRLB) is derived as a benchmark to compare the localization performance of the proposed technique. Finally, extensive simulations show that the proposed technique outperforms the well-known network localization techniques.

  5. The Data Warehouse in Service Oriented Architectures and Network Centric Warfare

    National Research Council Canada - National Science Library

    Lenahan, Jack

    2005-01-01

    Since Network Centric Warfare (NCW) theory stresses shared understanding, command dispersal, and improved situational awareness does it not follow then, that data availability, mining, and superior analytics must be available at all...

  6. Measuring the Operational Readiness of an Air Force Network Warfare Squadron

    National Research Council Canada - National Science Library

    Orth, Paul H

    2008-01-01

    As part of its squadron activation, the 315th Network Warfare Squadron (NWS) requested assistance from the Air Force Institute of Technology in developing criteria for declaring Initial Operational Capability (IOC...

  7. Localization Algorithms of Underwater Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Yongjun Xu

    2012-02-01

    Full Text Available In Underwater Wireless Sensor Networks (UWSNs, localization is one of most important technologies since it plays a critical role in many applications. Motivated by widespread adoption of localization, in this paper, we present a comprehensive survey of localization algorithms. First, we classify localization algorithms into three categories based on sensor nodes’ mobility: stationary localization algorithms, mobile localization algorithms and hybrid localization algorithms. Moreover, we compare the localization algorithms in detail and analyze future research directions of localization algorithms in UWSNs.

  8. Localization algorithms of Underwater Wireless Sensor Networks: a survey.

    Science.gov (United States)

    Han, Guangjie; Jiang, Jinfang; Shu, Lei; Xu, Yongjun; Wang, Feng

    2012-01-01

    In Underwater Wireless Sensor Networks (UWSNs), localization is one of most important technologies since it plays a critical role in many applications. Motivated by widespread adoption of localization, in this paper, we present a comprehensive survey of localization algorithms. First, we classify localization algorithms into three categories based on sensor nodes' mobility: stationary localization algorithms, mobile localization algorithms and hybrid localization algorithms. Moreover, we compare the localization algorithms in detail and analyze future research directions of localization algorithms in UWSNs.

  9. A query result merging scheme for providing energy efficiency in underwater sensor networks.

    Science.gov (United States)

    Kim, Yunsung; Park, Soo-Hyun

    2011-01-01

    Underwater sensor networks are emerging as a promising distributed data management system for various applications in underwater environments, despite their limited accessibility and restricted energy capacity. With the aid of recent developments in ubiquitous data computing, an increasing number of users are expected to overcome low accessibility by applying queries to underwater sensor networks. However, when multiple users send queries to an underwater sensor network in a disorganized manner, it may incur lethal energy waste and problematic network traffic. The current query management mechanisms cannot effectively deal with this matter due to their limited applicability and unrealistic assumptions. In this paper, a novel query management scheme involving query result merging is proposed for underwater sensor networks. The mechanism is based on a relational database model and is adjusted to the practical restrictions affecting underwater communication environments. Network simulations will prove that the scheme becomes more efficient with a greater number of queries and a smaller period range.

  10. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    Directory of Open Access Journals (Sweden)

    Ning Li

    2016-03-01

    Full Text Available Underwater acoustic sensor networks (UASNs have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  11. ECS: Efficient Communication Scheduling for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Lu Hong

    2011-03-01

    Full Text Available TDMA protocols have attracted a lot of attention for underwater acoustic sensor networks (UWSNs, because of the unique characteristics of acoustic signal propagation such as great energy consumption in transmission, long propagation delay and long communication range. Previous TDMA protocols all allocated transmission time to nodes based on discrete time slots. This paper proposes an efficient continuous time scheduling TDMA protocol (ECS for UWSNs, including the continuous time based and sender oriented conflict analysis model, the transmission moment allocation algorithm and the distributed topology maintenance algorithm. Simulation results confirm that ECS improves network throughput by 20% on average, compared to existing MAC protocols.

  12. ECS: efficient communication scheduling for underwater sensor networks.

    Science.gov (United States)

    Hong, Lu; Hong, Feng; Guo, Zhongwen; Li, Zhengbao

    2011-01-01

    TDMA protocols have attracted a lot of attention for underwater acoustic sensor networks (UWSNs), because of the unique characteristics of acoustic signal propagation such as great energy consumption in transmission, long propagation delay and long communication range. Previous TDMA protocols all allocated transmission time to nodes based on discrete time slots. This paper proposes an efficient continuous time scheduling TDMA protocol (ECS) for UWSNs, including the continuous time based and sender oriented conflict analysis model, the transmission moment allocation algorithm and the distributed topology maintenance algorithm. Simulation results confirm that ECS improves network throughput by 20% on average, compared to existing MAC protocols.

  13. Design and Analysis of Underwater Acoustic Networks with Reflected Links

    Science.gov (United States)

    Emokpae, Lloyd

    Underwater acoustic networks (UWANs) have applications in environmental state monitoring, oceanic profile measurements, leak detection in oil fields, distributed surveillance, and navigation. For these applications, sets of nodes are employed to collaboratively monitor an area of interest and track certain events or phenomena. In addition, it is common to find autonomous underwater vehicles (AUVs) acting as mobile sensor nodes that perform search-and-rescue missions, reconnaissance in combat zones, and coastal patrol. These AUVs are to work cooperatively to achieve a desired goal and thus need to be able to, in an ad-hoc manner, establish and sustain communication links in order to ensure some desired level of quality of service. Therefore, each node is required to adapt to environmental changes and be able to overcome broken communication links caused by external noise affecting the communication channel due to node mobility. In addition, since radio waves are quickly absorbed in the water medium, it is common for most underwater applications to rely on acoustic (or sound) rather than radio channels for mid-to-long range communications. However, acoustic channels pose multiple challenging issues, most notably the high transmission delay due to slow signal propagation and the limited channel bandwidth due to high frequency attenuation. Moreover, the inhomogeneous property of the water medium affects the sound speed profile while the signal surface and bottom reflections leads to multipath effects. In this dissertation, we address these networking challenges by developing protocols that take into consideration the underwater physical layer dynamics. We begin by introducing a novel surface-based reflection scheme (SBR), which takes advantage of the multipath effects of the acoustic channel. SBR works by using reflections from the water surface, and bottom, to establish non-line-of-sight (NLOS) communication links. SBR makes it possible to incorporate both line

  14. Direct-Sequence Spread-Spectrum Modulation for Utility Packet Transmission in Underwater Acoustic Communication Networks

    National Research Council Canada - National Science Library

    Duke, Peter

    2002-01-01

    ...) modulation for utility-packet transmission in Seaweb underwater wireless acoustic communications networks, Seaweb networks require robust channel-tolerant utility packets having a low probability of detection (LPD...

  15. Efficient Vector-Based Forwarding for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Peng Xie

    2010-01-01

    Full Text Available Underwater Sensor Networks (UWSNs are significantly different from terrestrial sensor networks in the following aspects: low bandwidth, high latency, node mobility, high error probability, and 3-dimensional space. These new features bring many challenges to the network protocol design of UWSNs. In this paper, we tackle one fundamental problem in UWSNs: robust, scalable, and energy efficient routing. We propose vector-based forwarding (VBF, a geographic routing protocol. In VBF, the forwarding path is guided by a vector from the source to the target, no state information is required on the sensor nodes, and only a small fraction of the nodes is involved in routing. To improve the robustness, packets are forwarded in redundant and interleaved paths. Further, a localized and distributed self-adaptation algorithm allows the nodes to reduce energy consumption by discarding redundant packets. VBF performs well in dense networks. For sparse networks, we propose a hop-by-hop vector-based forwarding (HH-VBF protocol, which adapts the vector-based approach at every hop. We evaluate the performance of VBF and HH-VBF through extensive simulations. The simulation results show that VBF achieves high packet delivery ratio and energy efficiency in dense networks and HH-VBF has high packet delivery ratio even in sparse networks.

  16. Energy-Efficient Channel Coding Strategy for Underwater Acoustic Networks.

    Science.gov (United States)

    Barreto, Grasielli; Simão, Daniel H; Pellenz, Marcelo E; Souza, Richard D; Jamhour, Edgard; Penna, Manoel C; Brante, Glauber; Chang, Bruno S

    2017-03-31

    Underwater acoustic networks (UAN) allow for efficiently exploiting and monitoring the sub-aquatic environment. These networks are characterized by long propagation delays, error-prone channels and half-duplex communication. In this paper, we address the problem of energy-efficient communication through the use of optimized channel coding parameters. We consider a two-layer encoding scheme employing forward error correction (FEC) codes and fountain codes (FC) for UAN scenarios without feedback channels. We model and evaluate the energy consumption of different channel coding schemes for a K -distributed multipath channel. The parameters of the FEC encoding layer are optimized by selecting the optimal error correction capability and the code block size. The results show the best parameter choice as a function of the link distance and received signal-to-noise ratio.

  17. An Ultra-Lightweight Encryption Scheme in Underwater Acoustic Networks

    Directory of Open Access Journals (Sweden)

    Chunyan Peng

    2016-01-01

    Full Text Available We tackle a fundamental security problem in underwater acoustic networks (UANs. The S-box in the existing block encryption algorithm is more energy consuming and unsuitable for resources-constrained UANs. In this paper, instead of S-box, we present a lightweight, 8-round iteration block cipher algorithm for UANs communication based on chaotic theory and increase the key space by changing the number of iteration round. We further propose secure network architecture of UANs. By analysis, our algorithm can resist brute-force searches and adversarial attacks. Simulation results show that, compared with traditional AES-128 and PRESENT algorithms, our cryptographic algorithm can make a good trade-off between security and overhead, has better energy efficiency, and applies to UANs.

  18. Energy-Efficient Channel Coding Strategy for Underwater Acoustic Networks

    Directory of Open Access Journals (Sweden)

    Grasielli Barreto

    2017-03-01

    Full Text Available Underwater acoustic networks (UAN allow for efficiently exploiting and monitoring the sub-aquatic environment. These networks are characterized by long propagation delays, error-prone channels and half-duplex communication. In this paper, we address the problem of energy-efficient communication through the use of optimized channel coding parameters. We consider a two-layer encoding scheme employing forward error correction (FEC codes and fountain codes (FC for UAN scenarios without feedback channels. We model and evaluate the energy consumption of different channel coding schemes for a K-distributed multipath channel. The parameters of the FEC encoding layer are optimized by selecting the optimal error correction capability and the code block size. The results show the best parameter choice as a function of the link distance and received signal-to-noise ratio.

  19. Event Coverage Detection and Event Source Determination in Underwater Wireless Sensor Networks

    OpenAIRE

    Zhangbing Zhou; Riliang Xing; Yucong Duan; Yueqin Zhu; Jianming Xiang

    2015-01-01

    With the advent of the Internet of Underwater Things, smart things are deployed in the ocean space and establish underwater wireless sensor networks for the monitoring of vast and dynamic underwater environments. When events are found to have possibly occurred, accurate event coverage should be detected, and potential event sources should be determined for the enactment of prompt and proper responses. To address this challenge, a technique that detects event coverage and determines event sour...

  20. A Network Coding Based Hybrid ARQ Protocol for Underwater Acoustic Sensor Networks.

    Science.gov (United States)

    Wang, Hao; Wang, Shilian; Zhang, Eryang; Zou, Jianbin

    2016-09-07

    Underwater Acoustic Sensor Networks (UASNs) have attracted increasing interest in recent years due to their extensive commercial and military applications. However, the harsh underwater channel causes many challenges for the design of reliable underwater data transport protocol. In this paper, we propose an energy efficient data transport protocol based on network coding and hybrid automatic repeat request (NCHARQ) to ensure reliability, efficiency and availability in UASNs. Moreover, an adaptive window length estimation algorithm is designed to optimize the throughput and energy consumption tradeoff. The algorithm can adaptively change the code rate and can be insensitive to the environment change. Extensive simulations and analysis show that NCHARQ significantly reduces energy consumption with short end-to-end delay.

  1. Chain-Based Communication in Cylindrical Underwater Wireless Sensor Networks

    Science.gov (United States)

    Javaid, Nadeem; Jafri, Mohsin Raza; Khan, Zahoor Ali; Alrajeh, Nabil; Imran, Muhammad; Vasilakos, Athanasios

    2015-01-01

    Appropriate network design is very significant for Underwater Wireless Sensor Networks (UWSNs). Application-oriented UWSNs are planned to achieve certain objectives. Therefore, there is always a demand for efficient data routing schemes, which can fulfill certain requirements of application-oriented UWSNs. These networks can be of any shape, i.e., rectangular, cylindrical or square. In this paper, we propose chain-based routing schemes for application-oriented cylindrical networks and also formulate mathematical models to find a global optimum path for data transmission. In the first scheme, we devise four interconnected chains of sensor nodes to perform data communication. In the second scheme, we propose routing scheme in which two chains of sensor nodes are interconnected, whereas in third scheme single-chain based routing is done in cylindrical networks. After finding local optimum paths in separate chains, we find global optimum paths through their interconnection. Moreover, we develop a computational model for the analysis of end-to-end delay. We compare the performance of the above three proposed schemes with that of Power Efficient Gathering System in Sensor Information Systems (PEGASIS) and Congestion adjusted PEGASIS (C-PEGASIS). Simulation results show that our proposed 4-chain based scheme performs better than the other selected schemes in terms of network lifetime, end-to-end delay, path loss, transmission loss, and packet sending rate. PMID:25658394

  2. Chain-Based Communication in Cylindrical Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadeem Javaid

    2015-02-01

    Full Text Available Appropriate network design is very significant for Underwater Wireless Sensor Networks (UWSNs. Application-oriented UWSNs are planned to achieve certain objectives. Therefore, there is always a demand for efficient data routing schemes, which can fulfill certain requirements of application-oriented UWSNs. These networks can be of any shape, i.e., rectangular, cylindrical or square. In this paper, we propose chain-based routing schemes for application-oriented cylindrical networks and also formulate mathematical models to find a global optimum path for data transmission. In the first scheme, we devise four interconnected chains of sensor nodes to perform data communication. In the second scheme, we propose routing scheme in which two chains of sensor nodes are interconnected, whereas in third scheme single-chain based routing is done in cylindrical networks. After finding local optimum paths in separate chains, we find global optimum paths through their interconnection. Moreover, we develop a computational model for the analysis of end-to-end delay. We compare the performance of the above three proposed schemes with that of Power Efficient Gathering System in Sensor Information Systems (PEGASIS and Congestion adjusted PEGASIS (C-PEGASIS. Simulation results show that our proposed 4-chain based scheme performs better than the other selected schemes in terms of network lifetime, end-to-end delay, path loss, transmission loss, and packet sending rate.

  3. Chain-based communication in cylindrical underwater wireless sensor networks.

    Science.gov (United States)

    Javaid, Nadeem; Jafri, Mohsin Raza; Khan, Zahoor Ali; Alrajeh, Nabil; Imran, Muhammad; Vasilakos, Athanasios

    2015-02-04

    Appropriate network design is very significant for Underwater Wireless Sensor Networks (UWSNs). Application-oriented UWSNs are planned to achieve certain objectives. Therefore, there is always a demand for efficient data routing schemes, which can fulfill certain requirements of application-oriented UWSNs. These networks can be of any shape, i.e., rectangular, cylindrical or square. In this paper, we propose chain-based routing schemes for application-oriented cylindrical networks and also formulate mathematical models to find a global optimum path for data transmission. In the first scheme, we devise four interconnected chains of sensor nodes to perform data communication. In the second scheme, we propose routing scheme in which two chains of sensor nodes are interconnected, whereas in third scheme single-chain based routing is done in cylindrical networks. After finding local optimum paths in separate chains, we find global optimum paths through their interconnection. Moreover, we develop a computational model for the analysis of end-to-end delay. We compare the performance of the above three proposed schemes with that of Power Efficient Gathering System in Sensor Information Systems (PEGASIS) and Congestion adjusted PEGASIS (C-PEGASIS). Simulation results show that our proposed 4-chain based scheme performs better than the other selected schemes in terms of network lifetime, end-to-end delay, path loss, transmission loss, and packet sending rate.

  4. NETWORK-CENTRIC WARFARE AND SOME PARTICULAR ASPECTS OF LOGISTICS BASED ON NETWORKING

    Directory of Open Access Journals (Sweden)

    Petrişor JALBĂ

    2015-04-01

    Full Text Available Within the framework of the current revolution in military affairs, at the End of the Cold War a new concept was born: the concept of War Based on Computer Networking or NCW Network Centric-Warfare which was established as a central element of modern military operations. Determined by theprogress recorded in the field of communication systems of all types, technology of information (HI-Tech, IT, war based on computer networking brings a change in the war paradigm and its inherent components In this respect, logistics based on computer networking represents one of the ways in which the reality of the battlefield is preserved which enhances the joint perspective upon the military forces.

  5. A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Khalid

    2017-01-01

    Full Text Available Underwater wireless sensor networks are a newly emerging wireless technology in which small size sensors with limited energy and limited memory and bandwidth are deployed in deep sea water and various monitoring operations like tactical surveillance, environmental monitoring, and data collection are performed through these tiny sensors. Underwater wireless sensor networks are used for the exploration of underwater resources, oceanographic data collection, flood or disaster prevention, tactical surveillance systems, and unmanned underwater vehicles. Sensor nodes consist of a small memory, a central processing unit, and an antenna. Underwater networks are much different from terrestrial sensor networks as radio waves cannot be used in underwater wireless sensor networks. Acoustic channels are used for communication in deep sea water. Acoustic signals have many limitations, such as limited bandwidth, higher end-to-end delay, network path loss, higher propagation delay, and dynamic topology. Usually, these limitations result in higher energy consumption with a smaller number of packets delivered. The main aim nowadays is to operate sensor nodes having a smaller battery for a longer time in the network. This survey has discussed the state-of-the-art localization based and localization-free routing protocols. Routing associated issues in the area of underwater wireless sensor networks have also been discussed.

  6. Localization with a Mobile Beacon in Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sangho Lee

    2012-04-01

    Full Text Available Localization is one of the most important issues associated with underwater acoustic sensor networks, especially when sensor nodes are randomly deployed. Given that it is difficult to deploy beacon nodes at predetermined locations, localization schemes with a mobile beacon on the sea surface or along the planned path are inherently convenient, accurate, and energy-efficient. In this paper, we propose a new range-free Localization with a Mobile Beacon (LoMoB. The mobile beacon periodically broadcasts a beacon message containing its location. Sensor nodes are individually localized by passively receiving the beacon messages without inter-node communications. For location estimation, a set of potential locations are obtained as candidates for a node’s location and then the node’s location is determined through the weighted mean of all the potential locations with the weights computed based on residuals.

  7. Cooperative Opportunistic Pressure Based Routing for Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Javaid, Nadeem; Muhammad; Sher, Arshad; Abdul, Wadood; Niaz, Iftikhar Azim; Almogren, Ahmad; Alamri, Atif

    2017-03-19

    In this paper, three opportunistic pressure based routing techniques for underwater wireless sensor networks (UWSNs) are proposed. The first one is the cooperative opportunistic pressure based routing protocol (Co-Hydrocast), second technique is the improved Hydrocast (improved-Hydrocast), and third one is the cooperative improved Hydrocast (Co-improved Hydrocast). In order to minimize lengthy routing paths between the source and the destination and to avoid void holes at the sparse networks, sensor nodes are deployed at different strategic locations. The deployment of sensor nodes at strategic locations assure the maximum monitoring of the network field. To conserve the energy consumption and minimize the number of hops, greedy algorithm is used to transmit data packets from the source to the destination. Moreover, the opportunistic routing is also exploited to avoid void regions by making backward transmissions to find reliable path towards the destination in the network. The relay cooperation mechanism is used for reliable data packet delivery, when signal to noise ratio (SNR) of the received signal is not within the predefined threshold then the maximal ratio combining (MRC) is used as a diversity technique to improve the SNR of the received signals at the destination. Extensive simulations validate that our schemes perform better in terms of packet delivery ratio and energy consumption than the existing technique; Hydrocast.

  8. Fighting Networks: The Defining Challenge of Irregular Warfare

    Science.gov (United States)

    2011-06-01

    ambush is a form of offensive attack that utilizes principles of the defense and relies on deception. Jon Latimer describes the ambush and “…the use...of lures to draw the enemy into them…” as fundamental aspects of irregular and guerrilla warfare; Jon Latimer , Deception in War (New York: Overlook...Theory of Intelligence,” in Intelligence Theory, 10. 296 Latimer , Deception in War, 272. 297 Organizationally, fusion provides a structural framework

  9. The NUROV: a Networked Underwater Remote Observation Vehicle

    Science.gov (United States)

    Rognstad, M. R.; Jones, W. H.

    2006-12-01

    NUROV, a small observation class underwater vehicle, is under development at the Hawaii Mapping Research Group (HMRG) of the University of Hawaii. Connected by tether to a Base100T Internet Protocol (IP) network, such as those presently in use or proposed for cabled ocean observatories, it enables control of the vehicle through a web browser virtual control panel, and delivers live video through the same IP network. The vehicle is simple, with two horizontal thrusters and one vertical thruster, and a motorized tilt function for the video camera. Arrays of Light Emitting Diodes (LEDs) are mounted on either side of the camera so its field of view can be illuminated. Thruster motors and LED arrays are oil filled and pressure tolerant. The video camera, motor controller, and network electronics are enclosed in pressure housings; the initial prototype housings are designed for shallow water, but future housings for water depths to 6000 meters are planned. The LED arrays and camera housing window incorporate ultraviolet LEDs to reduce the effects of biofouling. A pressure sensor allows for automatic depth regulation by the motor controller on command from the vehicle pilot. In addition to applications observing near ocean observatory nodes, NUROV may also be used from a ship, using a standard fiber-optic electromechanical cable connected to a fiber to electrical network converter contained in a pressure housing. In fact, with the addition of a network switch, multiple vehicles could be deployed simultaneously on a single cable. Connection of the NUROV network to the Internet would allow users located around the world to pilot the vehicle and observe the IP video; this would be particularly useful for educational outreach.

  10. Neural network controller for underwater work ROV. Suichu sagyoyo ROV no neural network controller

    Energy Technology Data Exchange (ETDEWEB)

    Yoshida, Y.; Kidoshi, H.; Arahata, M.; Shoji, K.; Takahashi, Y. (Ishikawajima-Harima Heavy Industries, Co. Ltd., Tokyo (Japan))

    1993-07-01

    The previous underwater work ROV (remotely operated vehicle) has been controlled manually because its dynamic properties are changeable underwater. Ishikawajima-Harima Heavy Industries (IHI) has applied a neural network to an adaptive controller for the ROV. This paper describes objectives of the research, design of control logic, and tank experiments on a model ROV. For the neural network, manual operation was used to provide the initial learning data for the neural network in order to initialize control parameters for optimization. The model ROV was designed to achieve and maintain constant depth in normal operation. As a consequence of the tank experiments, it was demonstrated that the controller can acquire skill of operators, can further improve the acquired skill of operators, and can construct an automatic control system autonomically even if any dynamic properties are not known. 6 refs., 8 figs.

  11. Motivation and requirements for determining a Network Warfare Capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2010-06-01

    Full Text Available technology for their day-to-day operation (Panda, Giordano 1999). A report by the Defense Science Board in the United States of America (USA) explains that challenges in the present age include information assurance, and that this requires new...", International Journal of Information Security, vol. 1, no. 1, pp. 3-13. Munro, N. 1996, "Sketching a national Information Warfare defense plan", Communications of the ACM, vol. 39, no. 11, pp. 15-17. Panda, B. & Giordano, J. 1999, "Defensive Information...

  12. RF Path and Absorption Loss Estimation for Underwater Wireless Sensor Networks in Different Water Environments.

    Science.gov (United States)

    Qureshi, Umair Mujtaba; Shaikh, Faisal Karim; Aziz, Zuneera; Shah, Syed M Zafi S; Sheikh, Adil A; Felemban, Emad; Qaisar, Saad Bin

    2016-06-16

    Underwater Wireless Sensor Network (UWSN) communication at high frequencies is extremely challenging. The intricacies presented by the underwater environment are far more compared to the terrestrial environment. The prime reason for such intricacies are the physical characteristics of the underwater environment that have a big impact on electromagnetic (EM) signals. Acoustics signals are by far the most preferred choice for underwater wireless communication. Because high frequency signals have the luxury of large bandwidth (BW) at shorter distances, high frequency EM signals cannot penetrate and propagate deep in underwater environments. The EM properties of water tend to resist their propagation and cause severe attenuation. Accordingly, there are two questions that need to be addressed for underwater environment, first what happens when high frequency EM signals operating at 2.4 GHz are used for communication, and second which factors affect the most to high frequency EM signals. To answer these questions, we present real-time experiments conducted at 2.4 GHz in terrestrial and underwater (fresh water) environments. The obtained results helped in studying the physical characteristics (i.e., EM properties, propagation and absorption loss) of underwater environments. It is observed that high frequency EM signals can propagate in fresh water at a shallow depth only and can be considered for a specific class of applications such as water sports. Furthermore, path loss, velocity of propagation, absorption loss and the rate of signal loss in different underwater environments are also calculated and presented in order to understand why EM signals cannot propagate in sea water and oceanic water environments. An optimal solk6ution for underwater communication in terms of coverage distance, bandwidth and nature of communication is presented, along with possible underwater applications of UWSNs at 2.4 GHz.

  13. RF Path and Absorption Loss Estimation for Underwater Wireless Sensor Networks in Different Water Environments

    Directory of Open Access Journals (Sweden)

    Umair Mujtaba Qureshi

    2016-06-01

    Full Text Available Underwater Wireless Sensor Network (UWSN communication at high frequencies is extremely challenging. The intricacies presented by the underwater environment are far more compared to the terrestrial environment. The prime reason for such intricacies are the physical characteristics of the underwater environment that have a big impact on electromagnetic (EM signals. Acoustics signals are by far the most preferred choice for underwater wireless communication. Because high frequency signals have the luxury of large bandwidth (BW at shorter distances, high frequency EM signals cannot penetrate and propagate deep in underwater environments. The EM properties of water tend to resist their propagation and cause severe attenuation. Accordingly, there are two questions that need to be addressed for underwater environment, first what happens when high frequency EM signals operating at 2.4 GHz are used for communication, and second which factors affect the most to high frequency EM signals. To answer these questions, we present real-time experiments conducted at 2.4 GHz in terrestrial and underwater (fresh water environments. The obtained results helped in studying the physical characteristics (i.e., EM properties, propagation and absorption loss of underwater environments. It is observed that high frequency EM signals can propagate in fresh water at a shallow depth only and can be considered for a specific class of applications such as water sports. Furthermore, path loss, velocity of propagation, absorption loss and the rate of signal loss in different underwater environments are also calculated and presented in order to understand why EM signals cannot propagate in sea water and oceanic water environments. An optimal solk6ution for underwater communication in terms of coverage distance, bandwidth and nature of communication is presented, along with possible underwater applications of UWSNs at 2.4 GHz.

  14. An efficient and reliable geographic routing protocol based on partial network coding for underwater sensor networks.

    Science.gov (United States)

    Hao, Kun; Jin, Zhigang; Shen, Haifeng; Wang, Ying

    2015-05-28

    Efficient routing protocols for data packet delivery are crucial to underwater sensor networks (UWSNs). However, communication in UWSNs is a challenging task because of the characteristics of the acoustic channel. Network coding is a promising technique for efficient data packet delivery thanks to the broadcast nature of acoustic channels and the relatively high computation capabilities of the sensor nodes. In this work, we present GPNC, a novel geographic routing protocol for UWSNs that incorporates partial network coding to encode data packets and uses sensor nodes' location information to greedily forward data packets to sink nodes. GPNC can effectively reduce network delays and retransmissions of redundant packets causing additional network energy consumption. Simulation results show that GPNC can significantly improve network throughput and packet delivery ratio, while reducing energy consumption and network latency when compared with other routing protocols.

  15. A Probabilistic and Highly Efficient Topology Control Algorithm for Underwater Cooperating AUV Networks

    Science.gov (United States)

    Li, Ning; Cürüklü, Baran; Bastos, Joaquim; Sucasas, Victor; Fernandez, Jose Antonio Sanchez; Rodriguez, Jonathan

    2017-01-01

    The aim of the Smart and Networking Underwater Robots in Cooperation Meshes (SWARMs) project is to make autonomous underwater vehicles (AUVs), remote operated vehicles (ROVs) and unmanned surface vehicles (USVs) more accessible and useful. To achieve cooperation and communication between different AUVs, these must be able to exchange messages, so an efficient and reliable communication network is necessary for SWARMs. In order to provide an efficient and reliable communication network for mission execution, one of the important and necessary issues is the topology control of the network of AUVs that are cooperating underwater. However, due to the specific properties of an underwater AUV cooperation network, such as the high mobility of AUVs, large transmission delays, low bandwidth, etc., the traditional topology control algorithms primarily designed for terrestrial wireless sensor networks cannot be used directly in the underwater environment. Moreover, these algorithms, in which the nodes adjust their transmission power once the current transmission power does not equal an optimal one, are costly in an underwater cooperating AUV network. Considering these facts, in this paper, we propose a Probabilistic Topology Control (PTC) algorithm for an underwater cooperating AUV network. In PTC, when the transmission power of an AUV is not equal to the optimal transmission power, then whether the transmission power needs to be adjusted or not will be determined based on the AUV’s parameters. Each AUV determines their own transmission power adjustment probability based on the parameter deviations. The larger the deviation, the higher the transmission power adjustment probability is, and vice versa. For evaluating the performance of PTC, we combine the PTC algorithm with the Fuzzy logic Topology Control (FTC) algorithm and compare the performance of these two algorithms. The simulation results have demonstrated that the PTC is efficient at reducing the transmission power

  16. A Probabilistic and Highly Efficient Topology Control Algorithm for Underwater Cooperating AUV Networks.

    Science.gov (United States)

    Li, Ning; Cürüklü, Baran; Bastos, Joaquim; Sucasas, Victor; Fernandez, Jose Antonio Sanchez; Rodriguez, Jonathan

    2017-05-04

    The aim of the Smart and Networking Underwater Robots in Cooperation Meshes (SWARMs) project is to make autonomous underwater vehicles (AUVs), remote operated vehicles (ROVs) and unmanned surface vehicles (USVs) more accessible and useful. To achieve cooperation and communication between different AUVs, these must be able to exchange messages, so an efficient and reliable communication network is necessary for SWARMs. In order to provide an efficient and reliable communication network for mission execution, one of the important and necessary issues is the topology control of the network of AUVs that are cooperating underwater. However, due to the specific properties of an underwater AUV cooperation network, such as the high mobility of AUVs, large transmission delays, low bandwidth, etc., the traditional topology control algorithms primarily designed for terrestrial wireless sensor networks cannot be used directly in the underwater environment. Moreover, these algorithms, in which the nodes adjust their transmission power once the current transmission power does not equal an optimal one, are costly in an underwater cooperating AUV network. Considering these facts, in this paper, we propose a Probabilistic Topology Control (PTC) algorithm for an underwater cooperating AUV network. In PTC, when the transmission power of an AUV is not equal to the optimal transmission power, then whether the transmission power needs to be adjusted or not will be determined based on the AUV's parameters. Each AUV determines their own transmission power adjustment probability based on the parameter deviations. The larger the deviation, the higher the transmission power adjustment probability is, and vice versa. For evaluating the performance of PTC, we combine the PTC algorithm with the Fuzzy logic Topology Control (FTC) algorithm and compare the performance of these two algorithms. The simulation results have demonstrated that the PTC is efficient at reducing the transmission power

  17. A Probabilistic and Highly Efficient Topology Control Algorithm for Underwater Cooperating AUV Networks

    Directory of Open Access Journals (Sweden)

    Ning Li

    2017-05-01

    Full Text Available The aim of the Smart and Networking Underwater Robots in Cooperation Meshes (SWARMs project is to make autonomous underwater vehicles (AUVs, remote operated vehicles (ROVs and unmanned surface vehicles (USVs more accessible and useful. To achieve cooperation and communication between different AUVs, these must be able to exchange messages, so an efficient and reliable communication network is necessary for SWARMs. In order to provide an efficient and reliable communication network for mission execution, one of the important and necessary issues is the topology control of the network of AUVs that are cooperating underwater. However, due to the specific properties of an underwater AUV cooperation network, such as the high mobility of AUVs, large transmission delays, low bandwidth, etc., the traditional topology control algorithms primarily designed for terrestrial wireless sensor networks cannot be used directly in the underwater environment. Moreover, these algorithms, in which the nodes adjust their transmission power once the current transmission power does not equal an optimal one, are costly in an underwater cooperating AUV network. Considering these facts, in this paper, we propose a Probabilistic Topology Control (PTC algorithm for an underwater cooperating AUV network. In PTC, when the transmission power of an AUV is not equal to the optimal transmission power, then whether the transmission power needs to be adjusted or not will be determined based on the AUV’s parameters. Each AUV determines their own transmission power adjustment probability based on the parameter deviations. The larger the deviation, the higher the transmission power adjustment probability is, and vice versa. For evaluating the performance of PTC, we combine the PTC algorithm with the Fuzzy logic Topology Control (FTC algorithm and compare the performance of these two algorithms. The simulation results have demonstrated that the PTC is efficient at reducing the

  18. A Novel Cross-Layer Routing Protocol Based on Network Coding for Underwater Sensor Networks.

    Science.gov (United States)

    Wang, Hao; Wang, Shilian; Bu, Renfei; Zhang, Eryang

    2017-08-08

    Underwater wireless sensor networks (UWSNs) have attracted increasing attention in recent years because of their numerous applications in ocean monitoring, resource discovery and tactical surveillance. However, the design of reliable and efficient transmission and routing protocols is a challenge due to the low acoustic propagation speed and complex channel environment in UWSNs. In this paper, we propose a novel cross-layer routing protocol based on network coding (NCRP) for UWSNs, which utilizes network coding and cross-layer design to greedily forward data packets to sink nodes efficiently. The proposed NCRP takes full advantages of multicast transmission and decode packets jointly with encoded packets received from multiple potential nodes in the entire network. The transmission power is optimized in our design to extend the life cycle of the network. Moreover, we design a real-time routing maintenance protocol to update the route when detecting inefficient relay nodes. Substantial simulations in underwater environment by Network Simulator 3 (NS-3) show that NCRP significantly improves the network performance in terms of energy consumption, end-to-end delay and packet delivery ratio compared with other routing protocols for UWSNs.

  19. Cross Deployment Networking and Systematic Performance Analysis of Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Wei, Zhengxian; Song, Min; Yin, Guisheng; Wang, Hongbin; Ma, Xuefei; Song, Houbing

    2017-07-12

    Underwater wireless sensor networks (UWSNs) have become a new hot research area. However, due to the work dynamics and harsh ocean environment, how to obtain an UWSN with the best systematic performance while deploying as few sensor nodes as possible and setting up self-adaptive networking is an urgent problem that needs to be solved. Consequently, sensor deployment, networking, and performance calculation of UWSNs are challenging issues, hence the study in this paper centers on this topic and three relevant methods and models are put forward. Firstly, the normal body-centered cubic lattice to cross body-centered cubic lattice (CBCL) has been improved, and a deployment process and topology generation method are built. Then most importantly, a cross deployment networking method (CDNM) for UWSNs suitable for the underwater environment is proposed. Furthermore, a systematic quar-performance calculation model (SQPCM) is proposed from an integrated perspective, in which the systematic performance of a UWSN includes coverage, connectivity, durability and rapid-reactivity. Besides, measurement models are established based on the relationship between systematic performance and influencing parameters. Finally, the influencing parameters are divided into three types, namely, constraint parameters, device performance and networking parameters. Based on these, a networking parameters adjustment method (NPAM) for optimized systematic performance of UWSNs has been presented. The simulation results demonstrate that the approach proposed in this paper is feasible and efficient in networking and performance calculation of UWSNs.

  20. On the Impacts and Benefits of Implementing Full-Duplex Communications Links in an Underwater Acoustic Network

    National Research Council Canada - National Science Library

    Gibson, J; Larraza, A; Rice, J; Smith, K; Xie, G

    2002-01-01

    .... These networks may provide command and control for autonomous underwater vehicles, forward reporting by arrays of sensor grids, ad hoc communications links to covert forces, or positive control...

  1. Equipping Network Warfare: Industrial-Era Bureaucracies for Information-Era Weapons

    Science.gov (United States)

    2009-04-01

    to operational shortfalls. Clearly, there are benefits in following known methods in organizing the cyberspace mission and its capabilities...sid26_gci853845,00.html (accessed 15 December 2008). 9 BX.com Terminology Reference, “Web Year,” http://www.bx.com/dictionary/ ecommerce /Web_year.cfm... benefits of the process, while amplifying the negative aspects of the bureaucracy. Network warfare capabilities are much more vulnerable to

  2. A Study on the Clustering Technology of Underwater Isomorphic Sensor Networks Based on Energy Balance

    Directory of Open Access Journals (Sweden)

    Fei Wang

    2014-07-01

    Full Text Available Nowadays, there is a greater need for energy efficient and stable underwater sensor networks (UWSNs. Underwater sensors usually do not have enough power, so the goal of underwater sensor networks is to make the network have a long lifetime. An underwater heterogeneous sensor network (UWHSN is one way to cluster the sensors, and the application of UWHSNs is simple and fast, but robots, lifetime and energy-partition are all drawbacks of UWHSNs. In this paper we propose the underwater isomorphic sensor network (UWISN clustering technology. By analyzing the characteristics of UWISNs, we determine that an UWISN has strong expansibility, mobility, energy-efficiency and long lifetime. An UWISN adopts normal sensor nodes to be cluster heads, and these cluster heads communicate with each other. This paper seeks the optimal number of clusters and uses FCM to elect cluster heads and establish the network. In addition, an idea of real cluster heads and the method to elect them have been proposed. Finally, the simulation results show that the solution is effective and UWISNs can improve the energy consumption of an UWSN.

  3. Game Theory-Based Cooperation for Underwater Acoustic Sensor Networks: Taxonomy, Review, Research Challenges and Directions.

    Science.gov (United States)

    Muhammed, Dalhatu; Anisi, Mohammad Hossein; Zareei, Mahdi; Vargas-Rosales, Cesar; Khan, Anwar

    2018-02-01

    Exploring and monitoring the underwater world using underwater sensors is drawing a lot of attention these days. In this field cooperation between acoustic sensor nodes has been a critical problem due to the challenging features such as acoustic channel failure (sound signal), long propagation delay of acoustic signal, limited bandwidth and loss of connectivity. There are several proposed methods to improve cooperation between the nodes by incorporating information/game theory in the node's cooperation. However, there is a need to classify the existing works and demonstrate their performance in addressing the cooperation issue. In this paper, we have conducted a review to investigate various factors affecting cooperation in underwater acoustic sensor networks. We study various cooperation techniques used for underwater acoustic sensor networks from different perspectives, with a concentration on communication reliability, energy consumption, and security and present a taxonomy for underwater cooperation. Moreover, we further review how the game theory can be applied to make the nodes cooperate with each other. We further analyze different cooperative game methods, where their performance on different metrics is compared. Finally, open issues and future research direction in underwater acoustic sensor networks are highlighted.

  4. Game Theory-Based Cooperation for Underwater Acoustic Sensor Networks: Taxonomy, Review, Research Challenges and Directions

    Directory of Open Access Journals (Sweden)

    Dalhatu Muhammed

    2018-02-01

    Full Text Available Exploring and monitoring the underwater world using underwater sensors is drawing a lot of attention these days. In this field cooperation between acoustic sensor nodes has been a critical problem due to the challenging features such as acoustic channel failure (sound signal, long propagation delay of acoustic signal, limited bandwidth and loss of connectivity. There are several proposed methods to improve cooperation between the nodes by incorporating information/game theory in the node’s cooperation. However, there is a need to classify the existing works and demonstrate their performance in addressing the cooperation issue. In this paper, we have conducted a review to investigate various factors affecting cooperation in underwater acoustic sensor networks. We study various cooperation techniques used for underwater acoustic sensor networks from different perspectives, with a concentration on communication reliability, energy consumption, and security and present a taxonomy for underwater cooperation. Moreover, we further review how the game theory can be applied to make the nodes cooperate with each other. We further analyze different cooperative game methods, where their performance on different metrics is compared. Finally, open issues and future research direction in underwater acoustic sensor networks are highlighted.

  5. ENERGY EFFICIENCY ANALYSIS OF ERROR CORRECTION TECHNIQUES IN UNDERWATER WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    M. NORDIN B. ZAKARIA

    2011-02-01

    Full Text Available Research in underwater acoustic networks has been developed rapidly to support large variety of applications such as mining equipment and environmental monitoring. As in terrestrial sensor networks; reliable data transport is demanded in underwater sensor networks. The energy efficiency of error correction technique should be considered because of the severe energy constraints of underwater wireless sensor networks. Forward error correction (FEC andautomatic repeat request (ARQ are the two main error correction techniques in underwater networks. In this paper, a mathematical energy efficiency analysis for FEC and ARQ techniques in underwater environment has been done based on communication distance and packet size. The effects of wind speed, and shipping factor are studied. A comparison between FEC and ARQ in terms of energy efficiency is performed; it is found that energy efficiency of both techniquesincreases with increasing packet size in short distances, but decreases in longer distances. There is also a cut-off distance below which ARQ is more energy efficient than FEC, and after which FEC is more energy efficient than ARQ. This cut-off distance decreases by increasing wind speed. Wind speed has great effecton energy efficiency where as shipping factor has unnoticeable effect on energy efficiency for both techniques.

  6. On the Effects of Frequency Scaling over Capacity Scaling in Underwater Networks

    DEFF Research Database (Denmark)

    Shin, Won-Yong; Roetter, Daniel Enrique Lucani; Médard, Muriel

    2013-01-01

    This is the second in a two-part series of papers on information-theoretic capacity scaling laws for an underwater acoustic network. Part II focuses on a dense network scenario, where nodes are deployed in a unit area. By deriving a cut-set upper bound on the capacity scaling, we first show...

  7. An Environment-Friendly Multipath Routing Protocol for Underwater Acoustic Sensor Network

    Directory of Open Access Journals (Sweden)

    Yun Li

    2017-01-01

    Full Text Available Underwater Acoustic Sensor Network (UASN is a promising technique by facilitating a wide range of aquatic applications. However, routing scheme in UASN is a challenging task because of the characteristics of the nodes mobility, interruption of link, and interference caused by other underwater acoustic systems such as marine mammals. In order to achieve reliable data delivery in UASN, in this work, we present a disjoint multipath disruption-tolerant routing protocol for UASN (ENMR, which incorporates the Hue, Saturation, and Value color space (HSV model to establish routing paths to greedily forward data packets to sink nodes. ENMR applies the mechanism to maintain the network topology. Simulation results show that, compared with the classic underwater routing protocols named PVBF, ENMR can improve packet delivery ratio and reduce network latency while avoiding introducing additional energy consumption.

  8. Design and Performance Evaluation of Underwater Data Dissemination Strategies using Interference Avoidance and Network Coding

    DEFF Research Database (Denmark)

    Palacios, Raul; Heide, Janus; Fitzek, Frank

    2012-01-01

    The long propagation delays of the underwater acoustic channel make traditional Medium Access schemes impractical and inefficient under water. This paper introduces and studies Interference Avoidance and Network Coding for Medium Access protocol design aiming to cope with the underwater channel...... these concepts could increase channel utilisation as well as improve energy efficiency of the network nodes. The main goal is to investigate the potential benefits of new strategies for data dissemination over a string topology scenario. Comprehensive simulations prove the feasibility of Interference Avoidance...

  9. Logical Link Control and Channel Scheduling for Multichannel Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jun Li

    2012-08-01

    Full Text Available With recent developments in terrestrial wireless networks and advances in acoustic communications, multichannel technologies have been proposed to be used in underwater networks to increase data transmission rate over bandwidth-limited underwater channels. Due to high bit error rates in underwater networks, an efficient error control technique is critical in the logical link control (LLC sublayer to establish reliable data communications over intrinsically unreliable underwater channels. In this paper, we propose a novel protocol stack architecture featuring cross-layer design of LLC sublayer and more efficient packetto- channel scheduling for multichannel underwater sensor networks. In the proposed stack architecture, a selective-repeat automatic repeat request (SR-ARQ based error control protocol is combined with a dynamic channel scheduling policy at the LLC sublayer. The dynamic channel scheduling policy uses the channel state information provided via cross-layer design. It is demonstrated that the proposed protocol stack architecture leads to more efficient transmission of multiple packets over parallel channels. Simulation studies are conducted to evaluate the packet delay performance of the proposed cross-layer protocol stack architecture with two different scheduling policies: the proposed dynamic channel scheduling and a static channel scheduling. Simulation results show that the dynamic channel scheduling used in the cross-layer protocol stack outperforms the static channel scheduling. It is observed that, when the dynamic channel scheduling is used, the number of parallel channels has only an insignificant impact on the average packet delay. This confirms that underwater sensor networks will benefit from the use of multichannel communications.

  10. Energy Harvesting Hybrid Acoustic-Optical Underwater Wireless Sensor Networks Localization.

    Science.gov (United States)

    Saeed, Nasir; Celik, Abdulkadir; Al-Naffouri, Tareq Y; Alouini, Mohamed-Slim

    2017-12-26

    Underwater wireless technologies demand to transmit at higher data rate for ocean exploration. Currently, large coverage is achieved by acoustic sensor networks with low data rate, high cost, high latency, high power consumption, and negative impact on marine mammals. Meanwhile, optical communication for underwater networks has the advantage of the higher data rate albeit for limited communication distances. Moreover, energy consumption is another major problem for underwater sensor networks, due to limited battery power and difficulty in replacing or recharging the battery of a sensor node. The ultimate solution to this problem is to add energy harvesting capability to the acoustic-optical sensor nodes. Localization of underwater sensor networks is of utmost importance because the data collected from underwater sensor nodes is useful only if the location of the nodes is known. Therefore, a novel localization technique for energy harvesting hybrid acoustic-optical underwater wireless sensor networks (AO-UWSNs) is proposed. AO-UWSN employs optical communication for higher data rate at a short transmission distance and employs acoustic communication for low data rate and long transmission distance. A hybrid received signal strength (RSS) based localization technique is proposed to localize the nodes in AO-UWSNs. The proposed technique combines the noisy RSS based measurements from acoustic communication and optical communication and estimates the final locations of acoustic-optical sensor nodes. A weighted multiple observations paradigm is proposed for hybrid estimated distances to suppress the noisy observations and give more importance to the accurate observations. Furthermore, the closed form solution for Cramer-Rao lower bound (CRLB) is derived for localization accuracy of the proposed technique.

  11. Energy Harvesting Hybrid Acoustic-Optical Underwater Wireless Sensor Networks Localization

    Directory of Open Access Journals (Sweden)

    Nasir Saeed

    2017-12-01

    Full Text Available Underwater wireless technologies demand to transmit at higher data rate for ocean exploration. Currently, large coverage is achieved by acoustic sensor networks with low data rate, high cost, high latency, high power consumption, and negative impact on marine mammals. Meanwhile, optical communication for underwater networks has the advantage of the higher data rate albeit for limited communication distances. Moreover, energy consumption is another major problem for underwater sensor networks, due to limited battery power and difficulty in replacing or recharging the battery of a sensor node. The ultimate solution to this problem is to add energy harvesting capability to the acoustic-optical sensor nodes. Localization of underwater sensor networks is of utmost importance because the data collected from underwater sensor nodes is useful only if the location of the nodes is known. Therefore, a novel localization technique for energy harvesting hybrid acoustic-optical underwater wireless sensor networks (AO-UWSNs is proposed. AO-UWSN employs optical communication for higher data rate at a short transmission distance and employs acoustic communication for low data rate and long transmission distance. A hybrid received signal strength (RSS based localization technique is proposed to localize the nodes in AO-UWSNs. The proposed technique combines the noisy RSS based measurements from acoustic communication and optical communication and estimates the final locations of acoustic-optical sensor nodes. A weighted multiple observations paradigm is proposed for hybrid estimated distances to suppress the noisy observations and give more importance to the accurate observations. Furthermore, the closed form solution for Cramer-Rao lower bound (CRLB is derived for localization accuracy of the proposed technique.

  12. Energy Harvesting Hybrid Acoustic-Optical Underwater Wireless Sensor Networks Localization

    KAUST Repository

    Saeed, Nasir

    2017-12-26

    Underwater wireless technologies demand to transmit at higher data rate for ocean exploration. Currently, large coverage is achieved by acoustic sensor networks with low data rate, high cost, high latency, high power consumption, and negative impact on marine mammals. Meanwhile, optical communication for underwater networks has the advantage of the higher data rate albeit for limited communication distances. Moreover, energy consumption is another major problem for underwater sensor networks, due to limited battery power and difficulty in replacing or recharging the battery of a sensor node. The ultimate solution to this problem is to add energy harvesting capability to the acoustic-optical sensor nodes. Localization of underwater sensor networks is of utmost importance because the data collected from underwater sensor nodes is useful only if the location of the nodes is known. Therefore, a novel localization technique for energy harvesting hybrid acoustic-optical underwater wireless sensor networks (AO-UWSNs) is proposed. AO-UWSN employs optical communication for higher data rate at a short transmission distance and employs acoustic communication for low data rate and long transmission distance. A hybrid received signal strength (RSS) based localization technique is proposed to localize the nodes in AO-UWSNs. The proposed technique combines the noisy RSS based measurements from acoustic communication and optical communication and estimates the final locations of acoustic-optical sensor nodes. A weighted multiple observations paradigm is proposed for hybrid estimated distances to suppress the noisy observations and give more importance to the accurate observations. Furthermore, the closed form solution for Cramer-Rao lower bound (CRLB) is derived for localization accuracy of the proposed technique.

  13. The SAFIRE and an Initial Network-Centric Warfare Evaluation

    National Research Council Canada - National Science Library

    Haas, Michael W; Middenorf, Matthew S; Ulring, Shari

    2006-01-01

    .... The second purpose is to document the initial use of the SAFIRE architecture in its intended role, as a tool supporting evaluations of crew-system interfaces used in a network-centric environment...

  14. Correlation Analysis of Fleet Information Warfare Center Network Incidents

    National Research Council Canada - National Science Library

    Ginn, Patrick

    2001-01-01

    .... To allow for efficient access and utilization of the information systems sharing the network the Intrusion Detection Systems must be set at a level that filters out activity deemed as normal or non...

  15. A Survey on Underwater Wireless Sensor Networks: Progresses, Applications, and Challenges

    Directory of Open Access Journals (Sweden)

    Premalatha J.

    2016-01-01

    Full Text Available The endangered underwater species always drew the attention of the scientific society since their disappearance would cause irreplaceable loss. Asia is home to some of the most diverse habitats in the earth, but it is estimated that more than one in four species are endangered. In Underwater, a lot of factors are putting marine life under immense pressure. Extreme population pressure is leading to pollution, over-fishing and the devastation of crucial habitats. Consequently, the numbers of almost all fish are declining and many are already endangered. To help these species to survive, their habitat should be strictly protected. This can be achieved by strictly monitoring them. During this course, several parameters, constraints about the species and its environments are focused. Now, advances in sensor technology facilitate the monitoring of species and their habitat with less expenditure. Indeed, the increasing sophistication of underwater wireless sensors offers chances that enable new challenges in a lot of areas, like surveillance one. This paper endorses the use of sensors for monitoring underwater species endangered in their habitat. This paper further examines the key approaches and challenges in the design and implementation of underwater wireless sensor networks. We summarize major applications and the main phenomena related to acoustic propagation, and discuss how they affect the design and operation of communication systems and networking protocols at various layers.

  16. Information Superiority/Battle Command (Network Centric Warfare Environment)

    Science.gov (United States)

    2004-06-01

    on the Move (BCOTM). To this end a multiplicity of subtasks have been articulated to include: 1) Evaluate future data radio, wireless , personal...Multinational Communcations Systems. Requirement for Dedicated All Weather Communications Relay platforms. Requirement for Higher level of Networking

  17. Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers

    NARCIS (Netherlands)

    Climent, S.; Sanchez, A.; Capella, J.V.; Meratnia, Nirvana; Serrano, J.J.

    2014-01-01

    This survey aims to provide a comprehensive overview of the current research on underwater wireless sensor networks, focusing on the lower layers of the communication stack, and envisions future trends and challenges. It analyzes the current state-of-the-art on the physical, medium access control

  18. Scheduled MAC in Beacon Overlay Networks for Underwater Localization and Time-Synchronization

    NARCIS (Netherlands)

    van Kleunen, W.A.P.; Meratnia, Nirvana; Havinga, Paul J.M.

    2011-01-01

    In this article we introduce a MAC protocol designed for underwater localization and time-synchronisation. The MAC protocol assumes a network of static reference nodes and allows blind nodes to be localized by listening-only to the beacon messages. Such a system is known to be very scalable. We show

  19. Towards a Semiotic Information Position Framework for Network Centric Warfare

    Science.gov (United States)

    2011-06-01

    Postgraduate School. 37. Roy, D., Semiotic Schemas: A Framework for Grounding Language in Action and Perception. Artificial Intelligence, 2005. 167: p. 170...Technology Symposium. 2005. 47. Zemanek, H., Semiotics and Programming Languages . Communications of the ACM, 1966. 9(3): p. 139-143. UNCLASSIFIED...16th ICCRTS: Collective C2 in Multinational Civil-Military Operations Towards a Semiotic Information Position Framework for Network

  20. A Double Rate Localization Algorithm with One Anchor for Multi-Hop Underwater Acoustic Networks.

    Science.gov (United States)

    Gao, Jingjie; Shen, Xiaohong; Zhao, Ruiqin; Mei, Haodi; Wang, Haiyan

    2017-04-28

    Localization is a basic issue for underwater acoustic networks (UANs). Currently, most localization algorithms only perform well in one-hop networks or need more anchors which are not suitable for the underwater environment. In this paper, we proposed a double rate localization algorithm with one anchor for multi-hop underwater acoustic networks (DRL). The algorithm firstly presents a double rate scheme which separates the localization procedure into two modes to increase the ranging accuracy in multi-hop UANs while maintaining the transmission rate. Then an optimal selection scheme of reference nodes was proposed to reduce the influence of references' topology on localization performance. The proposed DRL algorithm can be used in the multi-hop UANs to increase the localization accuracy and reduce the usage of anchor nodes. The simulation and experimental results demonstrated that the proposed DRL algorithm has a better localization performance than the previous algorithms in many aspects such as accuracy and communication cost, and is more suitable to the underwater environment.

  1. Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers

    Directory of Open Access Journals (Sweden)

    Salvador Climent

    2014-01-01

    Full Text Available This survey aims to provide a comprehensive overview of the current researchon underwater wireless sensor networks, focusing on the lower layers of the communicationstack, and envisions future trends and challenges. It analyzes the current state-of-the-art onthe physical, medium access control and routing layers. It summarizes their security threadsand surveys the currently proposed studies. Current envisioned niches for further advances inunderwater networks research range from efficient, low-power algorithms and

  2. A hybrid method for protection against threats to a network infrastructure for an electronic warfare management system

    Science.gov (United States)

    Byłak, Michał; RóŻański, Grzegorz

    2017-04-01

    The article presents the concept of ensuring the security of network information infrastructure for the management of Electronic Warfare (EW) systems. The concept takes into account the reactive and proactive tools against threats. An overview of the methods used to support the safety of IT networks and information sources about threats is presented. Integration of mechanisms that allow for effective intrusion detection and rapid response to threats in a network has been proposed. The architecture of the research environment is also presented.

  3. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available Information warfare has surfaced as an emerging concept that affects not only military institutions but ordinary organisations as well. Information warfare in itself consists of various components ranging from its electronic and psychological...

  4. Improved Correction Localization Algorithm Based on Wave Direction Spectrum for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhang Ming

    2014-09-01

    Full Text Available Localization is an important topic in the underwater wireless sensor networks (UWSN because sensor nodes are randomly scattered over a region and can get connected into a network on their own. In this paper, we proposed an improved correction localization algorithm based on wave direction spectrum for underwater wireless sensor networks. First, we use the length of anchor nodes and depth of nodes to compute the radius and achieve the initial positioning. Second, we estimate the moving distance of nodes through analyzing the wave direction spectrum, the correction coefficient was computed for X-axis, Y-axis, Z-axis respectively to correct the coordinate. Simulation shows that the localization accuracy of the proposed algorithm is better under the same time and speed environment than USP algorithm and SLMP algorithm.

  5. Secure cooperation of autonomous mobile sensors using an underwater acoustic network.

    Science.gov (United States)

    Caiti, Andrea; Calabrò, Vincenzo; Dini, Gianluca; Lo Duca, Angelica; Munafò, Andrea

    2012-01-01

    Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles-AUVs) respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach). The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal) is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011.

  6. Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network

    Directory of Open Access Journals (Sweden)

    Gianluca Dini

    2012-02-01

    Full Text Available Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles—AUVs respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach. The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011.

  7. A Localization Based Cooperative Routing Protocol for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadeem Javaid

    2017-01-01

    Full Text Available Localization is one of the major aspects in underwater wireless sensor networks (UWSNs. Therefore, it is important to know the accurate position of the sensor node in large scale applications like disaster prevention, tactical surveillance, and monitoring. Due to the inefficiency of the global positioning system (GPS in UWSN, it is very difficult to localize a node in underwater environment compared to terrestrial networks. To minimize the localization error and enhance the localization coverage of the network, two routing protocols are proposed; the first one is mobile autonomous underwater vehicle (MobiL-AUV and the second one is cooperative MobiL (CO-MobiL. In MobiL-AUV, AUVs are deployed and equipped with GPS and act as reference nodes. These reference nodes are used to localize all the nonlocalized ordinary sensor nodes in order to reduce the localization error and maximize the network coverage. CO-MobiL is presented in order to improve the network throughput by using the maximal ratio combining (MRC as diversity technique which combines both signals, received from the source and received from the relay at the destination. It uses amplify-and-forward (AF mechanism to improve the signal between the source and the destination. To support our claims, extensive simulations are performed.

  8. An Efficient Data-Gathering Routing Protocol for Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Javaid, Nadeem; Ilyas, Naveed; Ahmad, Ashfaq; Alrajeh, Nabil; Qasim, Umar; Khan, Zahoor Ali; Liaqat, Tayyaba; Khan, Majid Iqbal

    2015-11-17

    Most applications of underwater wireless sensor networks (UWSNs) demand reliable data delivery over a longer period in an efficient and timely manner. However, the harsh and unpredictable underwater environment makes routing more challenging as compared to terrestrial WSNs. Most of the existing schemes deploy mobile sensors or a mobile sink (MS) to maximize data gathering. However, the relatively high deployment cost prevents their usage in most applications. Thus, this paper presents an autonomous underwater vehicle (AUV)-aided efficient data-gathering (AEDG) routing protocol for reliable data delivery in UWSNs. To prolong the network lifetime, AEDG employs an AUV for data collection from gateways and uses a shortest path tree (SPT) algorithm while associating sensor nodes with the gateways. The AEDG protocol also limits the number of associated nodes with the gateway nodes to minimize the network energy consumption and to prevent the gateways from overloading. Moreover, gateways are rotated with the passage of time to balance the energy consumption of the network. To prevent data loss, AEDG allows dynamic data collection at the AUV depending on the limited number of member nodes that are associated with each gateway. We also develop a sub-optimal elliptical trajectory of AUV by using a connected dominating set (CDS) to further facilitate network throughput maximization. The performance of the AEDG is validated via simulations, which demonstrate the effectiveness of AEDG in comparison to two existing UWSN routing protocols in terms of the selected performance metrics.

  9. An Efficient Data-Gathering Routing Protocol for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadeem Javaid

    2015-11-01

    Full Text Available Most applications of underwater wireless sensor networks (UWSNs demand reliable data delivery over a longer period in an efficient and timely manner. However, the harsh and unpredictable underwater environment makes routing more challenging as compared to terrestrial WSNs. Most of the existing schemes deploy mobile sensors or a mobile sink (MS to maximize data gathering. However, the relatively high deployment cost prevents their usage in most applications. Thus, this paper presents an autonomous underwater vehicle (AUV-aided efficient data-gathering (AEDG routing protocol for reliable data delivery in UWSNs. To prolong the network lifetime, AEDG employs an AUV for data collection from gateways and uses a shortest path tree (SPT algorithm while associating sensor nodes with the gateways. The AEDG protocol also limits the number of associated nodes with the gateway nodes to minimize the network energy consumption and to prevent the gateways from overloading. Moreover, gateways are rotated with the passage of time to balance the energy consumption of the network. To prevent data loss, AEDG allows dynamic data collection at the AUV depending on the limited number of member nodes that are associated with each gateway. We also develop a sub-optimal elliptical trajectory of AUV by using a connected dominating set (CDS to further facilitate network throughput maximization. The performance of the AEDG is validated via simulations, which demonstrate the effectiveness of AEDG in comparison to two existing UWSN routing protocols in terms of the selected performance metrics.

  10. Blind equalization for underwater communications

    NARCIS (Netherlands)

    Blom, K.C.H.

    2014-01-01

    Underwater wireless (sensor) networks would vastly improve man's ability to explore and exploit remote aquatic environments. Despite underwater sensor and vehicle technology being relatively mature, underwater communications is still a major challenge. The most challenging characteristics of the

  11. Social networks as a new tool of information warfare in the modern world

    Directory of Open Access Journals (Sweden)

    B. W. Kovalevych

    2014-03-01

    Full Text Available With the rapid development of information technologies, especially the Internet, people are becoming increasingly dependent on information that surrounds them. And social networks, where a person spends most of their time, become the ideal instruments of influence on the people consciousness and information warfare. Due to psychological factors ( such as ‘spiral of silence’, the herd instinct, the entire credibility of published information, opinion leaders, the desire for self­realization or replacement of reality that influence the human behavior in the network and the use of models of influence (model of network attack, model of involving users as volunteers, total block model, social networks become a platform for the dissemination of political ideas, ideologies and implementation of the ‘color revolutions’. However, social media play a positive role, especially in the establishment of civil society and the free flow of information. Positive or negative impact of networks primary depends on the purpose of use of social networking tools.

  12. Energy balanced strategies for maximizing the lifetime of sparsely deployed underwater acoustic sensor networks.

    Science.gov (United States)

    Luo, Hanjiang; Guo, Zhongwen; Wu, Kaishun; Hong, Feng; Feng, Yuan

    2009-01-01

    Underwater acoustic sensor networks (UWA-SNs) are envisioned to perform monitoring tasks over the large portion of the world covered by oceans. Due to economics and the large area of the ocean, UWA-SNs are mainly sparsely deployed networks nowadays. The limited battery resources is a big challenge for the deployment of such long-term sensor networks. Unbalanced battery energy consumption will lead to early energy depletion of nodes, which partitions the whole networks and impairs the integrity of the monitoring datasets or even results in the collapse of the entire networks. On the contrary, balanced energy dissipation of nodes can prolong the lifetime of such networks. In this paper, we focus on the energy balance dissipation problem of two types of sparsely deployed UWA-SNs: underwater moored monitoring systems and sparsely deployed two-dimensional UWA-SNs. We first analyze the reasons of unbalanced energy consumption in such networks, then we propose two energy balanced strategies to maximize the lifetime of networks both in shallow and deep water. Finally, we evaluate our methods by simulations and the results show that the two strategies can achieve balanced energy consumption per node while at the same time prolong the networks lifetime.

  13. An OFDM Receiver with Frequency Domain Diversity Combined Impulsive Noise Canceller for Underwater Network.

    Science.gov (United States)

    Saotome, Rie; Hai, Tran Minh; Matsuda, Yasuto; Suzuki, Taisaku; Wada, Tomohisa

    2015-01-01

    In order to explore marine natural resources using remote robotic sensor or to enable rapid information exchange between ROV (remotely operated vehicles), AUV (autonomous underwater vehicle), divers, and ships, ultrasonic underwater communication systems are used. However, if the communication system is applied to rich living creature marine environment such as shallow sea, it suffers from generated Impulsive Noise so-called Shrimp Noise, which is randomly generated in time domain and seriously degrades communication performance in underwater acoustic network. With the purpose of supporting high performance underwater communication, a robust digital communication method for Impulsive Noise environments is necessary. In this paper, we propose OFDM ultrasonic communication system with diversity receiver. The main feature of the receiver is a newly proposed Frequency Domain Diversity Combined Impulsive Noise Canceller. The OFDM receiver utilizes 20-28 KHz ultrasonic channel and subcarrier spacing of 46.875 Hz (MODE3) and 93.750 Hz (MODE2) OFDM modulations. In addition, the paper shows Impulsive Noise distribution data measured at a fishing port in Okinawa and at a barge in Shizuoka prefectures and then proposed diversity OFDM transceivers architecture and experimental results are described. By the proposed Impulsive Noise Canceller, frame bit error rate has been decreased by 20-30%.

  14. An OFDM Receiver with Frequency Domain Diversity Combined Impulsive Noise Canceller for Underwater Network

    Directory of Open Access Journals (Sweden)

    Rie Saotome

    2015-01-01

    Full Text Available In order to explore marine natural resources using remote robotic sensor or to enable rapid information exchange between ROV (remotely operated vehicles, AUV (autonomous underwater vehicle, divers, and ships, ultrasonic underwater communication systems are used. However, if the communication system is applied to rich living creature marine environment such as shallow sea, it suffers from generated Impulsive Noise so-called Shrimp Noise, which is randomly generated in time domain and seriously degrades communication performance in underwater acoustic network. With the purpose of supporting high performance underwater communication, a robust digital communication method for Impulsive Noise environments is necessary. In this paper, we propose OFDM ultrasonic communication system with diversity receiver. The main feature of the receiver is a newly proposed Frequency Domain Diversity Combined Impulsive Noise Canceller. The OFDM receiver utilizes 20–28 KHz ultrasonic channel and subcarrier spacing of 46.875 Hz (MODE3 and 93.750 Hz (MODE2 OFDM modulations. In addition, the paper shows Impulsive Noise distribution data measured at a fishing port in Okinawa and at a barge in Shizuoka prefectures and then proposed diversity OFDM transceivers architecture and experimental results are described. By the proposed Impulsive Noise Canceller, frame bit error rate has been decreased by 20–30%.

  15. Optimal Estimation of Glider’s Underwater Trajectory with Depth-Dependent Correction Using the Navy Coastal Ocean Model with Application to Antisubmarine Warfare

    Science.gov (United States)

    2014-09-01

    Algorithm ...........................................16 2. The Slocum ...33 1. The Slocum Electric Data...8 Figure 5. Three Types of Underwater Glider: (a) the Slocum (from Autonomous Undersea Vehicle

  16. Event Coverage Detection and Event Source Determination in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhangbing Zhou

    2015-12-01

    Full Text Available With the advent of the Internet of Underwater Things, smart things are deployed in the ocean space and establish underwater wireless sensor networks for the monitoring of vast and dynamic underwater environments. When events are found to have possibly occurred, accurate event coverage should be detected, and potential event sources should be determined for the enactment of prompt and proper responses. To address this challenge, a technique that detects event coverage and determines event sources is developed in this article. Specifically, the occurrence of possible events corresponds to a set of neighboring sensor nodes whose sensory data may deviate from a normal sensing range in a collective fashion. An appropriate sensor node is selected as the relay node for gathering and routing sensory data to sink node(s. When sensory data are collected at sink node(s, the event coverage is detected and represented as a weighted graph, where the vertices in this graph correspond to sensor nodes and the weight specified upon the edges reflects the extent of sensory data deviating from a normal sensing range. Event sources are determined, which correspond to the barycenters in this graph. The results of the experiments show that our technique is more energy efficient, especially when the network topology is relatively steady.

  17. Event Coverage Detection and Event Source Determination in Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Zhou, Zhangbing; Xing, Riliang; Duan, Yucong; Zhu, Yueqin; Xiang, Jianming

    2015-12-15

    With the advent of the Internet of Underwater Things, smart things are deployed in the ocean space and establish underwater wireless sensor networks for the monitoring of vast and dynamic underwater environments. When events are found to have possibly occurred, accurate event coverage should be detected, and potential event sources should be determined for the enactment of prompt and proper responses. To address this challenge, a technique that detects event coverage and determines event sources is developed in this article. Specifically, the occurrence of possible events corresponds to a set of neighboring sensor nodes whose sensory data may deviate from a normal sensing range in a collective fashion. An appropriate sensor node is selected as the relay node for gathering and routing sensory data to sink node(s). When sensory data are collected at sink node(s), the event coverage is detected and represented as a weighted graph, where the vertices in this graph correspond to sensor nodes and the weight specified upon the edges reflects the extent of sensory data deviating from a normal sensing range. Event sources are determined, which correspond to the barycenters in this graph. The results of the experiments show that our technique is more energy efficient, especially when the network topology is relatively steady.

  18. A topology reorganization scheme for reliable communication in underwater wireless sensor networks affected by shadow zones.

    Science.gov (United States)

    Domingo, Mari Carmen

    2009-01-01

    Effective solutions should be devised to handle the effects of shadow zones in Underwater Wireless Sensor Networks (UWSNs). An adaptive topology reorganization scheme that maintains connectivity in multi-hop UWSNs affected by shadow zones has been developed in the context of two Spanish-funded research projects. A mathematical model has been proposed to find the optimal location for sensors with two objectives: the minimization of the transmission loss and the maintenance of network connectivity. The theoretical analysis and the numerical evaluations reveal that our scheme reduces the transmission loss under all propagation phenomena scenarios for all water depths in UWSNs and improves the signal-to-noise ratio.

  19. A Topology Reorganization Scheme for Reliable Communication in Underwater Wireless Sensor Networks Affected by Shadow Zones

    Directory of Open Access Journals (Sweden)

    Mari Carmen Domingo

    2009-10-01

    Full Text Available Effective solutions should be devised to handle the effects of shadow zones in Underwater Wireless Sensor Networks (UWSNs. An adaptive topology reorganization scheme that maintains connectivity in multi-hop UWSNs affected by shadow zones has been developed in the context of two Spanish-funded research projects. A mathematical model has been proposed to find the optimal location for sensors with two objectives: the minimization of the transmission loss and the maintenance of network connectivity. The theoretical analysis and the numerical evaluations reveal that our scheme reduces the transmission loss under all propagation phenomena scenarios for all water depths in UWSNs and improves the signal-to-noise ratio.

  20. A New Node Deployment and Location Dispatch Algorithm for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Peng Jiang

    2016-01-01

    Full Text Available Considering that deployment strategies for underwater sensor networks should contribute to fully connecting the networks, a Guaranteed Full Connectivity Node Deployment (GFCND algorithm is proposed in this study. The GFCND algorithm attempts to deploy the coverage nodes according to the greedy iterative strategy, after which the connectivity nodes are used to improve network connectivity and fully connect the whole network. Furthermore, a Location Dispatch Based on Command Nodes (LDBCN algorithm is proposed, which accomplishes the location adjustment of the common nodes with the help of the SINK node and the command nodes. The command nodes then dispatch the common nodes. Simulation results show that the GFCND algorithm achieves a comparatively large coverage percentage and a fully connected network; furthermore, the LDBCN algorithm helps the common nodes preserve more total energy when they reach their destination locations.

  1. Optimal hop position-based minimum energy routing protocol for underwater acoustic sensor networks

    Directory of Open Access Journals (Sweden)

    K.S. Geethu

    2015-05-01

    Full Text Available Development of energy-efficient routing protocols is a major concern in the design of underwater acoustic sensor networks (UASNs since UASN nodes are typically powered by batteries, which are difficult to replace or recharge in aquatic environments. This study proposes an optimal hop position-based energy-efficient routing protocol for UASNs. Initially, the authors present an analytical model to compute the total energy consumption in a multi-hop UASN for deep water scenario, taking into account dependence of usable bandwidth on transmission distance and propagation characteristics of underwater acoustic channel. They derive analytical solution for the optimal hop distance that minimises total energy consumption in the network. They then propose an energy-efficient routing protocol that relies on the computation of optimal hop distance. In their routing scheme, selection of forwarding nodes are based on their depth, residual energy and closeness to the computed optimal hop position corresponding to source node. Simulation results show that total energy consumption of the network gets reduced drastically, leading to improvement in network lifetime. Moreover, the proposed routing scheme makes use of courier nodes to handle coverage-hole problem. The efficient movement of courier nodes improves packet delivery ratio and network throughput.

  2. Throughput Analysis on 3-Dimensional Underwater Acoustic Network with One-Hop Mobile Relay.

    Science.gov (United States)

    Zhong, Xuefeng; Chen, Fangjiong; Fan, Jiasheng; Guan, Quansheng; Ji, Fei; Yu, Hua

    2018-01-16

    Underwater acoustic communication network (UACN) has been considered as an essential infrastructure for ocean exploitation. Performance analysis of UACN is important in underwater acoustic network deployment and management. In this paper, we analyze the network throughput of three-dimensional randomly deployed transmitter-receiver pairs. Due to the long delay of acoustic channels, complicated networking protocols with heavy signaling overhead may not be appropriate. In this paper, we consider only one-hop or two-hop transmission, to save the signaling cost. That is, we assume the transmitter sends the data packet to the receiver by one-hop direct transmission, or by two-hop transmission via mobile relays. We derive the closed-form formulation of packet delivery rate with respect to the transmission delay and the number of transmitter-receiver pairs. The correctness of the derivation results are verified by computer simulations. Our analysis indicates how to obtain a precise tradeoff between the delay constraint and the network capacity.

  3. A scalable global positioning system-free localization scheme for underwater wireless sensor networks

    KAUST Repository

    Mohammed, A.M.

    2013-05-07

    Seaweb is an acoustic communication technology that enables communication between sensor nodes. Seaweb technology utilizes the commercially available telesonar modems that has developed link and network layer firmware to provide a robust undersea communication capability. Seaweb interconnects the underwater nodes through digital signal processing-based modem by using acoustic links between the neighboring sensors. In this paper, we design and investigate a global positioning system-free passive localization protocol by integrating the innovations of levelling and localization with the Seaweb technology. This protocol uses the range data and planar trigonometry principles to estimate the positions of the underwater sensor nodes. Moreover, for precise localization, we consider more realistic conditions namely, (a) small displacement of sensor nodes due to watch circles and (b) deployment of sensor nodes over non-uniform water surface. Once the nodes are localized, we divide the whole network field into circular levels and sectors to minimize the traffic complexity and thereby increases the lifetime of the sensor nodes in the network field. We then form the mesh network inside each of the sectors that increases the reliability. The algorithm is designed in such a way that it overcomes the ambiguous nodes errata and reflected paths and therefore makes the algorithm more robust. The synthetic network geometries are so designed which can evaluate the algorithm in the presence of perfect or imperfect ranges or in case of incomplete data. A comparative study is made with the existing algorithms which proves the efficiency of our newly proposed algorithm. 2013 Mohammed et al.

  4. Underwater Rays

    Science.gov (United States)

    Cepic, Mojca

    2008-01-01

    Light beams in wavy unclear water, also called underwater rays, and caustic networks of light formed at the bottom of shallow water are two faces of a single phenomenon. Derivation of the caustic using only simple geometry, Snell's law and simple derivatives accounts for observations such as the existence of the caustic network on vertical walls,…

  5. Network lifetime-aware data collection in Underwater Sensor ...

    Indian Academy of Sciences (India)

    Jalaja Janardanan Kartha

    2017-09-07

    Sep 7, 2017 ... Department of Electronics and Communication Engineering, National Institute of Technology, Calicut 673601,. India e-mail: jalaja@rit.ac.in; ... The unique characteristics of acoustic communication such as high and variable ... connectivity gaps in the network, one strategy is to make. *For correspondence.

  6. Toward a Mobility-Driven Architecture for Multimodal Underwater Networking

    Science.gov (United States)

    2017-02-01

    interest in the undersea domain, sparked by applications including environmental monitoring, deep-sea exploration and exploitation, and undersea...allow them to gather large volumes of data, ranging from acoustic and environmental measurements to high-resolution imagery and video. Although they...of Partially Observed Dynamical Processes over Networks via Dictionary Learning,” IEEE Transactions on Signal Processing. vol. 62, no. 13 (July), pp

  7. A GPS-free passive acoustic localization scheme for underwater wireless sensor networks

    KAUST Repository

    Mirza, Mohammed

    2011-10-01

    Seaweb is an acoustic communication technology that enables communication between sensor nodes. Seaweb interconnects the underwater nodes through digital signal processing (DSP)-based modem by using acoustic links between the neighbouring sensors. In this paper, we design and investigate a global positioning system (GPS)-free passive localization protocol using seaweb technology. This protocol uses the range data and planar trigonometry to estimate the positions of the discovered nodes. We take into consideration the small displacement of sensor nodes due to watch circles and placement of sensor nodes on non-uniform underwater surface, for precise localization. Once the nodes are localized, we divide the whole network .eld into circular levels that minimizes the traf.c complexity and thereby increases the lifetime of the sensor network .eld. We then form the mesh network inside each of the circular levels that increases the reliability. The algorithm is designed in such a way that it overcomes the ambiguous nodes errata and re.ected paths and makes the algorithm more robust. The synthetic network geometries are so designed which can evaluate the algorithm in the presence of perfect or imperfect ranges or in case of incomplete data. A comparative study is made with the existing algorithms which proves our newly proposed algorithm to be more effective. © 2011 IEEE.

  8. A New Resource Allocation Protocol for the Backhaul of Underwater Cellular Wireless Networks

    Directory of Open Access Journals (Sweden)

    Changho Yun

    2018-01-01

    Full Text Available In this paper, an underwater base station initiating (UBSI resource allocation is proposed for underwater cellular wireless networks (UCWNs, which is a new approach to determine the backhaul capacity of underwater base stations (UBSs. This backhaul is a communication link from a UBS to a UBS controller (UBSC. Contrary to conventional resource allocation protocols, a UBS initiates to re-determine its backhaul capacity for itself according to its queue status; it releases a portion of its backhaul capacity in the case of experiencing resource under-utilization, and also requests additional backhaul capacity to the UBSC if packet drops are caused due to queue-overflow. This protocol can be appropriate and efficient to the underwater backhaul link where the transmission rate is quite low and the latency is unneglectable. In order to investigate the applicability of the UBSI resource allocation protocol to the UCWN, its performance is extensively analyzed via system level simulations. In our analysis, considered performance measures include average packet drop rate, average resource utilization, average message overhead, and the reserved capacity of the UBSC. In particular, the simulation results show that our proposed protocol not only utilizes most of the given backhaul capacity (more than 90 percent of resource utilization on the average, but also reduces controlling message overheads induced by resource allocation (less than 2 controlling messages on the average. It is expected that the simulation results and analysis in this paper can be used as operating guidelines to apply our new resource allocation protocol for the UCWN.

  9. A climatology of the California Current System from a network of underwater gliders

    Science.gov (United States)

    Rudnick, Daniel L.; Zaba, Katherine D.; Todd, Robert E.; Davis, Russ E.

    2017-05-01

    Autonomous underwater gliders offer the possibility of sustained observation of the coastal ocean. Since 2006 Spray underwater gliders in the California Underwater Glider Network (CUGN) have surveyed along California Cooperative Oceanic Fisheries Investigations (CalCOFI) lines 66.7, 80.0, and 90.0, constituting the world's longest sustained glider network, to our knowledge. In this network, gliders dive between the surface and 500 m, completing a cycle in 3 h and covering 3 km in that time. Sections extend 350-500 km offshore and take 2-3 weeks to occupy. Measured variables include pressure, temperature, salinity, and depth-average velocity. The CUGN has amassed over 10,000 glider-days, covering over 210,000 km with over 95,000 dives. These data are used to produce a climatology whose products are for each variable a mean field, an annual cycle, and the anomaly from the annual cycle. The analysis includes a weighted least-squares fit to derive the mean and annual cycle, and an objective map to produce the anomaly. The final results are variables on rectangular grids in depth, distance offshore, and time. The mean fields are finely resolved sections across the main flows in the California Current System, including the poleward California Undercurrent and the equatorward California Current. The annual cycle shows a phase change from the surface to the thermocline, reflecting the effects of air/sea fluxes at the surface and upwelling in the thermocline. The interannual anomalies are examined with an emphasis on climate events of the last ten years including the 2009-2010 El Niño, the 2010-2011 La Niña, the warm anomaly of 2014-2015, and the 2015-2016 El Niño.

  10. Throughput and energy efficiency of a cooperative hybrid ARQ protocol for underwater acoustic sensor networks.

    Science.gov (United States)

    Ghosh, Arindam; Lee, Jae-Won; Cho, Ho-Shin

    2013-11-08

    Due to its efficiency, reliability and better channel and resource utilization, cooperative transmission technologies have been attractive options in underwater as well as terrestrial sensor networks. Their performance can be further improved if merged with forward error correction (FEC) techniques. In this paper, we propose and analyze a retransmission protocol named Cooperative-Hybrid Automatic Repeat reQuest (C-HARQ) for underwater acoustic sensor networks, which exploits both the reliability of cooperative ARQ (CARQ) and the efficiency of incremental redundancy-hybrid ARQ (IR-HARQ) using rate-compatible punctured convolution (RCPC) codes. Extensive Monte Carlo simulations are performed to investigate the performance of the protocol, in terms of both throughput and energy efficiency. The results clearly reveal the enhancement in performance achieved by the C-HARQ protocol, which outperforms both CARQ and conventional stop and wait ARQ (S&W ARQ). Further, using computer simulations, optimum values of various network parameters are estimated so as to extract the best performance out of the C-HARQ protocol.

  11. Coalition Warfare Program (CWP): secure policy controlled information query and dissemination over a Bices network

    Science.gov (United States)

    Toth, Andrew; Pham, Tien; Karr, Todd; Bent, Graham; Harries, Dominic; Knox, Alan

    2013-05-01

    In 2006, the US Army Research Laboratory (ARL) and the UK Ministry of Defence (MoD) established a collaborative research alliance with academia and industry, called the International Technology Alliance (ITA) to address fundamental issues concerning Network and Information Sciences. Under the ITA research program, a US-UK transition project on "ITA Policy Controlled Information Query and Dissemination" was funded in 2011 by OSD's Coalition Warfare Program (CWP). The goal of this CWP project is to develop an extensible capability of performing distributed federated query and information dissemination across a coalition network of distributed disparate data/information sources with access­ controlled policies. The CWP project is lead by US Army Research Laboratory (ARL) and UK Defence Science Technology Laboratory (Dstl) with software development by IBM UK and IBM US. The CWP project exploits two key technology components developed within the ITA, namely the Gaian Database and integrated Access Policy Decision and Enforcement mechanisms. The Gaian Database (GaianDB) is a Dynamic Distributed Federated Database (DDFD) that addresses a need to share information among coalition members by providing a means for policy-controlled access to data across a network of heterogeneous data sources. GaianDB implements a SQL-compliant Store-Locally-Query-Anywhere (SLQA) approach providing software applications with global access to data from any node in the database network via standard SQL queries. Security policy is stored locally and enforced at the database node level, reducing potential for unauthorized data access and waste of network bandwidth. A key metric of success for a CWP project is the transition of coalition-related technology from TRL-3 or 4 to TRL-6 or higher. Thus, the end goal of this CWP project was to demonstrate the GaianDB and policy technology within an operational environment at the NATO Intelligence Fusion Centre (NIFC) at Molesworth RAF. An initial

  12. Probabilistic Neighborhood-Based Data Collection Algorithms for 3D Underwater Acoustic Sensor Networks.

    Science.gov (United States)

    Han, Guangjie; Li, Shanshan; Zhu, Chunsheng; Jiang, Jinfang; Zhang, Wenbo

    2017-02-08

    Marine environmental monitoring provides crucial information and support for the exploitation, utilization, and protection of marine resources. With the rapid development of information technology, the development of three-dimensional underwater acoustic sensor networks (3D UASNs) provides a novel strategy to acquire marine environment information conveniently, efficiently and accurately. However, the specific propagation effects of acoustic communication channel lead to decreased successful information delivery probability with increased distance. Therefore, we investigate two probabilistic neighborhood-based data collection algorithms for 3D UASNs which are based on a probabilistic acoustic communication model instead of the traditional deterministic acoustic communication model. An autonomous underwater vehicle (AUV) is employed to traverse along the designed path to collect data from neighborhoods. For 3D UASNs without prior deployment knowledge, partitioning the network into grids can allow the AUV to visit the central location of each grid for data collection. For 3D UASNs in which the deployment knowledge is known in advance, the AUV only needs to visit several selected locations by constructing a minimum probabilistic neighborhood covering set to reduce data latency. Otherwise, by increasing the transmission rounds, our proposed algorithms can provide a tradeoff between data collection latency and information gain. These algorithms are compared with basic Nearest-neighbor Heuristic algorithm via simulations. Simulation analyses show that our proposed algorithms can efficiently reduce the average data collection completion time, corresponding to a decrease of data latency.

  13. EARLY DETECTION OF NEAR-FIELD TSUNAMIS USING UNDERWATER SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    L. E. Freitag

    2012-01-01

    Full Text Available We propose a novel approach for near-field tsunami detection, specifically for the area near the city of Padang, Indonesia. Padang is located on the western shore of Sumatra, directly across from the Mentawai segment of the Sunda Trench, where accumulated strain has not been released since the great earthquake of 1797. Consequently, the risk of a major tsunamigenic earthquake on this segment is high. Currently, no ocean-bottom pressure sensors are deployed in the Mentawai basin to provide a definitive tsunami warning for Padang. Timely warnings are essential to initiate evacuation procedures and minimize loss of human life. Our approach augments existing technology with a network of underwater sensors to detect tsunamis generated by an earthquake or landslide fast enough to provide at least 15 minutes of warning. Data from the underwater sensor network would feed into existing decision support systems that accept input from land and sea-based sensors and provide warning information to city and regional authorities.

  14. SIMULATION AND ANALYSIS OF GREEDY ROUTING PROTOCOL IN VIEW OF ENERGY CONSUMPTION AND NETWORK LIFETIME IN THREE DIMENSIONAL UNDERWATER WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    SHEENA KOHLI

    2017-11-01

    Full Text Available Underwater Wireless Sensor Network (UWSN comprises of a number of miniature sized sensing devices deployed in the sea or ocean, connected by dint of acoustic links to each other. The sensors trap the ambient conditions and transmit the data from one end to another. For transmission of data in any medium, routing protocols play a crucial role. Moreover, being battery limited, an unavoidable parameter to be considered in operation and analysis of protocols is the network energy and the network lifetime. The paper discusses the greedy routing protocol for underwater wireless sensor networks. The simulation of this routing protocol also takes into consideration the characteristics of acoustic communication like attenuation, transmission loss, signal to noise ratio, noise, propagation delay. The results from these observations may be used to construct an accurate underwater communication model.

  15. Research on Localization Algorithms Based on Acoustic Communication for Underwater Sensor Networks.

    Science.gov (United States)

    Luo, Junhai; Fan, Liying; Wu, Shan; Yan, Xueting

    2018-01-03

    The water source, as a significant body of the earth, with a high value, serves as a hot topic to study Underwater Sensor Networks (UWSNs). Various applications can be realized based on UWSNs. Our paper mainly concentrates on the localization algorithms based on the acoustic communication for UWSNs. An in-depth survey of localization algorithms is provided for UWSNs. We first introduce the acoustic communication, network architecture, and routing technique in UWSNs. The localization algorithms are classified into five aspects, namely, computation algorithm, spatial coverage, range measurement, the state of the nodes and communication between nodes that are different from all other survey papers. Moreover, we collect a lot of pioneering papers, and a comprehensive comparison is made. In addition, some challenges and open issues are raised in our paper.

  16. A TDoA Localization Scheme for Underwater Sensor Networks with Use of Multilinear Chirp Signals

    Directory of Open Access Journals (Sweden)

    En Cheng

    2016-01-01

    Full Text Available Due to the multipath, Doppler, and other effects, the node location signals have high probability of access collision in the underwater acoustic sensor networks (UW-ASNs, and therefore, it causes the signal lost and the access block; therefore, it constrains the networks performance. In this paper, we take the multilinear chirp (MLC signals as the location signal to improve the anticollision ability. In order to increase the detection efficiency of MLC, we propose a fast efficient detection method called mixing change rate-fractional Fourier transform (MCR-FrFT. This method transforms the combined rates of MLC into symmetry triangle rates and then separates the multiuser signals based on the transformed rates by using FrFT. Theoretical derivation and simulation results show that the proposed method can detect the locations signals, estimate the time difference of arrival (TDoA, reduce the multiple access interference, and improve the location performance.

  17. Node Deployment Algorithm Based on Connected Tree for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Peng Jiang

    2015-07-01

    Full Text Available Designing an efficient deployment method to guarantee optimal monitoring quality is one of the key topics in underwater sensor networks. At present, a realistic approach of deployment involves adjusting the depths of nodes in water. One of the typical algorithms used in such process is the self-deployment depth adjustment algorithm (SDDA. This algorithm mainly focuses on maximizing network coverage by constantly adjusting node depths to reduce coverage overlaps between two neighboring nodes, and thus, achieves good performance. However, the connectivity performance of SDDA is irresolute. In this paper, we propose a depth adjustment algorithm based on connected tree (CTDA. In CTDA, the sink node is used as the first root node to start building a connected tree. Finally, the network can be organized as a forest to maintain network connectivity. Coverage overlaps between the parent node and the child node are then reduced within each sub-tree to optimize coverage. The hierarchical strategy is used to adjust the distance between the parent node and the child node to reduce node movement. Furthermore, the silent mode is adopted to reduce communication cost. Simulations show that compared with SDDA, CTDA can achieve high connectivity with various communication ranges and different numbers of nodes. Moreover, it can realize coverage as high as that of SDDA with various sensing ranges and numbers of nodes but with less energy consumption. Simulations under sparse environments show that the connectivity and energy consumption performances of CTDA are considerably better than those of SDDA. Meanwhile, the connectivity and coverage performances of CTDA are close to those depth adjustment algorithms base on connected dominating set (CDA, which is an algorithm similar to CTDA. However, the energy consumption of CTDA is less than that of CDA, particularly in sparse underwater environments.

  18. EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks.

    Science.gov (United States)

    Bouk, Safdar Hussain; Ahmed, Syed Hassan; Park, Kyung-Joon; Eun, Yongsoon

    2017-09-26

    Underwater Acoustic Sensor Network (UASN) comes with intrinsic constraints because it is deployed in the aquatic environment and uses the acoustic signals to communicate. The examples of those constraints are long propagation delay, very limited bandwidth, high energy cost for transmission, very high signal attenuation, costly deployment and battery replacement, and so forth. Therefore, the routing schemes for UASN must take into account those characteristics to achieve energy fairness, avoid energy holes, and improve the network lifetime. The depth based forwarding schemes in literature use node's depth information to forward data towards the sink. They minimize the data packet duplication by employing the holding time strategy. However, to avoid void holes in the network, they use two hop node proximity information. In this paper, we propose the Energy and Depth variance-based Opportunistic Void avoidance (EDOVE) scheme to gain energy balancing and void avoidance in the network. EDOVE considers not only the depth parameter, but also the normalized residual energy of the one-hop nodes and the normalized depth variance of the second hop neighbors. Hence, it avoids the void regions as well as balances the network energy and increases the network lifetime. The simulation results show that the EDOVE gains more than 15 % packet delivery ratio, propagates 50 % less copies of data packet, consumes less energy, and has more lifetime than the state of the art forwarding schemes.

  19. An Enhanced Energy Balanced Data Transmission Protocol for Underwater Acoustic Sensor Networks.

    Science.gov (United States)

    Javaid, Nadeem; Shah, Mehreen; Ahmad, Ashfaq; Imran, Muhammad; Khan, Majid Iqbal; Vasilakos, Athanasios V

    2016-04-07

    This paper presents two new energy balanced routing protocols for Underwater Acoustic Sensor Networks (UASNs); Efficient and Balanced Energy consumption Technique (EBET) and Enhanced EBET (EEBET). The first proposed protocol avoids direct transmission over long distance to save sufficient amount of energy consumed in the routing process. The second protocol overcomes the deficiencies in both Balanced Transmission Mechanism (BTM) and EBET techniques. EBET selects relay node on the basis of optimal distance threshold which leads to network lifetime prolongation. The initial energy of each sensor node is divided into energy levels for balanced energy consumption. Selection of high energy level node within transmission range avoids long distance direct data transmission. The EEBET incorporates depth threshold to minimize the number of hops between source node and sink while eradicating backward data transmissions. The EBET technique balances energy consumption within successive ring sectors, while, EEBET balances energy consumption of the entire network. In EEBET, optimum number of energy levels are also calculated to further enhance the network lifetime. Effectiveness of the proposed schemes is validated through simulations where these are compared with two existing routing protocols in terms of network lifetime, transmission loss, and throughput. The simulations are conducted under different network radii and varied number of nodes.

  20. Equation Chapter 1 Section 1Cross Layer Design for Localization in Large-Scale Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yuanfeng ZHANG

    2014-02-01

    Full Text Available There are many technical challenges for designing large-scale underwater sensor networks, especially the sensor node localization. Although many papers studied for large-scale sensor node localization, previous studies mainly study the location algorithm without the cross layer design for localization. In this paper, by utilizing the network hierarchical structure of underwater sensor networks, we propose a new large-scale underwater acoustic localization scheme based on cross layer design. In this scheme, localization is performed in a hierarchical way, and the whole localization process focused on the physical layer, data link layer and application layer. We increase the pipeline parameters which matched the acoustic channel, added in MAC protocol to increase the authenticity of the large-scale underwater sensor networks, and made analysis of different location algorithm. We conduct extensive simulations, and our results show that MAC layer protocol and the localization algorithm all would affect the result of localization which can balance the trade-off between localization accuracy, localization coverage, and communication cost.

  1. MDS-Mac: a scheduled MAC for localization, time-synchronisation and communication in underwater acoustic networks

    NARCIS (Netherlands)

    van Kleunen, W.A.P.; Meratnia, Nirvana; Havinga, Paul J.M.

    2012-01-01

    In this paper we describe a design for an underwater MAC protocol which combines localization, time-synchronisation and communication. This protocol is designed for small-scale clustered networks in which all nodes are able to ommunicate with each other. We consider an integrated design of

  2. Color filtering localization for three-dimensional underwater acoustic sensor networks.

    Science.gov (United States)

    Liu, Zhihua; Gao, Han; Wang, Wuling; Chang, Shuai; Chen, Jiaxing

    2015-03-12

    Accurate localization of mobile nodes has been an important and fundamental problem in underwater acoustic sensor networks (UASNs). The detection information returned from a mobile node is meaningful only if its location is known. In this paper, we propose two localization algorithms based on color filtering technology called PCFL and ACFL. PCFL and ACFL aim at collaboratively accomplishing accurate localization of underwater mobile nodes with minimum energy expenditure. They both adopt the overlapping signal region of task anchors which can communicate with the mobile node directly as the current sampling area. PCFL employs the projected distances between each of the task projections and the mobile node, while ACFL adopts the direct distance between each of the task anchors and the mobile node. The proportion factor of distance is also proposed to weight the RGB values. By comparing the nearness degrees of the RGB sequences between the samples and the mobile node, samples can be filtered out. The normalized nearness degrees are considered as the weighted standards to calculate the coordinates of the mobile nodes. The simulation results show that the proposed methods have excellent localization performance and can localize the mobile node in a timely way. The average localization error of PCFL is decreased by about 30.4% compared to the AFLA method.

  3. A Dynamic Bioinspired Neural Network Based Real-Time Path Planning Method for Autonomous Underwater Vehicles.

    Science.gov (United States)

    Ni, Jianjun; Wu, Liuying; Shi, Pengfei; Yang, Simon X

    2017-01-01

    Real-time path planning for autonomous underwater vehicle (AUV) is a very difficult and challenging task. Bioinspired neural network (BINN) has been used to deal with this problem for its many distinct advantages: that is, no learning process is needed and realization is also easy. However, there are some shortcomings when BINN is applied to AUV path planning in a three-dimensional (3D) unknown environment, including complex computing problem when the environment is very large and repeated path problem when the size of obstacles is bigger than the detection range of sensors. To deal with these problems, an improved dynamic BINN is proposed in this paper. In this proposed method, the AUV is regarded as the core of the BINN and the size of the BINN is based on the detection range of sensors. Then the BINN will move with the AUV and the computing could be reduced. A virtual target is proposed in the path planning method to ensure that the AUV can move to the real target effectively and avoid big-size obstacles automatically. Furthermore, a target attractor concept is introduced to improve the computing efficiency of neural activities. Finally, some experiments are conducted under various 3D underwater environments. The experimental results show that the proposed BINN based method can deal with the real-time path planning problem for AUV efficiently.

  4. A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Han, Guangjie; Liu, Li; Jiang, Jinfang; Shu, Lei; Rodrigues, Joel J P C

    2016-02-16

    Localization is one of the hottest research topics in Underwater Wireless Sensor Networks (UWSNs), since many important applications of UWSNs, e.g., event sensing, target tracking and monitoring, require location information of sensor nodes. Nowadays, a large number of localization algorithms have been proposed for UWSNs. How to improve location accuracy are well studied. However, few of them take location reliability or security into consideration. In this paper, we propose a Collaborative Secure Localization algorithm based on Trust model (CSLT) for UWSNs to ensure location security. Based on the trust model, the secure localization process can be divided into the following five sub-processes: trust evaluation of anchor nodes, initial localization of unknown nodes, trust evaluation of reference nodes, selection of reference node, and secondary localization of unknown node. Simulation results demonstrate that the proposed CSLT algorithm performs better than the compared related works in terms of location security, average localization accuracy and localization ratio.

  5. Time-Efficient High-Rate Data Flooding in One-Dimensional Acoustic Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jae Kyun Kwon

    2015-10-01

    Full Text Available Because underwater communication environments have poor characteristics, such as severe attenuation, large propagation delays and narrow bandwidths, data is normally transmitted at low rates through acoustic waves. On the other hand, as high traffic has recently been required in diverse areas, high rate transmission has become necessary. In this paper, transmission/reception timing schemes that maximize the time axis use efficiency to improve the resource efficiency for high rate transmission are proposed. The excellence of the proposed scheme is identified by examining the power distributions by node, rate bounds, power levels depending on the rates and number of nodes, and network split gains through mathematical analysis and numerical results. In addition, the simulation results show that the proposed scheme outperforms the existing packet train method.

  6. A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Guangjie Han

    2016-02-01

    Full Text Available Localization is one of the hottest research topics in Underwater Wireless Sensor Networks (UWSNs, since many important applications of UWSNs, e.g., event sensing, target tracking and monitoring, require location information of sensor nodes. Nowadays, a large number of localization algorithms have been proposed for UWSNs. How to improve location accuracy are well studied. However, few of them take location reliability or security into consideration. In this paper, we propose a Collaborative Secure Localization algorithm based on Trust model (CSLT for UWSNs to ensure location security. Based on the trust model, the secure localization process can be divided into the following five sub-processes: trust evaluation of anchor nodes, initial localization of unknown nodes, trust evaluation of reference nodes, selection of reference node, and secondary localization of unknown node. Simulation results demonstrate that the proposed CSLT algorithm performs better than the compared related works in terms of location security, average localization accuracy and localization ratio.

  7. A Q-Learning-Based Delay-Aware Routing Algorithm to Extend the Lifetime of Underwater Sensor Networks.

    Science.gov (United States)

    Jin, Zhigang; Ma, Yingying; Su, Yishan; Li, Shuo; Fu, Xiaomei

    2017-07-19

    Underwater sensor networks (UWSNs) have become a hot research topic because of their various aquatic applications. As the underwater sensor nodes are powered by built-in batteries which are difficult to replace, extending the network lifetime is a most urgent need. Due to the low and variable transmission speed of sound, the design of reliable routing algorithms for UWSNs is challenging. In this paper, we propose a Q-learning based delay-aware routing (QDAR) algorithm to extend the lifetime of underwater sensor networks. In QDAR, a data collection phase is designed to adapt to the dynamic environment. With the application of the Q-learning technique, QDAR can determine a global optimal next hop rather than a greedy one. We define an action-utility function in which residual energy and propagation delay are both considered for adequate routing decisions. Thus, the QDAR algorithm can extend the network lifetime by uniformly distributing the residual energy and provide lower end-to-end delay. The simulation results show that our protocol can yield nearly the same network lifetime, and can reduce the end-to-end delay by 20-25% compared with a classic lifetime-extended routing protocol (QELAR).

  8. Underwater Wireless Sensor Networks: how do acoustic propagation models impact the performance of higher-level protocols?

    Science.gov (United States)

    Llor, Jesús; Malumbres, Manuel P

    2012-01-01

    Several Medium Access Control (MAC) and routing protocols have been developed in the last years for Underwater Wireless Sensor Networks (UWSNs). One of the main difficulties to compare and validate the performance of different proposals is the lack of a common standard to model the acoustic propagation in the underwater environment. In this paper we analyze the evolution of underwater acoustic prediction models from a simple approach to more detailed and accurate models. Then, different high layer network protocols are tested with different acoustic propagation models in order to determine the influence of environmental parameters on the obtained results. After several experiments, we can conclude that higher-level protocols are sensitive to both: (a) physical layer parameters related to the network scenario and (b) the acoustic propagation model. Conditions like ocean surface activity, scenario location, bathymetry or floor sediment composition, may change the signal propagation behavior. So, when designing network architectures for UWSNs, the role of the physical layer should be seriously taken into account in order to assert that the obtained simulation results will be close to the ones obtained in real network scenarios.

  9. A Q-Learning-Based Delay-Aware Routing Algorithm to Extend the Lifetime of Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhigang Jin

    2017-07-01

    Full Text Available Underwater sensor networks (UWSNs have become a hot research topic because of their various aquatic applications. As the underwater sensor nodes are powered by built-in batteries which are difficult to replace, extending the network lifetime is a most urgent need. Due to the low and variable transmission speed of sound, the design of reliable routing algorithms for UWSNs is challenging. In this paper, we propose a Q-learning based delay-aware routing (QDAR algorithm to extend the lifetime of underwater sensor networks. In QDAR, a data collection phase is designed to adapt to the dynamic environment. With the application of the Q-learning technique, QDAR can determine a global optimal next hop rather than a greedy one. We define an action-utility function in which residual energy and propagation delay are both considered for adequate routing decisions. Thus, the QDAR algorithm can extend the network lifetime by uniformly distributing the residual energy and provide lower end-to-end delay. The simulation results show that our protocol can yield nearly the same network lifetime, and can reduce the end-to-end delay by 20–25% compared with a classic lifetime-extended routing protocol (QELAR.

  10. Multi-Hop-Enabled Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Khaja Shazzad

    2015-09-01

    Full Text Available In multi-hop underwater acoustic sensor networks (UWASNs, packet collisions due to hidden and local nodes adversely affect throughput, energy efficiency and end-to-end delay. Existing medium access control (MAC protocols try to solve the problem by utilizing a single-phase contention resolution mechanism, which causes a large number of control packet exchanges and energy overhead. In this paper, we introduce a MAC protocol that splits this single-phase contention resolution mechanism into two phases to provide efficient multi-hop networking. In the first phase, local nodes are eliminated from the contention, and in the later phase, the adverse effects of hidden nodes are mitigated. This two-phased contention resolution provides higher energy efficiency, better throughput and shorter end-to-end delay, and it also enables adaptability for different network architectures. A probabilistic model of the proposed protocol is also developed to analyse the performance. The proposed protocol has been evaluated through quantitative analysis and simulation. Results obtained through quantitative analysis and simulation reveal that the proposed protocol achieves significantly better energy efficiency, higher and more stable throughput and lower end-to-end delay compared to existing protocols, namely T-Lohi and slotted floor acquisition multiple access (S-FAMA.

  11. A Glider-Assisted Link Disruption Restoration Mechanism in Underwater Acoustic Sensor Networks.

    Science.gov (United States)

    Jin, Zhigang; Wang, Ning; Su, Yishan; Yang, Qiuling

    2018-02-07

    Underwater acoustic sensor networks (UASNs) have become a hot research topic. In UASNs, nodes can be affected by ocean currents and external forces, which could result in sudden link disruption. Therefore, designing a flexible and efficient link disruption restoration mechanism to ensure the network connectivity is a challenge. In the paper, we propose a glider-assisted restoration mechanism which includes link disruption recognition and related link restoring mechanism. In the link disruption recognition mechanism, the cluster heads collect the link disruption information and then schedule gliders acting as relay nodes to restore the disrupted link. Considering the glider's sawtooth motion, we design a relay location optimization algorithm with a consideration of both the glider's trajectory and acoustic channel attenuation model. The utility function is established by minimizing the channel attenuation and the optimal location of glider is solved by a multiplier method. The glider-assisted restoration mechanism can greatly improve the packet delivery rate and reduce the communication energy consumption and it is more general for the restoration of different link disruption scenarios. The simulation results show that glider-assisted restoration mechanism can improve the delivery rate of data packets by 15-33% compared with cooperative opportunistic routing (OVAR), the hop-by-hop vector-based forwarding (HH-VBF) and the vector based forward (VBF) methods, and reduce communication energy consumption by 20-58% for a typical network's setting.

  12. Containment control of networked autonomous underwater vehicles: A predictor-based neural DSC design.

    Science.gov (United States)

    Peng, Zhouhua; Wang, Dan; Wang, Wei; Liu, Lu

    2015-11-01

    This paper investigates the containment control problem of networked autonomous underwater vehicles in the presence of model uncertainty and unknown ocean disturbances. A predictor-based neural dynamic surface control design method is presented to develop the distributed adaptive containment controllers, under which the trajectories of follower vehicles nearly converge to the dynamic convex hull spanned by multiple reference trajectories over a directed network. Prediction errors, rather than tracking errors, are used to update the neural adaptation laws, which are independent of the tracking error dynamics, resulting in two time-scales to govern the entire system. The stability property of the closed-loop network is established via Lyapunov analysis, and transient property is quantified in terms of L2 norms of the derivatives of neural weights, which are shown to be smaller than the classical neural dynamic surface control approach. Comparative studies are given to show the substantial improvements of the proposed new method. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  13. Çanakkale Savaşlarına Sualtından Bir Bakış A Look From Underwater to The Çanakkale Warfares

    Directory of Open Access Journals (Sweden)

    H.Barış ÖZALP

    2010-01-01

    Full Text Available Çanakkale Naval Warfares can basically be defined as a historic moment that tells of the campaign for liberation of its country and the state of defence of a nation’s capital. The importance of all battles taken place in Çanakkale surely are not ignored in winning the war, but the attacks occured around the coastal waters of Çanakkale Strait and Gallipoli Peninsula and sinking of the opposer’s ships and submarines can be evaluated as a significant information which is a proof that the strait can not be surpassed. If the enemy naval forces could not kept down and as a result of this, their willing to arrive at østanbul had come true, the success in Gallipoli campaign was not able to obtain. That can be stated that all arrangements planned by the Entente Powers on succeeding in war are primarily about the passing the Çanakkale Strait. Since the enemy forces and submarines have been stopped with severe damage or sunk, there have achieved success in naval battles and it was accepted by all the enemy forces that the strait was impassable. In this success, the powerfull emplacements deployed on both sides of the strait and our submarines and besides the mines laid by the Minelayer Nusret had a great effect. In Naval Warfares, many battleships and submarines owned by Entente Powers were sunk in the Çanakkale Strait and not allowed to drive into the sea of Marmara. Thus, all the plans of Entente Powers aim for conquering østanbul were interrupted and their will on winning in naval battle has been obstructed.

  14. Neural Network-Based Self-Tuning PID Control for Underwater Vehicles.

    Science.gov (United States)

    Hernández-Alvarado, Rodrigo; García-Valdovinos, Luis Govinda; Salgado-Jiménez, Tomás; Gómez-Espinosa, Alfonso; Fonseca-Navarro, Fernando

    2016-09-05

    For decades, PID (Proportional + Integral + Derivative)-like controllers have been successfully used in academia and industry for many kinds of plants. This is thanks to its simplicity and suitable performance in linear or linearized plants, and under certain conditions, in nonlinear ones. A number of PID controller gains tuning approaches have been proposed in the literature in the last decades; most of them off-line techniques. However, in those cases wherein plants are subject to continuous parametric changes or external disturbances, online gains tuning is a desirable choice. This is the case of modular underwater ROVs (Remotely Operated Vehicles) where parameters (weight, buoyancy, added mass, among others) change according to the tool it is fitted with. In practice, some amount of time is dedicated to tune the PID gains of a ROV. Once the best set of gains has been achieved the ROV is ready to work. However, when the vehicle changes its tool or it is subject to ocean currents, its performance deteriorates since the fixed set of gains is no longer valid for the new conditions. Thus, an online PID gains tuning algorithm should be implemented to overcome this problem. In this paper, an auto-tune PID-like controller based on Neural Networks (NN) is proposed. The NN plays the role of automatically estimating the suitable set of PID gains that achieves stability of the system. The NN adjusts online the controller gains that attain the smaller position tracking error. Simulation results are given considering an underactuated 6 DOF (degrees of freedom) underwater ROV. Real time experiments on an underactuated mini ROV are conducted to show the effectiveness of the proposed scheme.

  15. Neural Network-Based Self-Tuning PID Control for Underwater Vehicles

    Science.gov (United States)

    Hernández-Alvarado, Rodrigo; García-Valdovinos, Luis Govinda; Salgado-Jiménez, Tomás; Gómez-Espinosa, Alfonso; Fonseca-Navarro, Fernando

    2016-01-01

    For decades, PID (Proportional + Integral + Derivative)-like controllers have been successfully used in academia and industry for many kinds of plants. This is thanks to its simplicity and suitable performance in linear or linearized plants, and under certain conditions, in nonlinear ones. A number of PID controller gains tuning approaches have been proposed in the literature in the last decades; most of them off-line techniques. However, in those cases wherein plants are subject to continuous parametric changes or external disturbances, online gains tuning is a desirable choice. This is the case of modular underwater ROVs (Remotely Operated Vehicles) where parameters (weight, buoyancy, added mass, among others) change according to the tool it is fitted with. In practice, some amount of time is dedicated to tune the PID gains of a ROV. Once the best set of gains has been achieved the ROV is ready to work. However, when the vehicle changes its tool or it is subject to ocean currents, its performance deteriorates since the fixed set of gains is no longer valid for the new conditions. Thus, an online PID gains tuning algorithm should be implemented to overcome this problem. In this paper, an auto-tune PID-like controller based on Neural Networks (NN) is proposed. The NN plays the role of automatically estimating the suitable set of PID gains that achieves stability of the system. The NN adjusts online the controller gains that attain the smaller position tracking error. Simulation results are given considering an underactuated 6 DOF (degrees of freedom) underwater ROV. Real time experiments on an underactuated mini ROV are conducted to show the effectiveness of the proposed scheme. PMID:27608018

  16. Neural Network-Based Self-Tuning PID Control for Underwater Vehicles

    Directory of Open Access Journals (Sweden)

    Rodrigo Hernández-Alvarado

    2016-09-01

    Full Text Available For decades, PID (Proportional + Integral + Derivative-like controllers have been successfully used in academia and industry for many kinds of plants. This is thanks to its simplicity and suitable performance in linear or linearized plants, and under certain conditions, in nonlinear ones. A number of PID controller gains tuning approaches have been proposed in the literature in the last decades; most of them off-line techniques. However, in those cases wherein plants are subject to continuous parametric changes or external disturbances, online gains tuning is a desirable choice. This is the case of modular underwater ROVs (Remotely Operated Vehicles where parameters (weight, buoyancy, added mass, among others change according to the tool it is fitted with. In practice, some amount of time is dedicated to tune the PID gains of a ROV. Once the best set of gains has been achieved the ROV is ready to work. However, when the vehicle changes its tool or it is subject to ocean currents, its performance deteriorates since the fixed set of gains is no longer valid for the new conditions. Thus, an online PID gains tuning algorithm should be implemented to overcome this problem. In this paper, an auto-tune PID-like controller based on Neural Networks (NN is proposed. The NN plays the role of automatically estimating the suitable set of PID gains that achieves stability of the system. The NN adjusts online the controller gains that attain the smaller position tracking error. Simulation results are given considering an underactuated 6 DOF (degrees of freedom underwater ROV. Real time experiments on an underactuated mini ROV are conducted to show the effectiveness of the proposed scheme.

  17. A Glider-Assisted Link Disruption Restoration Mechanism in Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhigang Jin

    2018-02-01

    Full Text Available Underwater acoustic sensor networks (UASNs have become a hot research topic. In UASNs, nodes can be affected by ocean currents and external forces, which could result in sudden link disruption. Therefore, designing a flexible and efficient link disruption restoration mechanism to ensure the network connectivity is a challenge. In the paper, we propose a glider-assisted restoration mechanism which includes link disruption recognition and related link restoring mechanism. In the link disruption recognition mechanism, the cluster heads collect the link disruption information and then schedule gliders acting as relay nodes to restore the disrupted link. Considering the glider’s sawtooth motion, we design a relay location optimization algorithm with a consideration of both the glider’s trajectory and acoustic channel attenuation model. The utility function is established by minimizing the channel attenuation and the optimal location of glider is solved by a multiplier method. The glider-assisted restoration mechanism can greatly improve the packet delivery rate and reduce the communication energy consumption and it is more general for the restoration of different link disruption scenarios. The simulation results show that glider-assisted restoration mechanism can improve the delivery rate of data packets by 15–33% compared with cooperative opportunistic routing (OVAR, the hop-by-hop vector-based forwarding (HH-VBF and the vector based forward (VBF methods, and reduce communication energy consumption by 20–58% for a typical network’s setting.

  18. Underwater sensing and communication platform

    NARCIS (Netherlands)

    Zhang, Kui; van Kleunen, W.A.P.; Meratnia, Nirvana; Havinga, Paul J.M.; Tijs, Emiel

    2011-01-01

    Currently the interest in underwater acoustic communication is growing rapidly as more and more underwater monitoring systems are deployed around the world. In order to cope with the challenges of the complex underwater acoustic channel many node platforms, networking protocols, and signal

  19. A Support Vector Learning-Based Particle Filter Scheme for Target Localization in Communication-Constrained Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xinbin Li

    2017-12-01

    Full Text Available Target localization, which aims to estimate the location of an unknown target, is one of the key issues in applications of underwater acoustic sensor networks (UASNs. However, the constrained property of an underwater environment, such as restricted communication capacity of sensor nodes and sensing noises, makes target localization a challenging problem. This paper relies on fractional sensor nodes to formulate a support vector learning-based particle filter algorithm for the localization problem in communication-constrained underwater acoustic sensor networks. A node-selection strategy is exploited to pick fractional sensor nodes with short-distance pattern to participate in the sensing process at each time frame. Subsequently, we propose a least-square support vector regression (LSSVR-based observation function, through which an iterative regression strategy is used to deal with the distorted data caused by sensing noises, to improve the observation accuracy. At the same time, we integrate the observation to formulate the likelihood function, which effectively update the weights of particles. Thus, the particle effectiveness is enhanced to avoid “particle degeneracy” problem and improve localization accuracy. In order to validate the performance of the proposed localization algorithm, two different noise scenarios are investigated. The simulation results show that the proposed localization algorithm can efficiently improve the localization accuracy. In addition, the node-selection strategy can effectively select the subset of sensor nodes to improve the communication efficiency of the sensor network.

  20. A Support Vector Learning-Based Particle Filter Scheme for Target Localization in Communication-Constrained Underwater Acoustic Sensor Networks.

    Science.gov (United States)

    Li, Xinbin; Zhang, Chenglin; Yan, Lei; Han, Song; Guan, Xinping

    2017-12-21

    Target localization, which aims to estimate the location of an unknown target, is one of the key issues in applications of underwater acoustic sensor networks (UASNs). However, the constrained property of an underwater environment, such as restricted communication capacity of sensor nodes and sensing noises, makes target localization a challenging problem. This paper relies on fractional sensor nodes to formulate a support vector learning-based particle filter algorithm for the localization problem in communication-constrained underwater acoustic sensor networks. A node-selection strategy is exploited to pick fractional sensor nodes with short-distance pattern to participate in the sensing process at each time frame. Subsequently, we propose a least-square support vector regression (LSSVR)-based observation function, through which an iterative regression strategy is used to deal with the distorted data caused by sensing noises, to improve the observation accuracy. At the same time, we integrate the observation to formulate the likelihood function, which effectively update the weights of particles. Thus, the particle effectiveness is enhanced to avoid "particle degeneracy" problem and improve localization accuracy. In order to validate the performance of the proposed localization algorithm, two different noise scenarios are investigated. The simulation results show that the proposed localization algorithm can efficiently improve the localization accuracy. In addition, the node-selection strategy can effectively select the subset of sensor nodes to improve the communication efficiency of the sensor network.

  1. Data Access Based on a Guide Map of the Underwater Wireless Sensor Network.

    Science.gov (United States)

    Wei, Zhengxian; Song, Min; Yin, Guisheng; Song, Houbing; Wang, Hongbin; Ma, Xuefei; Cheng, Albert M K

    2017-10-17

    Underwater wireless sensor networks (UWSNs) represent an area of increasing research interest, as data storage, discovery, and query of UWSNs are always challenging issues. In this paper, a data access based on a guide map (DAGM) method is proposed for UWSNs. In DAGM, the metadata describes the abstracts of data content and the storage location. The center ring is composed of nodes according to the shortest average data query path in the network in order to store the metadata, and the data guide map organizes, diffuses and synchronizes the metadata in the center ring, providing the most time-saving and energy-efficient data query service for the user. For this method, firstly the data is stored in the UWSN. The storage node is determined, the data is transmitted from the sensor node (data generation source) to the storage node, and the metadata is generated for it. Then, the metadata is sent to the center ring node that is the nearest to the storage node and the data guide map organizes the metadata, diffusing and synchronizing it to the other center ring nodes. Finally, when there is query data in any user node, the data guide map will select a center ring node nearest to the user to process the query sentence, and based on the shortest transmission delay and lowest energy consumption, data transmission routing is generated according to the storage location abstract in the metadata. Hence, specific application data transmission from the storage node to the user is completed. The simulation results demonstrate that DAGM has advantages with respect to data access time and network energy consumption.

  2. Virtual-Lattice Based Intrusion Detection Algorithm over Actuator-Assisted Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jing Yan

    2017-05-01

    Full Text Available Due to the lack of a physical line of defense, intrusion detection becomes one of the key issues in applications of underwater wireless sensor networks (UWSNs, especially when the confidentiality has prime importance. However, the resource-constrained property of UWSNs such as sparse deployment and energy constraint makes intrusion detection a challenging issue. This paper considers a virtual-lattice-based approach to the intrusion detection problem in UWSNs. Different from most existing works, the UWSNs consist of two kinds of nodes, i.e., sensor nodes (SNs, which cannot move autonomously, and actuator nodes (ANs, which can move autonomously according to the performance requirement. With the cooperation of SNs and ANs, the intruder detection probability is defined. Then, a virtual lattice-based monitor (VLM algorithm is proposed to detect the intruder. In order to reduce the redundancy of communication links and improve detection probability, an optimal and coordinative lattice-based monitor patrolling (OCLMP algorithm is further provided for UWSNs, wherein an equal price search strategy is given for ANs to find the shortest patrolling path. Under VLM and OCLMP algorithms, the detection probabilities are calculated, while the topology connectivity can be guaranteed. Finally, simulation results are presented to show that the proposed method in this paper can improve the detection accuracy and save the energy consumption compared with the conventional methods.

  3. Virtual-Lattice Based Intrusion Detection Algorithm over Actuator-Assisted Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Yan, Jing; Li, Xiaolei; Luo, Xiaoyuan; Guan, Xinping

    2017-05-20

    Due to the lack of a physical line of defense, intrusion detection becomes one of the key issues in applications of underwater wireless sensor networks (UWSNs), especially when the confidentiality has prime importance. However, the resource-constrained property of UWSNs such as sparse deployment and energy constraint makes intrusion detection a challenging issue. This paper considers a virtual-lattice-based approach to the intrusion detection problem in UWSNs. Different from most existing works, the UWSNs consist of two kinds of nodes, i.e., sensor nodes (SNs), which cannot move autonomously, and actuator nodes (ANs), which can move autonomously according to the performance requirement. With the cooperation of SNs and ANs, the intruder detection probability is defined. Then, a virtual lattice-based monitor (VLM) algorithm is proposed to detect the intruder. In order to reduce the redundancy of communication links and improve detection probability, an optimal and coordinative lattice-based monitor patrolling (OCLMP) algorithm is further provided for UWSNs, wherein an equal price search strategy is given for ANs to find the shortest patrolling path. Under VLM and OCLMP algorithms, the detection probabilities are calculated, while the topology connectivity can be guaranteed. Finally, simulation results are presented to show that the proposed method in this paper can improve the detection accuracy and save the energy consumption compared with the conventional methods.

  4. Statistical Modeling of Large-Scale Signal Path Loss in Underwater Acoustic Networks

    Directory of Open Access Journals (Sweden)

    Manuel Perez Malumbres

    2013-02-01

    Full Text Available In an underwater acoustic channel, the propagation conditions are known to vary in time, causing the deviation of the received signal strength from the nominal value predicted by a deterministic propagation model. To facilitate a large-scale system design in such conditions (e.g., power allocation, we have developed a statistical propagation model in which the transmission loss is treated as a random variable. By applying repetitive computation to the acoustic field, using ray tracing for a set of varying environmental conditions (surface height, wave activity, small node displacements around nominal locations, etc., an ensemble of transmission losses is compiled and later used to infer the statistical model parameters. A reasonable agreement is found with log-normal distribution, whose mean obeys a log-distance increases, and whose variance appears to be constant for a certain range of inter-node distances in a given deployment location. The statistical model is deemed useful for higher-level system planning, where simulation is needed to assess the performance of candidate network protocols under various resource allocation policies, i.e., to determine the transmit power and bandwidth allocation necessary to achieve a desired level of performance (connectivity, throughput, reliability, etc..

  5. A Routing Protocol Based on Received Signal Strength for Underwater Wireless Sensor Networks (UWSNs

    Directory of Open Access Journals (Sweden)

    Meiju Li

    2017-11-01

    Full Text Available Underwater wireless sensor networks (UWSNs are featured by long propagation delay, limited energy, narrow bandwidth, high BER (Bit Error Rate and variable topology structure. These features make it very difficult to design a short delay and high energy-efficiency routing protocol for UWSNs. In this paper, a routing protocol independent of location information is proposed based on received signal strength (RSS, which is called RRSS. In RRSS, a sensor node firstly establishes a vector from the node to a sink node; the length of the vector indicates the RSS of the beacon signal (RSSB from the sink node. A node selects the next-hop along the vector according to RSSB and the RSS of a hello packet (RSSH. The node nearer to the vector has higher priority to be a candidate next-hop. To avoid data packets being delivered to the neighbor nodes in a void area, a void-avoiding algorithm is introduced. In addition, residual energy is considered when selecting the next-hop. Meanwhile, we establish mathematic models to analyze the robustness and energy efficiency of RRSS. Lastly, we conduct extensive simulations, and the simulation results show RRSS can save energy consumption and decrease end-to-end delay.

  6. An ultra-low power and flexible acoustic modem design to develop energy-efficient underwater sensor networks.

    Science.gov (United States)

    Sánchez, Antonio; Blanc, Sara; Yuste, Pedro; Perles, Angel; Serrano, Juan José

    2012-01-01

    This paper is focused on the description of the physical layer of a new acoustic modem called ITACA. The modem architecture includes as a major novelty an ultra-low power asynchronous wake-up system implementation for underwater acoustic transmission that is based on a low-cost off-the-shelf RFID peripheral integrated circuit. This feature enables a reduced power dissipation of 10 μW in stand-by mode and registers very low power values during reception and transmission. The modem also incorporates clear channel assessment (CCA) to support CSMA-based medium access control (MAC) layer protocols. The design is part of a compact platform for a long-life short/medium range underwater wireless sensor network.

  7. An Ultra-Low Power and Flexible Acoustic Modem Design to Develop Energy-Efficient Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Antonio Sánchez

    2012-05-01

    Full Text Available This paper is focused on the description of the physical layer of a new acoustic modem called ITACA. The modem architecture includes as a major novelty an ultra-low power asynchronous wake-up system implementation for underwater acoustic transmission that is based on a low-cost off-the-shelf RFID peripheral integrated circuit. This feature enables a reduced power dissipation of 10 µW in stand-by mode and registers very low power values during reception and transmission. The modem also incorporates clear channel assessment (CCA to support CSMA-based medium access control (MAC layer protocols. The design is part of a compact platform for a long-life short/medium range underwater wireless sensor network.

  8. An Ultra-Low Power and Flexible Acoustic Modem Design to Develop Energy-Efficient Underwater Sensor Networks

    Science.gov (United States)

    Sánchez, Antonio; Blanc, Sara; Yuste, Pedro; Perles, Angel; Serrano, Juan José

    2012-01-01

    This paper is focused on the description of the physical layer of a new acoustic modem called ITACA. The modem architecture includes as a major novelty an ultra-low power asynchronous wake-up system implementation for underwater acoustic transmission that is based on a low-cost off-the-shelf RFID peripheral integrated circuit. This feature enables a reduced power dissipation of 10 μW in stand-by mode and registers very low power values during reception and transmission. The modem also incorporates clear channel assessment (CCA) to support CSMA-based medium access control (MAC) layer protocols. The design is part of a compact platform for a long-life short/medium range underwater wireless sensor network. PMID:22969324

  9. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

    its origins in a - some say 1st - generation of warfare, where armies were concentrated and could be controlled by political masters who were also acclaimed as warfare "geniuses". With subsequent generations of warfare, however, the control of war cannot be replaced by a control of military...... administration. While organisation systems continue to make some kind of political control possible, this is not the case in relation to wars. The organisation system is the in-between that should mediatise politics and war but is not functionally equivalent to just and unjust wars. The paper investigates...... the risks of lacking unity and displays the organisational trap to the fatal political myth of controlled warfare: Does it come from the military organisation system itself, from political ideologies of goal-rational governance, or from the chameleonic logic of wars?  ...

  10. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    Science.gov (United States)

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-11-04

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  11. SBMAC: Smart Blocking MAC Mechanism for Variable UW-ASN (Underwater Acoustic Sensor Network Environment

    Directory of Open Access Journals (Sweden)

    Soo-Hyun Park

    2010-01-01

    Full Text Available In this paper, several MAC scheduling methods applicable to an underwater environment are proposed. Besides, a new marine communication system model was proposed to improve the reliability of the proposed SBMAC method. The scheme minimizes transmission of control frames except for data transmission and various transmission methods and ACK methods can be used together. Simulation models are set indices and analysis of the underwater environment is established to conduct reliable simulations. Consequently, the performance improvement of the proposed method is verified with respect to delay time, data transmission rate, memory utilization, energy efficiency, etc.

  12. Node Self-Deployment Algorithm Based on an Uneven Cluster with Radius Adjusting for Underwater Sensor Networks.

    Science.gov (United States)

    Jiang, Peng; Xu, Yiming; Wu, Feng

    2016-01-14

    Existing move-restricted node self-deployment algorithms are based on a fixed node communication radius, evaluate the performance based on network coverage or the connectivity rate and do not consider the number of nodes near the sink node and the energy consumption distribution of the network topology, thereby degrading network reliability and the energy consumption balance. Therefore, we propose a distributed underwater node self-deployment algorithm. First, each node begins the uneven clustering based on the distance on the water surface. Each cluster head node selects its next-hop node to synchronously construct a connected path to the sink node. Second, the cluster head node adjusts its depth while maintaining the layout formed by the uneven clustering and then adjusts the positions of in-cluster nodes. The algorithm originally considers the network reliability and energy consumption balance during node deployment and considers the coverage redundancy rate of all positions that a node may reach during the node position adjustment. Simulation results show, compared to the connected dominating set (CDS) based depth computation algorithm, that the proposed algorithm can increase the number of the nodes near the sink node and improve network reliability while guaranteeing the network connectivity rate. Moreover, it can balance energy consumption during network operation, further improve network coverage rate and reduce energy consumption.

  13. Node Self-Deployment Algorithm Based on an Uneven Cluster with Radius Adjusting for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Peng Jiang

    2016-01-01

    Full Text Available Existing move-restricted node self-deployment algorithms are based on a fixed node communication radius, evaluate the performance based on network coverage or the connectivity rate and do not consider the number of nodes near the sink node and the energy consumption distribution of the network topology, thereby degrading network reliability and the energy consumption balance. Therefore, we propose a distributed underwater node self-deployment algorithm. First, each node begins the uneven clustering based on the distance on the water surface. Each cluster head node selects its next-hop node to synchronously construct a connected path to the sink node. Second, the cluster head node adjusts its depth while maintaining the layout formed by the uneven clustering and then adjusts the positions of in-cluster nodes. The algorithm originally considers the network reliability and energy consumption balance during node deployment and considers the coverage redundancy rate of all positions that a node may reach during the node position adjustment. Simulation results show, compared to the connected dominating set (CDS based depth computation algorithm, that the proposed algorithm can increase the number of the nodes near the sink node and improve network reliability while guaranteeing the network connectivity rate. Moreover, it can balance energy consumption during network operation, further improve network coverage rate and reduce energy consumption.

  14. Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jae-Won Lee

    2014-10-01

    Full Text Available The long propagation delay in an underwater acoustic channel makes designing an underwater media access control (MAC protocol more challenging. In particular, handshaking-based MAC protocols widely used in terrestrial radio channels have been known to be inappropriate in underwater acoustic channels, because of the inordinately large latency involved in exchanging control packets. Furthermore, in the case of multi-hop relaying in a hop-by-hop handshaking manner, the end-to-end delay significantly increases. In this paper, we propose a new MAC protocol named cascading multi-hop reservation and transmission (CMRT. In CMRT, intermediate nodes between a source and a destination may start handshaking in advance for the next-hop relaying before handshaking for the previous node is completed. By this concurrent relaying, control packet exchange and data delivery cascade down to the destination. In addition, to improve channel utilization, CMRT adopts a packet-train method where multiple data packets are sent together by handshaking once. Thus, CMRT reduces the time taken for control packet exchange and accordingly increases the throughput. The performance of CMRT is evaluated and compared with that of two conventional MAC protocols (multiple-access collision avoidance for underwater (MACA-U and MACA-U with packet trains (MACA-UPT. The results show that CMRT outperforms other MAC protocols in terms of both throughput and end-to-end delay.

  15. Hybrid Warfare

    Science.gov (United States)

    2013-08-01

    military vocabulary to describe these observed phenomena. After an intense focus on large-scale conventional conflicts during the Cold War, with episodic...requiring the mastery of both grammars.85 It follows that hybrid warfare requires the blending of both grammars. The Theoretical Lineage of

  16. Recognizing and Adapting to Unrestricted Warfare Practices by China

    Science.gov (United States)

    2012-02-15

    the areas of Lawfare , Economic Warfare, and Cyber-Warfare. Although the U.S. has made improvements to identify and respond to some key URW... lawfare ) to undermine the spirit and ideological commitment of an adversary before and during a conflict, weaken international support for the...paragraphs, I will discuss potential examples of Chinese URW practices in the areas of Lawfare , Economic Warfare, and Network Warfare and let the

  17. Supporting AUV localisation through next generation underwater acoustic networks: results from the field

    Science.gov (United States)

    2016-12-01

    LEONARD, J. J. Consistent cooperative localization. In Proceedings of the IEEE International Conference on Robotics and Automation (Kobe, Japan , May...Intelligent Robots and Systems (IROS) Daejeon Convention Center October 9-14, 2016, Daejeon, Korea 978-1-5090-3761-2/16/$31.00 ©2016 IEEE 1328 is independent...a great deal of effort has been put in distributed multi- robot localisation algorithms for underwater scenarios. In [2] consistent cooperative

  18. GSR-TDMA: A Geometric Spatial Reuse-Time Division Multiple Access MAC Protocol for Multihop Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Changho Yun

    2016-01-01

    Full Text Available The nonnegligible propagation delay of acoustic signals causes spatiotemporal uncertainty that occasionally enables simultaneous, collision-free packet transmission among underwater nodes (UNs. These transmissions can be handled by efficiently managing the channel access of the UNs in the data-link layer. To this end, Geometric Spatial Reuse-TDMA (GSR-TDMA, a new TDMA-based MAC protocol, is designed for use in centralized, multihop underwater acoustic sensor networks (UASNs, and in this case all UNs are periodically scheduled after determining a geometric map according to the information on their location. The scheduling strategy increases the number of UNs that send packets coincidentally via two subscheduling configurations (i.e., interhop and intrahop scheduling. Extensive simulations are used to investigate the reception success rate (RSR and the multihop delay (MHD of GSR-TDMA, and the results are compared to those of previous approaches, including C-MAC and HSR-TDMA. GSR-TDMA outperforms C-MAC; the RSR of GSR-TDMA is 15% higher than that of C-MAC, and the MHD of GSR-TDMA is 30% lower than that of C-MAC at the most. In addition, GSR-TDMA provides even better performance improvements over HSR-TDMA; the RSR of GSR-TDMA is 50% higher than that of HSR-TDMA, and the MHD of GSR-TDMA is an order of 102 lower than that of HSR-TDMA at the most.

  19. A Localization Method for Underwater Wireless Sensor Networks Based on Mobility Prediction and Particle Swarm Optimization Algorithms

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-02-01

    Full Text Available Due to their special environment, Underwater Wireless Sensor Networks (UWSNs are usually deployed over a large sea area and the nodes are usually floating. This results in a lower beacon node distribution density, a longer time for localization, and more energy consumption. Currently most of the localization algorithms in this field do not pay enough consideration on the mobility of the nodes. In this paper, by analyzing the mobility patterns of water near the seashore, a localization method for UWSNs based on a Mobility Prediction and a Particle Swarm Optimization algorithm (MP-PSO is proposed. In this method, the range-based PSO algorithm is used to locate the beacon nodes, and their velocities can be calculated. The velocity of an unknown node is calculated by using the spatial correlation of underwater object’s mobility, and then their locations can be predicted. The range-based PSO algorithm may cause considerable energy consumption and its computation complexity is a little bit high, nevertheless the number of beacon nodes is relatively smaller, so the calculation for the large number of unknown nodes is succinct, and this method can obviously decrease the energy consumption and time cost of localizing these mobile nodes. The simulation results indicate that this method has higher localization accuracy and better localization coverage rate compared with some other widely used localization methods in this field.

  20. A Localization Method for Underwater Wireless Sensor Networks Based on Mobility Prediction and Particle Swarm Optimization Algorithms.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Jiang, Shengming; Chen, Wei

    2016-02-06

    Due to their special environment, Underwater Wireless Sensor Networks (UWSNs) are usually deployed over a large sea area and the nodes are usually floating. This results in a lower beacon node distribution density, a longer time for localization, and more energy consumption. Currently most of the localization algorithms in this field do not pay enough consideration on the mobility of the nodes. In this paper, by analyzing the mobility patterns of water near the seashore, a localization method for UWSNs based on a Mobility Prediction and a Particle Swarm Optimization algorithm (MP-PSO) is proposed. In this method, the range-based PSO algorithm is used to locate the beacon nodes, and their velocities can be calculated. The velocity of an unknown node is calculated by using the spatial correlation of underwater object's mobility, and then their locations can be predicted. The range-based PSO algorithm may cause considerable energy consumption and its computation complexity is a little bit high, nevertheless the number of beacon nodes is relatively smaller, so the calculation for the large number of unknown nodes is succinct, and this method can obviously decrease the energy consumption and time cost of localizing these mobile nodes. The simulation results indicate that this method has higher localization accuracy and better localization coverage rate compared with some other widely used localization methods in this field.

  1. Millennial Warfare

    Science.gov (United States)

    2017-06-09

    www.cbsnews.com/news/the-echo-boomers-01-10-2004. 37 Andrew Hanna, “The Global Youth Unemployment Crisis: Exploring Successful Initiatives and Partnering with...SSP/seminars/wed_archives06spring/habeck.html Hanna, Andrew. “The Global Youth Unemployment Crisis: Exploring Successful Initiatives and Partnering...ISIL cause . The millennials within ISILs global insurgency are the drivers of these changes. The current Irregular Warfare literature does not account

  2. An Energy Scaled and Expanded Vector-Based Forwarding Scheme for Industrial Underwater Acoustic Sensor Networks with Sink Mobility.

    Science.gov (United States)

    Wadud, Zahid; Hussain, Sajjad; Javaid, Nadeem; Bouk, Safdar Hussain; Alrajeh, Nabil; Alabed, Mohamad Souheil; Guizani, Nadra

    2017-09-30

    Industrial Underwater Acoustic Sensor Networks (IUASNs) come with intrinsic challenges like long propagation delay, small bandwidth, large energy consumption, three-dimensional deployment, and high deployment and battery replacement cost. Any routing strategy proposed for IUASN must take into account these constraints. The vector based forwarding schemes in literature forward data packets to sink using holding time and location information of the sender, forwarder, and sink nodes. Holding time suppresses data broadcasts; however, it fails to keep energy and delay fairness in the network. To achieve this, we propose an Energy Scaled and Expanded Vector-Based Forwarding (ESEVBF) scheme. ESEVBF uses the residual energy of the node to scale and vector pipeline distance ratio to expand the holding time. Resulting scaled and expanded holding time of all forwarding nodes has a significant difference to avoid multiple forwarding, which reduces energy consumption and energy balancing in the network. If a node has a minimum holding time among its neighbors, it shrinks the holding time and quickly forwards the data packets upstream. The performance of ESEVBF is analyzed through in network scenario with and without node mobility to ensure its effectiveness. Simulation results show that ESEVBF has low energy consumption, reduces forwarded data copies, and less end-to-end delay.

  3. Application of Polynomial Neural Networks to Classification of Acoustic Warfare Signals

    Science.gov (United States)

    1993-04-01

    fcf’𔄁IC nf20 uqe o.’ C eouinq thil b4𔃺*e to yWash’nOntq .1u0tos Svverl’ t. O’at r ;0, rl’ -f’ Of 0ly ,"non s *( O no 4’ W~c’mt 1)$ ’T .c~qOuQ~O ’ llno...Report NOSC TD 1855, Naval Ocean Systems Center, San Diego, May, 1990. [34] Ghosh, J., L. Deuser, and S. Beck, "A neural network based hybrid system

  4. Underwater robots

    CERN Document Server

    Antonelli, Gianluca

    2014-01-01

    This book, now at the third edition, addresses the main control aspects in underwater manipulation tasks. The mathematical model with significant impact on the control strategy is discussed. The problem of controlling a 6-degrees-of-freedoms autonomous underwater vehicle is deeply investigated and a survey of fault detection/tolerant strategies for unmanned underwater vehicles is provided. Inverse kinematics, dynamic and interaction control for underwater vehicle-manipulator systems are then discussed. The code used to generate most of the numerical simulations is made available and briefly discussed.       

  5. An Artificial Measurements-Based Adaptive Filter for Energy-Efficient Target Tracking via Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Chen, Huayan; Zhang, Senlin; Liu, Meiqin; Zhang, Qunfei

    2017-04-27

    We study the problem of energy-efficient target tracking in underwater wireless sensor networks (UWSNs). Since sensors of UWSNs are battery-powered, it is impracticable to replace the batteries when exhausted. This means that the battery life affects the lifetime of the whole network. In order to extend the network lifetime, it is worth reducing the energy consumption on the premise of sufficient tracking accuracy. This paper proposes an energy-efficient filter that implements the tradeoff between communication cost and tracking accuracy. Under the distributed fusion framework, local sensors should not send their weak information to the fusion center if their measurement residuals are smaller than the pre-given threshold. In order to guarantee the target tracking accuracy, artificial measurements are generated to compensate for those unsent real measurements. Then, an adaptive scheme is derived to take full advantages of the artificial measurements-based filter in terms of energy-efficiency. Furthermore, a computationally efficient optimal sensor selection scheme is proposed to improve tracking accuracy on the premise of employing the same number of sensors. Simulation demonstrates that our scheme has superior advantages in the tradeoff between communication cost and tracking accuracy. It saves much energy while loosing little tracking accuracy or improves tracking performance with less additional energy cost.

  6. An Artificial Measurements-Based Adaptive Filter for Energy-Efficient Target Tracking via Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huayan Chen

    2017-04-01

    Full Text Available We study the problem of energy-efficient target tracking in underwater wireless sensor networks (UWSNs. Since sensors of UWSNs are battery-powered, it is impracticable to replace the batteries when exhausted. This means that the battery life affects the lifetime of the whole network. In order to extend the network lifetime, it is worth reducing the energy consumption on the premise of sufficient tracking accuracy. This paper proposes an energy-efficient filter that implements the tradeoff between communication cost and tracking accuracy. Under the distributed fusion framework, local sensors should not send their weak information to the fusion center if their measurement residuals are smaller than the pre-given threshold. In order to guarantee the target tracking accuracy, artificial measurements are generated to compensate for those unsent real measurements. Then, an adaptive scheme is derived to take full advantages of the artificial measurements-based filter in terms of energy-efficiency. Furthermore, a computationally efficient optimal sensor selection scheme is proposed to improve tracking accuracy on the premise of employing the same number of sensors. Simulation demonstrates that our scheme has superior advantages in the tradeoff between communication cost and tracking accuracy. It saves much energy while loosing little tracking accuracy or improves tracking performance with less additional energy cost.

  7. Air Warfare

    Science.gov (United States)

    2002-03-01

    to a halt in its usual medium of travel. A certain minimum of speed is essen- tial to sustentation , for the whole phenomenon of flight 36 AIR WARFARE...3,000 pounds, has a wing area of 287 square feet, while the bomber with its weight of 12,000 pounds requires some 1,121 square feet for its sustentation ...the resistance offered by the other parts of the airplane, which, since they play no part in sustentation , are known as “parasite” resistances. But the

  8. Fish and chips: implementation of a neural network model into computer chips to maximize swimming efficiency in autonomous underwater vehicles.

    Science.gov (United States)

    Blake, R W; Ng, H; Chan, K H S; Li, J

    2008-09-01

    Recent developments in the design and propulsion of biomimetic autonomous underwater vehicles (AUVs) have focused on boxfish as models (e.g. Deng and Avadhanula 2005 Biomimetic micro underwater vehicle with oscillating fin propulsion: system design and force measurement Proc. 2005 IEEE Int. Conf. Robot. Auto. (Barcelona, Spain) pp 3312-7). Whilst such vehicles have many potential advantages in operating in complex environments (e.g. high manoeuvrability and stability), limited battery life and payload capacity are likely functional disadvantages. Boxfish employ undulatory median and paired fins during routine swimming which are characterized by high hydromechanical Froude efficiencies (approximately 0.9) at low forward speeds. Current boxfish-inspired vehicles are propelled by a low aspect ratio, 'plate-like' caudal fin (ostraciiform tail) which can be shown to operate at a relatively low maximum Froude efficiency (approximately 0.5) and is mainly employed as a rudder for steering and in rapid swimming bouts (e.g. escape responses). Given this and the fact that bioinspired engineering designs are not obligated to wholly duplicate a biological model, computer chips were developed using a multilayer perception neural network model of undulatory fin propulsion in the knifefish Xenomystus nigri that would potentially allow an AUV to achieve high optimum values of propulsive efficiency at any given forward velocity, giving a minimum energy drain on the battery. We envisage that externally monitored information on flow velocity (sensory system) would be conveyed to the chips residing in the vehicle's control unit, which in turn would signal the locomotor unit to adopt kinematics (e.g. fin frequency, amplitude) associated with optimal propulsion efficiency. Power savings could protract vehicle operational life and/or provide more power to other functions (e.g. communications).

  9. Google™ underwater

    Science.gov (United States)

    Showstack, Randy

    2012-10-01

    The first underwater panoramic images were added to Google Maps™, the company announced on 25 September. This first “underwater Street View collection,” launched in partnership with the Caitlin Seaview Survey, provides people with the opportunity to “become the next virtual Jacques Cousteau.” For more information, see: maps.google.com/ocean.

  10. Underwater Vehicle

    National Research Council Canada - National Science Library

    Dick, James L

    2007-01-01

    There is thus provided an underwater vehicle having facility for maneuvering alongside a retrieving vehicle, as by manipulation of bow and stern planes, for engaging a hull surface of the retrieving...

  11. Design and implementation of low complexity wake-up receiver for underwater acoustic sensor networks

    Science.gov (United States)

    Yue, Ming

    This thesis designs a low-complexity dual Pseudorandom Noise (PN) scheme for identity (ID) detection and coarse frame synchronization. The two PN sequences for a node are identical and are separated by a specified length of gap which serves as the ID of different sensor nodes. The dual PN sequences are short in length but are capable of combating severe underwater acoustic (UWA) multipath fading channels that exhibit time varying impulse responses up to 100 taps. The receiver ID detection is implemented on a microcontroller MSP430F5529 by calculating the correlation between the two segments of the PN sequence with the specified separation gap. When the gap length is matched, the correlator outputs a peak which triggers the wake-up enable. The time index of the correlator peak is used as the coarse synchronization of the data frame. The correlator is implemented by an iterative algorithm that uses only one multiplication and two additions for each sample input regardless of the length of the PN sequence, thus achieving low computational complexity. The real-time processing requirement is also met via direct memory access (DMA) and two circular buffers to accelerate data transfer between the peripherals and the memory. The proposed dual PN detection scheme has been successfully tested by simulated fading channels and real-world measured channels. The results show that, in long multipath channels with more than 60 taps, the proposed scheme achieves high detection rate and low false alarm rate using maximal-length sequences as short as 31 bits to 127 bits, therefore it is suitable as a low-power wake-up receiver. The future research will integrate the wake-up receiver with Digital Signal Processors (DSP) for payload detection.

  12. OFDM for underwater acoustic communications

    CERN Document Server

    Zhou, Shengli

    2014-01-01

    A blend of introductory material and advanced signal processing and communication techniques, of critical importance to underwater system and network development This book, which is the first to describe the processing techniques central to underwater OFDM, is arranged into four distinct sections: First, it describes the characteristics of underwater acoustic channels, and stresses the difference from wireless radio channels. Then it goes over the basics of OFDM and channel coding. The second part starts with an overview of the OFDM receiver, and develops various modules for the receiver des

  13. Mission Planning and Decision Support for Underwater Glider Networks: A Sampling on-Demand Approach

    Directory of Open Access Journals (Sweden)

    Gabriele Ferri

    2015-12-01

    Full Text Available This paper describes an optimal sampling approach to support glider fleet operators and marine scientists during the complex task of planning the missions of fleets of underwater gliders. Optimal sampling, which has gained considerable attention in the last decade, consists in planning the paths of gliders to minimize a specific criterion pertinent to the phenomenon under investigation. Different criteria (e.g., A, G, or E optimality, used in geosciences to obtain an optimum design, lead to different sampling strategies. In particular, the A criterion produces paths for the gliders that minimize the overall level of uncertainty over the area of interest. However, there are commonly operative situations in which the marine scientists may prefer not to minimize the overall uncertainty of a certain area, but instead they may be interested in achieving an acceptable uncertainty sufficient for the scientific or operational needs of the mission. We propose and discuss here an approach named sampling on-demand that explicitly addresses this need. In our approach the user provides an objective map, setting both the amount and the geographic distribution of the uncertainty to be achieved after assimilating the information gathered by the fleet. A novel optimality criterion, called A η , is proposed and the resulting minimization problem is solved by using a Simulated Annealing based optimizer that takes into account the constraints imposed by the glider navigation features, the desired geometry of the paths and the problems of reachability caused by ocean currents. This planning strategy has been implemented in a Matlab toolbox called SoDDS (Sampling on-Demand and Decision Support. The tool is able to automatically download the ocean fields data from MyOcean repository and also provides graphical user interfaces to ease the input process of mission parameters and targets. The results obtained by running SoDDS on three different scenarios are provided

  14. Mission Planning and Decision Support for Underwater Glider Networks: A Sampling on-Demand Approach.

    Science.gov (United States)

    Ferri, Gabriele; Cococcioni, Marco; Alvarez, Alberto

    2015-12-26

    This paper describes an optimal sampling approach to support glider fleet operators and marine scientists during the complex task of planning the missions of fleets of underwater gliders. Optimal sampling, which has gained considerable attention in the last decade, consists in planning the paths of gliders to minimize a specific criterion pertinent to the phenomenon under investigation. Different criteria (e.g., A, G, or E optimality), used in geosciences to obtain an optimum design, lead to different sampling strategies. In particular, the A criterion produces paths for the gliders that minimize the overall level of uncertainty over the area of interest. However, there are commonly operative situations in which the marine scientists may prefer not to minimize the overall uncertainty of a certain area, but instead they may be interested in achieving an acceptable uncertainty sufficient for the scientific or operational needs of the mission. We propose and discuss here an approach named sampling on-demand that explicitly addresses this need. In our approach the user provides an objective map, setting both the amount and the geographic distribution of the uncertainty to be achieved after assimilating the information gathered by the fleet. A novel optimality criterion, called A η , is proposed and the resulting minimization problem is solved by using a Simulated Annealing based optimizer that takes into account the constraints imposed by the glider navigation features, the desired geometry of the paths and the problems of reachability caused by ocean currents. This planning strategy has been implemented in a Matlab toolbox called SoDDS (Sampling on-Demand and Decision Support). The tool is able to automatically download the ocean fields data from MyOcean repository and also provides graphical user interfaces to ease the input process of mission parameters and targets. The results obtained by running SoDDS on three different scenarios are provided and show that So

  15. ALIVE-IN-RANGE MEDIUM ACCESS CONTROL PROTOCOL TO MINIMIZE DELAY IN UNDERWATER WIRELESS SENSOR NETWORK COMMUNICATION AT A FREQUENCY OF 2.4 GHz

    Directory of Open Access Journals (Sweden)

    VIKAS RAINA

    2017-11-01

    Full Text Available Time synchronization between the sensor nodes to reduce end to end delay for critical and real time data monitoring can be achieved by cautiously monitoring the mobility of the mobile sink node in underwater wireless sensor networks. The proposed Alive-in-Range (AR-MAC medium access control protocol monitors delay sensitive, critical and real time data. The idea evolves as a reduction in duty cycle, precise time scheduling of active/sleep cycles of the sensors, monitoring the mobility of the sink node along-with the selection of appropriate queues and schedulers can reduce the end to end delay enhancing other performance metrics too. The algorithms effective path determination and optimum throughput path determination are proposed. It is assumed that the sensors are properly anchored to limit their movement due to waves within the permissible limits to follow these algorithms. This paper attempts to utilize electromagnetic waves at resonance frequency of 2.4 GHz for underwater communication. The results verify that the implementation of Alive-in-Range MAC protocol has reduced the average end to end delay significantly making it appropriate for critical and real time data monitoring. This work proves the suitability of electromagnetic waves as an effective alternative for underwater wireless communication. The main objective is to mitigate sink neighbourhood problem, distance constrained mobile sink problem and to reduce the average end to end delay by implementing Alive-in-Range (AR-MAC medium access control protocol in underwater sensor networks and to draw the attention of researchers in this area.

  16. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  17. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  18. The Next Milestone: A Multicarrier Acoustic MODEM With Channel- and Network-Adaptivity for Underwater Autonomous Distributed Systems

    Science.gov (United States)

    2009-09-30

    practical multicarrier modem prototype. We have proposed an effective method to mitigate the non-uniform Doppler effect of underwater channels, Report...comparisons on an OFDM design for Doppler spread channels,” in Proc. of MTS/IEEE OCEANS Conference, Bremen, Germany, May 11-14, 2009 [published]. 8...Ball, L. Freitag, and P. Willett, “An OFDM design for underwater acoustic channels with Doppler spread,” in Proc. of the 13th DSP Workshop, Marco

  19. Echoes from the deep - Communication scheduling, localization and time-synchronization in underwater acoustic sensor networks.

    NARCIS (Netherlands)

    van Kleunen, W.A.P.

    2014-01-01

    Wireless Sensor Networks (WSNs) caused a shift in the way things are monitored. While traditional monitoring was coarse-grained and offline, using WSNs allows fine-grained and real-time monitoring. While radio-based WSNs are growing out of the stage of research to commercialization and widespread

  20. A Depth-Adjustment Deployment Algorithm Based on Two-Dimensional Convex Hull and Spanning Tree for Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Jiang, Peng; Liu, Shuai; Liu, Jun; Wu, Feng; Zhang, Le

    2016-07-14

    Most of the existing node depth-adjustment deployment algorithms for underwater wireless sensor networks (UWSNs) just consider how to optimize network coverage and connectivity rate. However, these literatures don't discuss full network connectivity, while optimization of network energy efficiency and network reliability are vital topics for UWSN deployment. Therefore, in this study, a depth-adjustment deployment algorithm based on two-dimensional (2D) convex hull and spanning tree (NDACS) for UWSNs is proposed. First, the proposed algorithm uses the geometric characteristics of a 2D convex hull and empty circle to find the optimal location of a sleep node and activate it, minimizes the network coverage overlaps of the 2D plane, and then increases the coverage rate until the first layer coverage threshold is reached. Second, the sink node acts as a root node of all active nodes on the 2D convex hull and then forms a small spanning tree gradually. Finally, the depth-adjustment strategy based on time marker is used to achieve the three-dimensional overall network deployment. Compared with existing depth-adjustment deployment algorithms, the simulation results show that the NDACS algorithm can maintain full network connectivity with high network coverage rate, as well as improved network average node degree, thus increasing network reliability.

  1. A Depth-Adjustment Deployment Algorithm Based on Two-Dimensional Convex Hull and Spanning Tree for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Peng Jiang

    2016-07-01

    Full Text Available Most of the existing node depth-adjustment deployment algorithms for underwater wireless sensor networks (UWSNs just consider how to optimize network coverage and connectivity rate. However, these literatures don’t discuss full network connectivity, while optimization of network energy efficiency and network reliability are vital topics for UWSN deployment. Therefore, in this study, a depth-adjustment deployment algorithm based on two-dimensional (2D convex hull and spanning tree (NDACS for UWSNs is proposed. First, the proposed algorithm uses the geometric characteristics of a 2D convex hull and empty circle to find the optimal location of a sleep node and activate it, minimizes the network coverage overlaps of the 2D plane, and then increases the coverage rate until the first layer coverage threshold is reached. Second, the sink node acts as a root node of all active nodes on the 2D convex hull and then forms a small spanning tree gradually. Finally, the depth-adjustment strategy based on time marker is used to achieve the three-dimensional overall network deployment. Compared with existing depth-adjustment deployment algorithms, the simulation results show that the NDACS algorithm can maintain full network connectivity with high network coverage rate, as well as improved network average node degree, thus increasing network reliability.

  2. On Reliable and Efficient Data Gathering Based Routing in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Tayyaba Liaqat

    2016-08-01

    Full Text Available This paper presents cooperative routing scheme to improve data reliability. The proposed protocol achieves its objective, however, at the cost of surplus energy consumption. Thus sink mobility is introduced to minimize the energy consumption cost of nodes as it directly collects data from the network nodes at minimized communication distance. We also present delay and energy optimized versions of our proposed RE-AEDG to further enhance its performance. Simulation results prove the effectiveness of our proposed RE-AEDG in terms of the selected performance matrics.

  3. The Chinese People’s Liberation Army and Information Warfare

    Science.gov (United States)

    2014-03-01

    information warfare concepts as a barometer of how the PLA approached the concept, by 2007 the threads of integrated network electronic warfare... water filtration systems” against the chaos that could result from successful cyber attacks.75 PLA Lieutenant General Liu Jixian, of the PLA’s

  4. Should the Concept of Network-Centric Warfare Form a Central Pillar of the Australian Army’s Transformation, as Articulated in the Hardened and Networked Army Concept?

    Science.gov (United States)

    2007-05-08

    Clausewitz Kantian philosophic framework for war, which contends that due to the inherent nature of war, it cannot be predicted or controlled by man. The...the key themes identified within Clausewitz On War has identified that NCW could be considered the anti-thesis of Clausewitz Kantian study of warfare...industries and centers of population remote from the surface forces. While not discussing the ethical implication of legitimizing the attack of civilian

  5. FINAL TECHNICAL REPORT: Underwater Active Acoustic Monitoring Network For Marine And Hydrokinetic Energy Projects

    Energy Technology Data Exchange (ETDEWEB)

    Stein, Peter J. [Scientific Solutions, Inc, Nashua, NH (United States); Edson, Patrick L. [Scientific Solutions, Inc, Nashua, NH (United States)

    2013-12-20

    This project saw the completion of the design and development of a second generation, high frequency (90-120 kHz) Subsurface-Threat Detection Sonar Network (SDSN). The system was deployed, operated, and tested in Cobscook Bay, Maine near the site the Ocean Renewable Power Company TidGen™ power unit. This effort resulted in a very successful demonstration of the SDSN detection, tracking, localization, and classification capabilities in a high current, MHK environment as measured by results from the detection and tracking trials in Cobscook Bay. The new high frequency node, designed to operate outside the hearing range of a subset of marine mammals, was shown to detect and track objects of marine mammal-like target strength to ranges of approximately 500 meters. This performance range results in the SDSN system tracking objects for a significant duration - on the order of minutes - even in a tidal flow of 5-7 knots, potentially allowing time for MHK system or operator decision-making if marine mammals are present. Having demonstrated detection and tracking of synthetic targets with target strengths similar to some marine mammals, the primary hurdle to eventual automated monitoring is a dataset of actual marine mammal kinematic behavior and modifying the tracking algorithms and parameters which are currently tuned to human diver kinematics and classification.

  6. Optimal Scheduling for Underwater Communications in Multiple-User Scenarios

    Science.gov (United States)

    2015-09-30

    scheduling for underwater communications in multiple-user scenarios Beatrice Tomasi and James C. Preisig Woods Hole Oceanographic Institution...term goals of this project is to analyze and propose energy-efficient communication techniques for underwater acoustic sensor networks. These...optimal controller that minimizes energy consumption in underwater acoustic communications , we identified the following intermediate objectives: 1

  7. Future Of Privatized Warfare

    Science.gov (United States)

    2016-05-26

    support roles like base support and sustainment . In contrast, nearly seventeen percent of private contractors in Iraq and Afghanistan performed...numerous others in their works. 48 Jan Glete, “Warfare, Entrepreneurship , and the Fiscal-Military State,” in European Warfare: 1350-1750, eds. Frank...Pirates, and Sovereigns, 21. 50 Glete, “Warfare, Entrepreneurship , and the Fiscal-Military State,” 301. 51 Tallett and Trim, “Then Was Then and Now

  8. Hybrid Warfare and Lawfare

    OpenAIRE

    Bachmann, Sascha-Dominik; Mosquera, Andres B Munoz

    2015-01-01

    Hybrid Warfare as a method of war is not new. The change today appears to be that Hybrid Warfare “has the potential to transform the strategic calculations of potential belligerents [it has become] increasingly sophisticated and deadly”. This short paper presents Hybrid Warfare and one of its methods, lawfare. For this, we provide a current, comprehensive definition of hybrid warfare and examine different areas where law has been/is being used as a method of war. This paper focuses on the fol...

  9. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  10. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  11. Delay Tolerance in Underwater Wireless Communications: A Routing Perspective

    Directory of Open Access Journals (Sweden)

    Safdar Hussain Bouk

    2016-01-01

    Full Text Available Similar to terrestrial networks, underwater wireless networks (UWNs also aid several critical tasks including coastal surveillance, underwater pollution detection, and other maritime applications. Currently, once underwater sensor nodes are deployed at different levels of the sea, it is nearly impossible or very expensive to reconfigure the hardware, for example, battery. Taking this issue into account, considerable amount of research has been carried out to ensure minimum energy costs and reliable communication between underwater nodes and base stations. As a result, several different network protocols were proposed for UWN, including MAC, PHY, transport, and routing. Recently, a new paradigm was introduced claiming that the intermittent nature of acoustic channel and signal resulted in designing delay tolerant routing schemes for the UWN, known as an underwater delay tolerant network. In this paper, we provide a comprehensive survey of underwater routing protocols with emphasis on the limitations, challenges, and future open issues in the context of delay tolerant network routing.

  12. Military Transformation and the Defense Industry After Next: The Defense Industrial Implications of Network-Centric Warfare

    Science.gov (United States)

    2002-09-01

    and Manuel Castells , The Rise of the Network Society, 2nd ed. (Oxford: Blackwell, 2000). For popular treatments, see Thomas L. Friedman, The Lexus and...American Military Styles in Strategy and Analysis. Bal- timore: Johns Hopkins University Press, 1989. Castells , Manuel . The Rise of the Network Soci- ety

  13. On Cyber Warfare Command and Control Systems

    Science.gov (United States)

    2004-06-01

    network defense management system are sometimes used to describe systems that are used for the remote management of firewalls, intrusion detection...different. Certainly, the remote management of firewalls and intrusion detection systems, etc. should be part of a cyber warfare command and control

  14. WARFARE IN THE INFORMATION AGE

    Directory of Open Access Journals (Sweden)

    Laurian GHERMAN

    2010-01-01

    Full Text Available The paper is focused on changes occurred in military organizations in Information Age. During Industrial Age the military structure of forces evolved according with principles of decomposition, specialization, hierarchy, optimization, deconfliction, centralized planning, and decentralized execution. But now the solutions based upon Industrial Age assumptions and practices will break down and fail in the Information Age. This will happen no matter how well intentioned, hardworking, or dedicated the leadership and the force are. Two key force capabilities needed by Information Age militaries are interoperability and agility. Both interoperability and agility are provided by Network centric warfare theory of war.

  15. Acousto-Optical Method of Encoding and Visualization of Underwater Space

    Science.gov (United States)

    2014-01-27

    08-2015 Publication Acousto- Optical Method of Encoding and Visualization of Underwater Space Promode R. Bandyopadhyay Naval Undersea Warfare Center...like transducers is recorded as holograms and transmitted. The hologram is decoded and a hologram of the underwater space is created. A small...STATEMENT Approved for Public Release Distribution is unlimited Attorney Docket No. 101454 1 of 34 ACOUSTO- OPTICAL METHOD OF ENCODING AND

  16. Lasers in Electronic Warfare

    Science.gov (United States)

    Manke, Gerald C.

    2014-10-01

    The use of lasers for Electronic Warfare applications will be discussed and reviewed. Specific examples of deployed EW systems which include lasers will be presented along with a discussion of their most salient features.

  17. Hybrid Warfare and Challenges

    Science.gov (United States)

    2009-01-01

    was developed as an alternative to the Western teleological approach, while operational design is based on epistemology. In contrast to EBO...and the Ethics of Warfare,” presentation to the Joint Services FORUM | Systems versus Classical Approach to Warfare Conference on Professional... Ethics , 2006, School of Advanced Military Studies, Fort Leavenworth, KS. 23 Cited in Avi Kober, “The Israel Defense Forces in the Second Lebanon War

  18. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  19. First-Strike Advantage: The United States’ Counter to China’s Preemptive Integrated Network Electronic Warfare Strategy

    Science.gov (United States)

    2013-06-01

    what cyberspace is. The definitions range from calling cyberspace a consensual hallucination to the online world of computer networks with some... hallucination .”12  Edward Waltz, says the “Cyberspace dimension refers to the middle layer—the information infrastructure—of the three realms...United States leaders hope to build a consolidated effort towards their vision of cyberspace. Second, the United States will develop plans to

  20. A Comprehensive Study on the Internet of Underwater Things: Applications, Challenges, and Channel Models ?

    OpenAIRE

    Chien-Chi Kao; Yi-Shan Lin; Geng-De Wu; Chun-Ju Huang

    2017-01-01

    The Internet of Underwater Things (IoUT) is a novel class of Internet of Things (IoT), and is defined as the network of smart interconnected underwater objects. IoUT is expected to enable various practical applications, such as environmental monitoring, underwater exploration, and disaster prevention. With these applications, IoUT is regarded as one of the potential technologies toward developing smart cities. To support the concept of IoUT, Underwater Wireless Sensor Networks (UWSNs) have em...

  1. Advanced Concepts for Underwater Acoustic Channel Modeling

    Science.gov (United States)

    Etter, P. C.; Haas, C. H.; Ramani, D. V.

    2014-12-01

    This paper examines nearshore underwater-acoustic channel modeling concepts and compares channel-state information requirements against existing modeling capabilities. This process defines a subset of candidate acoustic models suitable for simulating signal propagation in underwater communications. Underwater-acoustic communications find many practical applications in coastal oceanography, and networking is the enabling technology for these applications. Such networks can be formed by establishing two-way acoustic links between autonomous underwater vehicles and moored oceanographic sensors. These networks can be connected to a surface unit for further data transfer to ships, satellites, or shore stations via a radio-frequency link. This configuration establishes an interactive environment in which researchers can extract real-time data from multiple, but distant, underwater instruments. After evaluating the obtained data, control messages can be sent back to individual instruments to adapt the networks to changing situations. Underwater networks can also be used to increase the operating ranges of autonomous underwater vehicles by hopping the control and data messages through networks that cover large areas. A model of the ocean medium between acoustic sources and receivers is called a channel model. In an oceanic channel, characteristics of the acoustic signals change as they travel from transmitters to receivers. These characteristics depend upon the acoustic frequency, the distances between sources and receivers, the paths followed by the signals, and the prevailing ocean environment in the vicinity of the paths. Properties of the received signals can be derived from those of the transmitted signals using these channel models. This study concludes that ray-theory models are best suited to the simulation of acoustic signal propagation in oceanic channels and identifies 33 such models that are eligible candidates.

  2. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  3. First observations of teleseismic P-waves with autonomous underwater robots: towards future global network of mobile seismometers

    Science.gov (United States)

    Sukhovich, Alexei; Nolet, Guust; Hello, Yann; Simons, Frederik; Bonnieux, Sébastien

    2013-04-01

    We report here the first successful observations of underwater acoustic signals generated by teleseismic P-waves recorded by autonomous robots MERMAID (short for Mobile Earthquake Recording in Marine Areas by Independent Divers). During 2011-2012 we have conducted three test campaigns for a total duration of about 8 weeks in the Ligurian Sea which have allowed us to record nine teleseismic events (distance more than 60 degree) of magnitudes higher than 6 and one closer event (distance 23 degree) of magnitude 5.5. Our results indicate that no simple relation exists between the magnitude of the source event and the signal-to-noise ratio (SNR) of the corresponding acoustic signals. Other factors, such as fault orientation and meteorological conditions, play an important role in the detectability of the seismic events. We also show examples of the events recorded during these test runs and how their frequency characteristics allow them to be recognized automatically by an algorithm based on the wavelet transform. We shall also report on more recent results obtained during the first fully autonomous run (currently ongoing) of the final MERMAID design in the Mediterranean Sea.

  4. Theory of information warfare: basic framework, methodology and conceptual apparatus

    Directory of Open Access Journals (Sweden)

    Олександр Васильович Курбан

    2015-11-01

    Full Text Available It is conducted a comprehensive theoretical study and determine the basic provisions of the modern theory of information warfare in on-line social networks. Three basic blocks, which systematized the theoretical and methodological basis of the topic, are established. There are information and psychological war, social off-line and on-line network. According to the three blocks, theoretical concepts are defined and methodological substantiation of information processes within the information warfare in the social on-line networks is formed

  5. Biological and Chemical Warfare

    African Journals Online (AJOL)

    civilian population. (k) The history of research, trial and use of germ warfare continues to the present day. North Korea claimed dirty tricks were used by the USA during the Korean war in 1952, when American POW's confessed to drop- ping germ bombs including infected foun- tain pens. This was supposedly confirmed.

  6. Countermine Warfare Analysis

    Science.gov (United States)

    1981-06-01

    PASSED) ENEMY DEFENSE POSITION DEFENSIVE ENGAGEMENT CANAIZaE SECURE AN ENEMY MANEUVER OPFN Fl.AhK PORCE ENEMY AVENUES Or APROACH REAR AREAS II XVIE’NFOFSE...Sidorenko, A. A., "The Offensive - A Soviet View," Translated and Published by the US Air Force, 1970 Simpkin, Brigadier Richard, "Tank Warfare," With

  7. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  8. Changing Face of Warfare

    Science.gov (United States)

    2015-06-12

    1862 to his mother in Goldsboro, NC. Southern Historical Collection, University Archives, Southern Folk Life Collection, Louis Round Wilson Special...carnage" that "no human tongue or pen can adequately describe" was not new to warfare.20 What was new and different were the numbers of wounded

  9. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    images is not permissible. iii Abstract Hybrid Warfare: The 21st Century Russian Way of Warfare, by MAJ Amos C. Fox, US Army, 73 pages. In...echelons far above a tactical battalion. Robert Leonhard suggests, “As the Cold War receded into the history books , the day-to-day reality of...Russian brand of hybrid warfare. Furthermore, Leonhard’s definition has more far-reaching applicability than other definitions analyzed, making it usable

  10. Simulation of Operations in the Underwater Warfare Testbed (UWT)

    NARCIS (Netherlands)

    Keus, D.; Benders, F.P.A.; Fitski, H.J.; Grootendorst, H.J.

    2009-01-01

    Surface vessels and submarines must be able to defend themselves against a torpedo attack. Several studies have shown the benefits of multi-platform and multi-static operations. To facilitate torpedo defence system studies and the development of future tactics, TNO Defence, Security and Safety

  11. Multi-platform operations in the Underwater Warfare Testbed (UWT)

    NARCIS (Netherlands)

    Keus, D; Benders, F.P.A.; Fitski, H.J.; Grootendorst, H.J.

    2009-01-01

    More than a decade ago, the long-term NATO scientific study “Maritime Operations in 2015” (MO 2015) identified the so-called multi-platform and co-operative multi-static Low Frequency Active Sonar (LFAS) concept, involving co-operative sonar data exchange between surface ships and submarines.

  12. The considerations on informational warfare

    OpenAIRE

    Agata Popescu

    2015-01-01

    Strictly military information warfare can be defined as all informational operations at tactical, operational and strategic level, in peacetime, crisis and conflict escalation, with the common goals of achieving or influencing certain targets. Information warfare has a military component, command and control warfare which has the following meaning according to NATO: "integrated use of all military capabilities including operations security, deception, psychological operations, electronic warf...

  13. The influence of acoustic emissions for underwater data transmission on the behaviour of harbour porpoises (Phocoena phocoena) in a floating pen

    NARCIS (Netherlands)

    Kastelein, R.A.; Verboom, W.C.; Muijsers, M.; Jennings, N.V.; Heul, S. van der

    2005-01-01

    To prevent grounding of ships and collisions between ships in shallow coastal waters, an underwater data collection and communication network is currently under development: Acoustic Communication network for Monitoring of underwater Environment in coastal areas (ACME). Marine mammals might be

  14. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  15. Dehumanization and Irregular Warfare

    Science.gov (United States)

    2013-06-01

    1997). French , John and Raven , Bertram. “The Bases of Social Power.” Studies in Social Power, 1959 . Galula, David. Counterinsurgency Warfare Theory...of the threats depend on both the 109 John R. P. French and Bertram Raven , “The Bases of Social...police to bring about better security. 112 French and Raven , “The Bases of Social Power,” 167. 38 Ramadan, as I described in the Introduction. It

  16. Surface Warfare, Concept to Reality November/December 1997

    National Research Council Canada - National Science Library

    Sabalos, Nicholas

    1997-01-01

    ... Navy will require tomorrow. From an overview of Network-Centric Warfare to a detailed look at modeling and simulation, we examine the broad spectrum of effort and intellectual capital being invested in the future of the Navy and Marine Corps...

  17. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  18. Real-Time Communication Support for Underwater Acoustic Sensor Networks†.

    Science.gov (United States)

    Santos, Rodrigo; Orozco, Javier; Micheletto, Matias; Ochoa, Sergio F; Meseguer, Roc; Millan, Pere; Molina, And Carlos

    2017-07-14

    Underwater sensor networks represent an important and promising field of research due to the large diversity of underwater ubiquitous applications that can be supported by these networks, e.g., systems that deliver tsunami and oil spill warnings, or monitor submarine ecosystems. Most of these monitoring and warning systems require real-time communication in wide area networks that have a low density of nodes. The underwater communication medium involved in these networks is very harsh and imposes strong restrictions to the communication process. In this scenario, the real-time transmission of information is done mainly using acoustic signals, since the network nodes are not physically close. The features of the communication scenario and the requirements of the communication process represent major challenges for designers of both, communication protocols and monitoring and warning systems. The lack of models to represent these networks is the main stumbling block for the proliferation of underwater ubiquitous systems. This paper presents a real-time communication model for underwater acoustic sensor networks (UW-ASN) that are designed to cover wide areas with a low density of nodes, using any-to-any communication. This model is analytic, considers two solution approaches for scheduling the real-time messages, and provides a time-constraint analysis for the network performance. Using this model, the designers of protocols and underwater ubiquitous systems can quickly prototype and evaluate their solutions in an evolving way, in order to determine the best solution to the problem being addressed. The suitability of the proposal is illustrated with a case study that shows the performance of a UW-ASN under several initial conditions. This is the first analytic model for representing real-time communication in this type of network, and therefore, it opens the door for the development of underwater ubiquitous systems for several application scenarios.

  19. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  20. Towards a Hybrid Approach to Context Reasoning for Underwater Robots

    Directory of Open Access Journals (Sweden)

    Xin Li

    2017-02-01

    Full Text Available Ontologies have been widely used to facilitate semantic interoperability and serve as a common information model in many applications or domains. The Smart and Networking Underwater Robots in Cooperation Meshes (SWARMs project, aiming to facilitate coordination and cooperation between heterogeneous underwater vehicles, also adopts ontologies to formalize information that is necessarily exchanged between vehicles. However, how to derive more useful contexts based on ontologies still remains a challenge. In particular, the extreme nature of the underwater environment introduces uncertainties in context data, thus imposing more difficulties in context reasoning. None of the existing context reasoning methods could individually deal with all intricacies in the underwater robot field. To this end, this paper presents the first proposal applying a hybrid context reasoning mechanism that includes ontological, rule-based, and Multi-Entity Bayesian Network (MEBN reasoning methods to reason about contexts and their uncertainties in the underwater robot field. The theoretical foundation of applying this reasoning mechanism in underwater robots is given by a case study on the oil spill monitoring. The simulated reasoning results are useful for further decision-making by operators or robots and they show that the consolidation of different reasoning methods is a promising approach for context reasoning in underwater robots.

  1. Global Trends and Future Warfare (Strategic Insights. Special Issue, October 2011)

    Science.gov (United States)

    2011-10-01

    Watching Hainan, Remembering Murmansk : Cold War Analogies, Maritime Access, and the Future of Warfare Adam Grissom 78 10 Irregular Warfare and Future War...77 Betz The Mystique of "Cyberwar" and the Strategic Latency of Networked Social Movements 9. Watching Hainan, Remembering Murmansk Cold War...issues. Strategic Insights • October 2011 Volume 10, Special Issue 79 Grissom Watching Hainan, Remembering Murmansk : Cold War Analogies, Maritime

  2. Resources for Underwater Robotics Education

    Science.gov (United States)

    Wallace, Michael L.; Freitas, William M.

    2016-01-01

    4-H clubs can build and program underwater robots from raw materials. An annotated resource list for engaging youth in building underwater remotely operated vehicles (ROVs) is provided. This article is a companion piece to the Research in Brief article "Building Teen Futures with Underwater Robotics" in this issue of the "Journal of…

  3. Underwater Sound Filtering

    NARCIS (Netherlands)

    Rutger van Aalst; Ines Simic

    2015-01-01

    This paper describes a possible solution to the underwater sound filtering problem, using Blind Source Separation. The problem regards splitting sound from a boat engine and the water waves to prove the possibility to extract one sound fragment from the other on the open sea. The illustrations shown

  4. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  5. Nodes and Codes: The Reality of Cyber Warfare

    Science.gov (United States)

    2012-05-17

    Agency that claimed Stuxnet infected over one thousand Chinese industrial computer networks, including the Three Gorges Dam hydroelectric facility...infrastructure. Three case studies evaluate cyber policy, discourse, and procurement in the US, Russia, and China before and after Stuxnet to illustrate their...similar, yet unique, realities of cyber warfare. Evidence suggests that all three nations are taking extraordinary measures to build cyber armies

  6. Coalition Warfare: the Leadership Challenges

    Science.gov (United States)

    2011-05-19

    multinational operations, leadership challenges, leadership attributes, unity of command. 16. SECURITY CLASSIFICATION OF: UNCLASSIFIED 17. LIMITATION OF...Approved for Public Release; Distribution is Unlimited Coalition Warfare: The leadership challenges A Monograph by Colonel Mark J Thornhill...The leadership challenges. 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Colonel Mark J. Thornhill

  7. The American Way of Warfare

    Science.gov (United States)

    2012-05-17

    an overview of Shy’s theory of history and learning is required. Shy challenged the practice of interpreting warfare through the lens of the...necessary for victory. The military planners of Operation NEPTUNE during World War II felt that overwhelming superiority was a necessity in establishing a

  8. Biological warfare, bioterrorism, and biocrime

    NARCIS (Netherlands)

    Jansen, H. J.; Breeveld, F. J.; Stijnis, C.; Grobusch, M. P.

    2014-01-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria

  9. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  10. A Customisable Underwater Robot

    OpenAIRE

    Schillaci, Guido; Schillaci, Fabio; Hafner, Verena V.

    2017-01-01

    We present a model of a configurable underwater drone, whose parts are optimised for 3D printing processes. We show how - through the use of printable adapters - several thrusters and ballast configurations can be implemented, allowing different maneuvering possibilities. After introducing the model and illustrating a set of possible configurations, we present a functional prototype based on open source hardware and software solutions. The prototype has been successfully tested in several div...

  11. Polymer Claw: Instant Underwater Adhesive

    Science.gov (United States)

    2012-09-24

    3.3 UNDERWATER LAP - SHEAR ADHESION 4 3.4 FULL POLYMER CLAW PROTOTYPE 6 ± NEXT STEPS 7 4.1 BIOFOULED SURFACES 7 4.2 RHEOLOGICAL MEASUREMENTS 7...tested underwater, the lap shear adhesion was ~200x stronger than commercial underwater adhesives after 1 hour. This month also marked the...calibrated to apply a force in the 3.4-3.7 lb. range over a 0.5 sq. in. area. 3.3 Underwater Lap - Shear Adhesion The most important test of the improved

  12. Underwater Gliders: A Review

    Directory of Open Access Journals (Sweden)

    Javaid Muhammad Yasar

    2014-07-01

    Full Text Available Underwater gliders are a type of underwater vehicle that transverse the oceans by shifting its buoyancy, during which its wings develop a component of the downward motion in the horizontal plane, thus producing a forward force. They are primarily used in oceanography sensing and data collection and play an important role in ocean research and development. Although there have been considerable developments in these gliders since the development of the first glider concept in 1989, to date, no review of these gliders have been done. This paper reviews existing underwater gliders, with emphasis on their respective working principles, range and payload capacity. All information on gliders available in the public domain or published in literature from the year 2000-2013 was reviewed. The majority of these gliders have an operational depth of 1000 m and a payload of less than 25 kg. The exception is a blend-body shape glider, which has a payload of approximately 800 kg and an operational depth around about 300 m. However, the commercialization of these gliders has been limited with only three know examples that have been successfully commercialized.

  13. Underwater laser detection system

    Science.gov (United States)

    Gomaa, Walid; El-Sherif, Ashraf F.; El-Sharkawy, Yasser H.

    2015-02-01

    The conventional method used to detect an underwater target is by sending and receiving some form of acoustic energy. But the acoustic systems have limitations in the range resolution and accuracy; while, the potential benefits of a laserbased underwater target detection include high directionality, high response, and high range accuracy. Lasers operating in the blue-green region of the light spectrum(420 : 570nm)have a several applications in the area of detection and ranging of submersible targets due to minimum attenuation through water ( less than 0.1 m-1) and maximum laser reflection from estimated target (like mines or submarines) to provide a long range of detection. In this paper laser attenuation in water was measured experimentally by new simple method by using high resolution spectrometer. The laser echoes from different targets (metal, plastic, wood, and rubber) were detected using high resolution CCD camera; the position of detection camera was optimized to provide a high reflection laser from target and low backscattering noise from the water medium, digital image processing techniques were applied to detect and discriminate the echoes from the metal target and subtract the echoes from other objects. Extraction the image of target from the scattering noise is done by background subtraction and edge detection techniques. As a conclusion, we present a high response laser imaging system to detect and discriminate small size, like-mine underwater targets.

  14. Precoding based channel prediction for underwater acoustic OFDM

    Science.gov (United States)

    Cheng, En; Lin, Na; Sun, Hai-xin; Yan, Jia-quan; Qi, Jie

    2017-04-01

    The life duration of underwater cooperative network has been the hot topic in recent years. And the problem of node energy consuming is the key technology to maintain the energy balance among all nodes. To ensure energy efficiency of some special nodes and obtain a longer lifetime of the underwater cooperative network, this paper focuses on adopting precoding strategy to preprocess the signal at the transmitter and simplify the receiver structure. Meanwhile, it takes into account the presence of Doppler shifts and long feedback transmission delay in an underwater acoustic communication system. Precoding technique is applied based on channel prediction to realize energy saving and improve system performance. Different precoding methods are compared. Simulated results and experimental results show that the proposed scheme has a better performance, and it can provide a simple receiver and realize energy saving for some special nodes in a cooperative communication.

  15. Polarization Calculation and Underwater Target Detection Inspired by Biological Visual Imaging

    Directory of Open Access Journals (Sweden)

    Jie Shen

    2014-04-01

    Full Text Available In challenging underwater environments, the polarization parameter maps calculated by the Stokes model are characterized by the high noise and error, harassing the underwater target detection tasks. In order to solve this problem, this paper proposes a novel bionic polarization calculation and underwater target detection method by modeling the visual system of mantis shrimps. This system includes many operators including a polarization-opposition calculation, a factor optimization and a visual neural network model. A calibration learning method is proposed to search the optimal value of the factors in the linear subtraction model. Finally, a six-channel visual neural network model is proposed to detect the underwater targets. Experimental results proved that the maps produced by the polarization-opposition parameter is more accurate and have lower noise than that produced by the Stokes parameter, achieving better performance in underwater target detection tasks.

  16. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  17. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  18. GIMP Retinex and Underwater Imaging

    OpenAIRE

    Sparavigna, Amelia Carolina

    2017-01-01

    In this paper we show and discuss some examples of the use of a Retinex filter provided by GIMP, the GNU image manipulation program for X window systems, for enhancing the images obtained by underwater photography. The tool seems suitable for applications in the processing of images recorded during the underwater automated surveying made by drones.

  19. Air Power and Maneuver Warfare

    Science.gov (United States)

    1994-07-01

    the Germans fully understand the extent of the revolution that they had wrought in warfare, and only then did blitzkrieg receive its name . Meanwhile...Macmillan, 1969), 1166 , on the development of the Allied plans. 58. Michael Garder, La Guerre Secrete des Services speciaux francaises , 1939-1945 (Paris...to protect the proletarian revolution by possessing an industrial base capable of producing the new weapons ofwar was perhaps the major motivator

  20. Special Warfare: A Selected Bibliography.

    Science.gov (United States)

    1983-10-01

    145. Smith, Robert M. The Revolutionary Doctrine of Comunist China . Thesis, American University, 1971. Ann Arbor: University Microfilms, 1972. (UA835...JC328.5 .L43) 99. Liu, Chi-aing. Lessons from China (Kiansi, 1934) and a Strategy for Counter-Insurgency (Viet Nam, 1966). Taipei: N.p., 1966...O’Ballance, Edgar. The Indo- China War. 1945-1954: A Study in Guerrilla Warfare. London: Faber and Faber, 1964. (DS550 0 3) 8 123. Organization of

  1. Political Warfare and Contentious Politics

    Science.gov (United States)

    2015-06-01

    provides a definition of political warfare, offers strategy approaches with associated actions, and develops analytical tools to evaluate PW actions...McAdam, Tarrow, and Tilly, Dynamics of Contention, 12. 21 the interests of at least one of the claimants. Roughly translated, the definition refers...indicates the effect of broad social processes on organizational strength. Broad social processes like migration or overpopulation provide an increase

  2. A program to compute geographical positions of underwater artifact based on linear measurements

    Digital Repository Service at National Institute of Oceanography (India)

    Ganesan, P.

    While carrying out underwater positioning in shallow waters, the Diver Archaeologists measure lengths and bearings from a base line of the well-established control network to each and every corner of the artifact. A program in Basic language...

  3. Underwater acoustic communication research at TNO-Past and present

    NARCIS (Netherlands)

    Dol, H.; Walree, P. van

    2011-01-01

    This paper provides an overview of more than 12 years of underwater acoustic communication research at the Sonar Department of TNO The Hague. The research covered both point-to-point links and relay networks, from long-range covert communication to short-range high-data-rate communication, for both

  4. Undersea Warfare Academic Group Home Page

    OpenAIRE

    1997-01-01

    Collected from the Internet Archive "Wayback machine". The Undersea Warfare Curriculum educates officers in the engineering fundamentals, physical principles and analytical concepts that govern operational employment of undersea warfare (USW) sensors and weapons systems. Program is interdisciplinary and integrates; mathematics, physics, acoustics, electrical engineering, oceanography, operations analysis, human factors, computer science and meteorology.

  5. Underwater Hearing in Turtles.

    Science.gov (United States)

    Willis, Katie L

    2016-01-01

    The hearing of turtles is poorly understood compared with the other reptiles. Although the mechanism of transduction of sound into a neural signal via hair cells has been described in detail, the rest of the auditory system is largely a black box. What is known is that turtles have higher hearing thresholds than other reptiles, with best frequencies around 500 Hz. They also have lower underwater hearing thresholds than those in air, owing to resonance of the middle ear cavity. Further studies demonstrated that all families of turtles and tortoises share a common middle ear cavity morphology, with scaling best suited to underwater hearing. This supports an aquatic origin of the group. Because turtles hear best under water, it is important to examine their vulnerability to anthropogenic noise. However, the lack of basic data makes such experiments difficult because only a few species of turtles have published audiograms. There are also almost no behavioral data available (understandable due to training difficulties). Finally, few studies show what kinds of sounds are behaviorally relevant. One notable paper revealed that the Australian snake-necked turtle (Chelodina oblonga) has a vocal repertoire in air, at the interface, and under water. Findings like these suggest that there is more to the turtle aquatic auditory scene than previously thought.

  6. L2-LBMT: A Layered Load Balance Routing Protocol for underwater multimedia data transmission

    Science.gov (United States)

    Lv, Ze; Tang, Ruichun; Tao, Ye; Sun, Xin; Xu, Xiaowei

    2017-12-01

    Providing highly efficient underwater transmission of mass multimedia data is challenging due to the particularities of the underwater environment. Although there are many schemes proposed to optimize the underwater acoustic network communication protocols, from physical layer, data link layer, network layer to transport layer, the existing routing protocols for underwater wireless sensor network (UWSN) still cannot well deal with the problems in transmitting multimedia data because of the difficulties involved in high energy consumption, low transmission reliability or high transmission delay. It prevents us from applying underwater multimedia data to real-time monitoring of marine environment in practical application, especially in emergency search, rescue operation and military field. Therefore, the inefficient transmission of marine multimedia data has become a serious problem that needs to be solved urgently. In this paper, A Layered Load Balance Routing Protocol (L2-LBMT) is proposed for underwater multimedia data transmission. In L2-LBMT, we use layered and load-balance Ad Hoc Network to transmit data, and adopt segmented data reliable transfer (SDRT) protocol to improve the data transport reliability. And a 3-node variant of tornado (3-VT) code is also combined with the Ad Hoc Network to transmit little emergency data more quickly. The simulation results show that the proposed protocol can balance energy consumption of each node, effectively prolong the network lifetime and reduce transmission delay of marine multimedia data.

  7. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  8. A cost effective block framing scheme for underwater communication.

    Science.gov (United States)

    Shin, Soo-Young; Park, Soo-Hyun

    2011-01-01

    In this paper, the Selective Multiple Acknowledgement (SMA) method, based on Multiple Acknowledgement (MA), is proposed to efficiently reduce the amount of data transmission by redesigning the transmission frame structure and taking into consideration underwater transmission characteristics. The method is suited to integrated underwater system models, as the proposed method can handle the same amount of data in a much more compact frame structure without any appreciable loss of reliability. Herein, the performance of the proposed SMA method was analyzed and compared to those of the conventional Automatic Repeat-reQuest (ARQ), Block Acknowledgement (BA), block response, and MA methods. The efficiency of the underwater sensor network, which forms a large cluster and mostly contains uplink data, is expected to be improved by the proposed method.

  9. A Cost Effective Block Framing Scheme for Underwater Communication

    Directory of Open Access Journals (Sweden)

    Soo-Hyun Park

    2011-12-01

    Full Text Available In this paper, the Selective Multiple Acknowledgement (SMA method, based on Multiple Acknowledgement (MA, is proposed to efficiently reduce the amount of data transmission by redesigning the transmission frame structure and taking into consideration underwater transmission characteristics. The method is suited to integrated underwater system models, as the proposed method can handle the same amount of data in a much more compact frame structure without any appreciable loss of reliability. Herein, the performance of the proposed SMA method was analyzed and compared to those of the conventional Automatic Repeat-reQuest (ARQ, Block Acknowledgement (BA, block response, and MA methods. The efficiency of the underwater sensor network, which forms a large cluster and mostly contains uplink data, is expected to be improved by the proposed method.

  10. Modeling the utility of binaural cues for underwater sound localization.

    Science.gov (United States)

    Schneider, Jennifer N; Lloyd, David R; Banks, Patchouly N; Mercado, Eduardo

    2014-06-01

    The binaural cues used by terrestrial animals for sound localization in azimuth may not always suffice for accurate sound localization underwater. The purpose of this research was to examine the theoretical limits of interaural timing and level differences available underwater using computational and physical models. A paired-hydrophone system was used to record sounds transmitted underwater and recordings were analyzed using neural networks calibrated to reflect the auditory capabilities of terrestrial mammals. Estimates of source direction based on temporal differences were most accurate for frequencies between 0.5 and 1.75 kHz, with greater resolution toward the midline (2°), and lower resolution toward the periphery (9°). Level cues also changed systematically with source azimuth, even at lower frequencies than expected from theoretical calculations, suggesting that binaural mechanical coupling (e.g., through bone conduction) might, in principle, facilitate underwater sound localization. Overall, the relatively limited ability of the model to estimate source position using temporal and level difference cues underwater suggests that animals such as whales may use additional cues to accurately localize conspecifics and predators at long distances. Copyright © 2014 Elsevier B.V. All rights reserved.

  11. Underwater Communications: An OFDM-system for Underwater Communications

    OpenAIRE

    Gregersen, Svein Erik Søndervik

    2007-01-01

    In the fall 2006 NTNU (The Norwegian University and Science and Technology) initiated a strategic project in cooperations with SINTEF where the aim is to gain more knowledge about underwater acoustic communications. This study is a part of this project and focuses on a system for underwater communication. A orthogonal frequency division multiplexing (OFDM) system using differential quadrature phase shift keying (DQPSK) has been defined and implemented in MATLAB. The system has been characteri...

  12. A Dialectic for Network Centric Warfare

    Science.gov (United States)

    2005-06-01

    Each of the four tenets may in fact stifle military effectiveness. We might view the NCW tenets as being like “lies to children” ( Pratchett ...Scientific Discovery, Hutchinson, London. 44 Pratchett , T., Stewart, I., Cohen, J., (2002), The Science of Discworld, Publ. Ebury, London, 2002

  13. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available Service Provider Lock doors and gates Install locks Install fencing Protect against fires ICT Infrastructure Security Guard Check ID cards Monitor premises Figure 2. Use Case Collaboration Diagram for Physical Security It was identified... and that the premises are protected against fire and power disruptions. At a structural level, the building service provider will address issues relating to the installation of fencing and locks. At an operational level, the security guard will be on duty to lock...

  14. The influence of underwater data transmission sounds on the displacement behaviour of captive harbour seals (Phoca vitulina)

    NARCIS (Netherlands)

    Kastelein, R.A.; Heul, S. van der; Verboom, W.C.; Triesscheijn, R.J.V.; Jennings, N.V.

    2006-01-01

    To prevent grounding of ships and collisions between ships in shallow coastal waters, an underwater data collection and communication network (ACME) using underwater sounds to encode and transmit data is currently under development. Marine mammals might be affected by ACME sounds since they may use

  15. Underwater noise due to precipitation

    OpenAIRE

    Crum, Lawrence A.; Pumphrey, Hugh C.; Prosperetti, Andrea; Jensen, Leif Bjørnø

    1989-01-01

    In 1959, G. Franz published a thorough investigation of the underwater sound produced by liquid drop impacts [G. Franz, J. Acoust. Soc. Am. 31, 1080 (1959)]. He discovered that, under certain conditions, a gas bubble was entrained by the impacting droplet, and the subsequent oscillation of this bubble resulted in a large amount of radiated sound. Recently, Scrimger has measured the underwater sound produced by rainfall and has discovered that a well-defined spectral peak exists near 15 kHz [J...

  16. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  17. Cyber-Enabled Unconventional Warfare: The Convergence of Cyberspace, Social Mobilization, and Special Warfare

    Science.gov (United States)

    2015-12-01

    cyber warfare, cyber terrorism, DDoS attacks, department of defense, hackers, hacktivists, hybrid warfare, information warfare, insurgency...INTENTIONALLY LEFT BLANK xv LIST OF ACRONYMS AND ABBREVIATIONS CBI China, Burma, and India (theater in WWII) CIA Central Intelligence Agency DDoS ...as a distributed denial of service ( DDoS ) attack. By pushing too much data to a computer, site, or server, these types of attacks effectively

  18. Topic modelling in the information warfare domain

    CSIR Research Space (South Africa)

    De

    2013-11-01

    Full Text Available In this paper the authors provide context to Topic Modelling as an Information Warfare technique. Topic modelling is a technique that discovers latent topics in unstructured and unlabelled collection of documents. The topic structure can be searched...

  19. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...

  20. Gray Zone Warfare: German and Russian Political Warfare, 1935-1939, and 2001

    Science.gov (United States)

    2017-06-09

    Irregular Warfare, Unconventional Warfare, Hybrid, and 107 John Chambers , Countering Gray-Zone...111 Chambers , 5. Diplomatic, Information, Military, and Economic variables refers to the U.S. Army analytical framework. 112 Dickey et al. 113...media under German control reported, “ bloody terror, unleashed mobs, massacre and looting,” with reports of widespread murder of Sudeten Germans.193

  1. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  2. US Army Special Warfare. Its Origins: Psychological and Unconventional Warfare, 1941-1952

    Science.gov (United States)

    1982-01-01

    Saul K. Padover and Harold D. Lasswell , "Psychological Warfare," Headline Series, no. 86 (20 March 1951), pp. 14f.; Daugherty and Janowitz, Casebook...of the North African Theater of Operations, National Archives. 41. Padover and Lasswell , "Psychological Warfare," p. 16. 42. Military Intelligence

  3. Hybrid Underwater Vehicle: ARV Design and Development

    Directory of Open Access Journals (Sweden)

    Zhigang DENG

    2014-02-01

    Full Text Available The development of SMU-I, a new autonomous & remotely-operated vehicle (ARV is described. Since it has both the characteristics of autonomous underwater vehicle (AUV and remote operated underwater vehicle (ROV, it is able to achieve precision fix station operation and manual timely intervention. In the paper the initial design of basic components, such as vehicle, propulsion, batteries etc. and the control design of motion are introduced and analyzed. ROV’s conventional cable is replaced by a fiber optic cable, which makes it available for high-bandwidth real-time video, data telemetry and high-quality teleoperation. Furthermore, with the aid of the manual real-time remote operation and ranging sonar, it also resolves the AUV’s conflicting issue, which can absolutely adapt the actual complex sea environment and satisfy the unknown mission need. The whole battery system is designed as two-battery banks, whose voltages and temperatures are monitored through CAN (controller area network bus to avoid battery fire and explosion. A fuzzy-PID controller is designed for its motion control, including depth control and direction control. The controller synthesizes the advantage of fuzzy control and PID control, utilizes the fuzzy rules to on-line tune the parameters of PID controller, and achieves a better control effect. Experiment results demonstrate to show the effectiveness of the test-bed.

  4. The Control Packet Collision Avoidance Algorithm for the Underwater Multichannel MAC Protocols via Time-Frequency Masking

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2016-01-01

    Full Text Available Establishing high-speed and reliable underwater acoustic networks among multiunmanned underwater vehicles (UUVs is basic to realize cooperative and intelligent control among different UUVs. Nevertheless, different from terrestrial network, the propagation speed of the underwater acoustic network is 1500 m/s, which makes the design of the underwater acoustic network MAC protocols a big challenge. In accordance with multichannel MAC protocols, data packets and control packets are transferred through different channels, which lowers the adverse effect of acoustic network and gradually becomes the popular issues of underwater acoustic networks MAC protocol research. In this paper, we proposed a control packet collision avoidance algorithm utilizing time-frequency masking to deal with the control packets collision in the control channel. This algorithm is based on the scarcity of the noncoherent underwater acoustic communication signals, which regards collision avoiding as separation of the mixtures of communication signals from different nodes. We first measure the W-Disjoint Orthogonality of the MFSK signals and the simulation result demonstrates that there exists time-frequency mask which can separate the source signals from the mixture of the communication signals. Then we present a pairwise hydrophones separation system based on deep networks and the location information of the nodes. Consequently, the time-frequency mask can be estimated.

  5. Underwater noise due to precipitation

    DEFF Research Database (Denmark)

    Crum, Lawrence A.; Pumphrey, Hugh C.; Prosperetti, Andrea

    1989-01-01

    of this bubble resulted in a large amount of radiated sound. Recently, Scrimger has measured the underwater sound produced by rainfall and has discovered that a well-defined spectral peak exists near 15 kHz [J. A. Scrimger, Nature 318, 647 (1985)]. The sound produced by the impact of water droplets on a water......In 1959, G. Franz published a thorough investigation of the underwater sound produced by liquid drop impacts [G. Franz, J. Acoust. Soc. Am. 31, 1080 (1959)]. He discovered that, under certain conditions, a gas bubble was entrained by the impacting droplet, and the subsequent oscillation...... surface, both for individual and for multiple events such as those produced by artificial and natural rainfall, has been examined. The studies indicate that the major contribution to the underwater noise produced by both rain and snow is that associated with the oscillations of gas bubbles introduced...

  6. Action-specific effects underwater.

    Science.gov (United States)

    Witt, Jessica K; Schuck, Donald M; Taylor, J Eric T

    2011-01-01

    Action-specific effects on perception are apparent in terrestrial environments. For example, targets that require more effort to walk, jump, or throw to look farther away than when the targets require less effort. Here, we examined whether action-specific effects would generalize to an underwater environment. Instead, perception might be geometrically precise, rather than action-specific, in an environment that is novel from an evolutionary perspective. We manipulated ease to swim by giving participants swimming flippers or taking them away. Those who estimated distance while wearing the flippers judged underwater targets to be closer than did participants who had taken them off. In addition, participants with better swimming ability judged the targets to be closer than did those with worse swimming ability. These results suggest perceived distance underwater is a function of the perceiver's ability to swim to the targets.

  7. Design of Autonomous Underwater Vehicle

    Directory of Open Access Journals (Sweden)

    Tadahiro Hyakudome

    2011-03-01

    Full Text Available There are concerns about the impact that global warming will have on our environment, and which will inevitably result in expanding deserts and rising water levels. While a lot of underwater vehicles are utilized, AUVs (Autonomous Underwater Vehicle were considered and chosen, as the most suitable tool for conduction survey concerning these global environmental problems. AUVs can comprehensive survey because the vehicle does not have to be connected to the support vessel by tether cable. When such underwater vehicles are made, it is necessary to consider about the following things. 1 Seawater and Water Pressure Environment, 2 Sink, 3 There are no Gas or Battery Charge Stations, 4 Global Positioning System cannot use, 5 Radio waves cannot use. In the paper, outline of above and how deal about it are explained.

  8. UNDERWATER COATINGS FOR CONTAMINATION CONTROL

    Energy Technology Data Exchange (ETDEWEB)

    Julia L. Tripp; Kip Archibald; Ann Marie Phillips; Joseph Campbell

    2004-02-01

    The Idaho National Laboratory (INL) deactivated several aging nuclear fuel storage basins. Planners for this effort were greatly concerned that radioactive contamination present on the basin walls could become airborne as the sides of the basins became exposed during deactivation and allowed to dry after water removal. One way to control this airborne contamination was to fix the contamination in place while the pool walls were still submerged. There are many underwater coatings available on the market for marine, naval and other applications. A series of tests were run to determine whether the candidate underwater fixatives were easily applied and adhered well to the substrates (pool wall materials) found in INL fuel pools. Lab-scale experiments were conducted by applying fourteen different commercial underwater coatings to four substrate materials representative of the storage basin construction materials, and evaluating their performance. The coupons included bare concrete, epoxy painted concrete, epoxy painted carbon steel, and stainless steel. The evaluation criteria included ease of application, adherence to the four surfaces of interest, no change on water clarity or chemistry, non-hazardous in final applied form and be proven in underwater applications. A proprietary two-part, underwater epoxy owned by S. G. Pinney and Associates was selected from the underwater coatings tested for application to all four pools. Divers scrubbed loose contamination off the basin walls and floors using a ship hull scrubber and vacuumed up the sludge. The divers then applied the coating using a special powered roller with two separate heated hoses that allowed the epoxy to mix at the roller surface was used to eliminate pot time concerns. The walls were successfully coated and water was removed from the pools with no detectable airborne contamination releases.

  9. Underwater laser imaging system (UWLIS)

    Energy Technology Data Exchange (ETDEWEB)

    DeLong, M. [Lawrence Livermore National Lab., CA (United States)

    1994-11-15

    Practical limitations with underwater imaging systems area reached when the noise in the back scattered radiation generated in the water between the imaging system and the target obscures the spatial contrast and resolution necessary for target discovery and identification. The advent of high power lasers operating in the blue-green portion of the visible spectrum (oceanic transmission window) has led to improved experimental illumination systems for underwater imaging. Range-gated and synchronously scanned devices take advantage of the unique temporal and spatial coherence properties of laser radiation, respectively, to overcome the deleterious effects of common volume back scatter.

  10. Hybrid Warfare – A Form of Asymmetric Conflict

    National Research Council Canada - National Science Library

    Laura-Maria Herța

    2017-01-01

    ... century features novel aspects. Several concepts have been coined in order to describe the nature and dynamic of warfare in a post-clausewitzian/post-conventional era, such as new wars, Fourth Generation Warfare, compound wars...

  11. Automation for underwater mine recognition: current trends and future strategy

    Science.gov (United States)

    Stack, Jason

    2011-06-01

    The purpose of this paper is to define the vision and future strategy for advancing the use of automation in underwater mine recognition. The technical portion of this strategy is founded on the principle of adapting the automation in situ based on a highly variable environment / context and the occasional availability of the human operator. To frame this strategy, a survey of past and current algorithm development for underwater mine recognition is presented and includes a detailed description on adaptive algorithms. This discussion is motivated by illustrating the extreme variability in the underwater environment and that performance estimation techniques are now emerging that are capable of quantifying these variations in situ. It is the in situ linkage of performance estimation with adaptive recognition that forms one of the key technological enablers of this future strategy. The non-technical portion of this strategy is centered on enabling an effective human-machine team. Enabling this teaming relationship involves both gaining trust and establishing an overall support system that is amenable to such human-machine interactions. Aspects of trust include both individual trust and institutional trust, and a path for gaining both is discussed. Overall aspects of the support system are highlighted and include standards for data and interoperability, network-centric software architectures, and issues in proliferating knowledge that is learned in situ by multiple distributed algorithms. This paper concludes with an articulation of several important and timely research questions concerning automation for underwater mine recognition.

  12. Canadian Network Enabled Operations Initiatives

    Science.gov (United States)

    2004-06-01

    Canto One: Network Centric Warfare and the Myth of the New Economy, A Woven Web of Guesses, Canto Two: Network Centric Warfare and the Myth of...symposium 30 Nov – 2 Dec 04 CFEC-CEFC 5 CFEC CEFC CFEC Thrust Areas COMBAT ID FUTURE CFCS CF JOINT LOGISTICS INTEROPERABILITY WITH OGDS /NGOS/ CONTRACTORS...Surveillance, Fish Patrol, Protection of vital points • Forces: ROC, HFSWR, AIS, CP140, PAL, UAV, CBRN Team, ISTAR ASC, MEWT, Radarsat, OGDs • C4I

  13. "Beyond-the-Box" Thinking on Future War: The Art and Science of Unrestricted Warfare

    Science.gov (United States)

    2009-04-01

    chemical Warfare Intelligence Warfare Resources Warfare Ecological Warfare Psycological Warfare Economic Aid Warfare Space Warfare Smuggling Warfare...state adjust to the prospect of URW? As seen before, state actors no longer have a monopoly over the catastrophic use of violence . The...civilianization of warfare is a natural consequence of URW, and the democratization of violence allows virtually everyone to 21 AU/ACSC/1172/AY09 join the

  14. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  15. Underwater Robots Surface in Utah

    Science.gov (United States)

    Hurd, Randy C.; Hacking, Kip S.; Damarjian, Jennifer L.; Wright, Geoffrey A.; Truscott, Tadd

    2015-01-01

    Underwater robots (or ROVs: Remotely Operated Vehicles as they are typically called in industry) have recently become a very popular instructional STEM activity. Nationally, ROVs have been used in science and technology classrooms for several years in cities such as Seattle, San Diego, Virginia Beach, and other coastal areas. In the past two…

  16. A Comprehensive Study on the Internet of Underwater Things: Applications, Challenges, and Channel Models †

    Science.gov (United States)

    Wu, Geng-De; Huang, Chun-Ju

    2017-01-01

    The Internet of Underwater Things (IoUT) is a novel class of Internet of Things (IoT), and is defined as the network of smart interconnected underwater objects. IoUT is expected to enable various practical applications, such as environmental monitoring, underwater exploration, and disaster prevention. With these applications, IoUT is regarded as one of the potential technologies toward developing smart cities. To support the concept of IoUT, Underwater Wireless Sensor Networks (UWSNs) have emerged as a promising network system. UWSNs are different from the traditional Territorial Wireless Sensor Networks (TWSNs), and have several unique properties, such as long propagation delay, narrow bandwidth, and low reliability. These unique properties would be great challenges for IoUT. In this paper, we provide a comprehensive study of IoUT, and the main contributions of this paper are threefold: (1) we introduce and classify the practical underwater applications that can highlight the importance of IoUT; (2) we point out the differences between UWSNs and traditional TWSNs, and these differences are the main challenges for IoUT; and (3) we investigate and evaluate the channel models, which are the technical core for designing reliable communication protocols on IoUT. PMID:28640220

  17. A Comprehensive Study on the Internet of Underwater Things: Applications, Challenges, and Channel Models.

    Science.gov (United States)

    Kao, Chien-Chi; Lin, Yi-Shan; Wu, Geng-De; Huang, Chun-Ju

    2017-06-22

    The Internet of Underwater Things (IoUT) is a novel class of Internet of Things (IoT), and is defined as the network of smart interconnected underwater objects. IoUT is expected to enable various practical applications, such as environmental monitoring, underwater exploration, and disaster prevention. With these applications, IoUT is regarded as one of the potential technologies toward developing smart cities. To support the concept of IoUT, Underwater Wireless Sensor Networks (UWSNs) have emerged as a promising network system. UWSNs are different from the traditional Territorial Wireless Sensor Networks (TWSNs), and have several unique properties, such as long propagation delay, narrow bandwidth, and low reliability. These unique properties would be great challenges for IoUT. In this paper, we provide a comprehensive study of IoUT, and the main contributions of this paper are threefold: (1) we introduce and classify the practical underwater applications that can highlight the importance of IoUT; (2) we point out the differences between UWSNs and traditional TWSNs, and these differences are the main challenges for IoUT; and (3) we investigate and evaluate the channel models, which are the technical core for designing reliable communication protocols on IoUT.

  18. A Comprehensive Study on the Internet of Underwater Things: Applications, Challenges, and Channel Models

    Directory of Open Access Journals (Sweden)

    Chien-Chi Kao

    2017-06-01

    Full Text Available The Internet of Underwater Things (IoUT is a novel class of Internet of Things (IoT, and is defined as the network of smart interconnected underwater objects. IoUT is expected to enable various practical applications, such as environmental monitoring, underwater exploration, and disaster prevention. With these applications, IoUT is regarded as one of the potential technologies toward developing smart cities. To support the concept of IoUT, Underwater Wireless Sensor Networks (UWSNs have emerged as a promising network system. UWSNs are different from the traditional Territorial Wireless Sensor Networks (TWSNs, and have several unique properties, such as long propagation delay, narrow bandwidth, and low reliability. These unique properties would be great challenges for IoUT. In this paper, we provide a comprehensive study of IoUT, and the main contributions of this paper are threefold: (1 we introduce and classify the practical underwater applications that can highlight the importance of IoUT; (2 we point out the differences between UWSNs and traditional TWSNs, and these differences are the main challenges for IoUT; and (3 we investigate and evaluate the channel models, which are the technical core for designing reliable communication protocols on IoUT.

  19. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues......, that it is possible to answer the first part of the problem statement in an affirmative way. Hence, ISIL is not only theoretically prone to hybridity by organizational setup, and by the people comprising the organization, but has in fact continuously acted according to a hybrid logic in its prioritization...... of and ability to synchronize various instruments of power with a view to achieving their end-state. With regards to the second part of the problem statement, the analysis demonstrates how ISIL employed horizontal escalation and ambiguity initially, but later on turned to vertical escalation, within the military...

  20. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  1. Measurement and Modeling of Narrowband Channels for Ultrasonic Underwater Communications.

    Science.gov (United States)

    Cañete, Francisco J; López-Fernández, Jesús; García-Corrales, Celia; Sánchez, Antonio; Robles, Encarnación; Rodrigo, Francisco J; Paris, José F

    2016-02-19

    Underwater acoustic sensor networks are a promising technology that allow real-time data collection in seas and oceans for a wide variety of applications. Smaller size and weight sensors can be achieved with working frequencies shifted from audio to the ultrasonic band. At these frequencies, the fading phenomena has a significant presence in the channel behavior, and the design of a reliable communication link between the network sensors will require a precise characterization of it. Fading in underwater channels has been previously measured and modeled in the audio band. However, there have been few attempts to study it at ultrasonic frequencies. In this paper, a campaign of measurements of ultrasonic underwater acoustic channels in Mediterranean shallow waters conducted by the authors is presented. These measurements are used to determine the parameters of the so-called κ-μ shadowed distribution, a fading model with a direct connection to the underlying physical mechanisms. The model is then used to evaluate the capacity of the measured channels with a closed-form expression.

  2. Measurement and Modeling of Narrowband Channels for Ultrasonic Underwater Communications

    Directory of Open Access Journals (Sweden)

    Francisco J. Cañete

    2016-02-01

    Full Text Available Underwater acoustic sensor networks are a promising technology that allow real-time data collection in seas and oceans for a wide variety of applications. Smaller size and weight sensors can be achieved with working frequencies shifted from audio to the ultrasonic band. At these frequencies, the fading phenomena has a significant presence in the channel behavior, and the design of a reliable communication link between the network sensors will require a precise characterization of it. Fading in underwater channels has been previously measured and modeled in the audio band. However, there have been few attempts to study it at ultrasonic frequencies. In this paper, a campaign of measurements of ultrasonic underwater acoustic channels in Mediterranean shallow waters conducted by the authors is presented. These measurements are used to determine the parameters of the so-called κ-μ shadowed distribution, a fading model with a direct connection to the underlying physical mechanisms. The model is then used to evaluate the capacity of the measured channels with a closed-form expression.

  3. Measurement and Modeling of Narrowband Channels for Ultrasonic Underwater Communications

    Science.gov (United States)

    Cañete, Francisco J.; López-Fernández, Jesús; García-Corrales, Celia; Sánchez, Antonio; Robles, Encarnación; Rodrigo, Francisco J.; Paris, José F.

    2016-01-01

    Underwater acoustic sensor networks are a promising technology that allow real-time data collection in seas and oceans for a wide variety of applications. Smaller size and weight sensors can be achieved with working frequencies shifted from audio to the ultrasonic band. At these frequencies, the fading phenomena has a significant presence in the channel behavior, and the design of a reliable communication link between the network sensors will require a precise characterization of it. Fading in underwater channels has been previously measured and modeled in the audio band. However, there have been few attempts to study it at ultrasonic frequencies. In this paper, a campaign of measurements of ultrasonic underwater acoustic channels in Mediterranean shallow waters conducted by the authors is presented. These measurements are used to determine the parameters of the so-called κ-μ shadowed distribution, a fading model with a direct connection to the underlying physical mechanisms. The model is then used to evaluate the capacity of the measured channels with a closed-form expression. PMID:26907281

  4. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  5. Cognitive systems in electronic warfare

    Science.gov (United States)

    Kulpa, Krzysztof; Szczepankiewicz, Michał; Żywek, Marcin; Malanowski, Mateusz; Misiurewicz, Jacek; Samczyński, Piotr

    2017-04-01

    Electronic warfare (EW) techniques were invented 70 years ago and are still being developed, all the time with a key role played by their operators. However, a human operator responds far too slowly for the on-going needs since to be adequate to current threats the EW system reaction should be within 1 ms or less. Too slow reaction defers an achievement of the objectives, and generally may lead to disclosure of the applied strategy and to waste of resources. Developing the adequate response to the threat is a multifaceted matter that requires considerable experience and knowledge on the one hand, and thorough observation of outcomes of the applied strategy on the other hand. Such action requires the use of not only intelligence but also more complex algorithms for automatic control than the classical ones, and it heavily builds on the experience. It is therefore a cognitive task in its nature, and a human operator acts naturally this way. Consequently, a proper training and experience gained are what really matters. As a result of tests and actions in EW the operator builds his own knowledge base, thus, gains a capability of responding to the known threats in a balanced way. New threats, however, are much more challenging since they should be handled as fast as possible but in a fresh and creative manner. To this end, adapting the algorithms of radar jamming protection for the new conditions of the battlefield is an example of such challenging tasks. At present, such adjustments are done in a long feedback loop when the operator, after recognizing the problem, notifies the equipment manufacturers, and then, their engineers work on required solutions accordingly. Thus, the reaction time is counted in years, not a single milliseconds or seconds. Speeding up the response time is therefore the key issue, and a solution to it would be feasible only when cognitive systems were used. A concept of such cognitive system is presented in this paper.

  6. Development of tools and techniques for monitoring underwater artifacts

    Science.gov (United States)

    Lazar, Iulian; Ghilezan, Alin; Hnatiuc, Mihaela

    2016-12-01

    The different assessments provide information on the best methods to approach an artifact. The presence and extent of potential threats to archaeology must also be determined. In this paper we present an underwater robot, built in the laboratory, able to identify the artifact and to get it to the surface. It is an underwater remotely operated vehicle (ROV) which can be controlled remotely from the shore, a boat or a control station and communication is possible through an Ethernet cable with a maximum length of 100 m. The robot is equipped with an IP camera which sends real time images that can be accessed anywhere from within the network. The camera also has a microSD card to store the video. The methods developed for data communication between the robot and the user is present. A communication protocol between the client and server is developed to control the ROV.

  7. Cooperative OFDM underwater acoustic communications

    CERN Document Server

    Cheng, Xilin; Cheng, Xiang

    2016-01-01

    Following underwater acoustic channel modeling, this book investigates the relationship between coherence time and transmission distances. It considers the power allocation issues of two typical transmission scenarios, namely short-range transmission and medium-long range transmission. For the former scenario, an adaptive system is developed based on instantaneous channel state information. The primary focus is on cooperative dual-hop orthogonal frequency division multiplexing (OFDM). This book includes the decomposed fountain codes designed to enable reliable communications with higher energy efficiency. It covers the Doppler Effect, which improves packet transmission reliability for effective low-complexity mirror-mapping-based intercarrier interference cancellation schemes capable of suppressing the intercarrier interference power level. Designed for professionals and researchers in the field of underwater acoustic communications, this book is also suitable for advanced-level students in electrical enginee...

  8. International Conference on Underwater Environment

    CERN Document Server

    Jaulin, Luc; Creuze, Vincent; Debese, Nathalie; Quidu, Isabelle; Clement, Benoît; Billon-Coat, Annick

    2016-01-01

    This volume constitutes the results of the International Conference on Underwater Environment, MOQESM’14, held at “Le Quartz” Conference Center in Brest, France, on October 14-15, 2014, within the framework of the 9th Sea Tech Week, International Marine Science and Technology Event. The objective of MOQESM'14 was to bring together researchers from both academia and industry, interested in marine robotics and hydrography with application to the coastal environment mapping and underwater infrastructures surveys. The common thread of the conference is the combination of technical control, perception, and localization, typically used in robotics, with the methods of mapping and bathymetry. The papers presented in this book focus on two main topics. Firstly, coastal and infrastructure mapping is addressed, focusing not only on hydrographic systems, but also on positioning systems, bathymetry, and remote sensing. The proposed methods rely on acoustic sensors such as side scan sonars, multibeam echo sounders, ...

  9. Polymer Claw: Instant Underwater Adhesive

    Science.gov (United States)

    2012-10-23

    Prescribed by ANSI Std. Z39.18 REDD -2012-413 POLYMER CLAW: INSTANT UNDERWATER ADHESIVE Progress Report #8 Prepared for: Dr. Reggie Beach...Report: October 23, 2012 2.ol X\\oZ\\olc] The Johns Hopkins University Applied Physics Laboratory 11100 Johns Hopkins Rd, Laurel, MD 20723 REDD -2012...2- 10/23/12 The Johns Hopkins University Applied Physics Laboratory 11100 Johns Hopkins Rd, Laurel, MD 20723 REDD -2012-413 1 Summary When

  10. Acoustic Based Tactical Control of Underwater Vehicles

    National Research Council Canada - National Science Library

    Marr, William

    2003-01-01

    Advances in command and control of Autonomous Underwater Vehicles (AUVs) using acoustic communications are crucial to future Fleet objectives, particularly in Very Shallow Water Mine Countermeasures (VSW MCM...

  11. Chemical and Biological Warfare: A Selected Bibliography

    Science.gov (United States)

    1991-04-01

    WORLD ARMA - MENTS AND DISARMAMENT. SIPRI Yearbook 1990. New York: Oxford University Press, 1990. (REF JX1974 S775 1990) Pp. 107-133: "Chemical and...Report. Norton D. Zinder, Chairman. Washington: National Academy Press, 1984. (UG447 N33 1984) LEGACY OF CHEMICAL AND BIOLOGICA !L WARFARE Some 20th

  12. Warfare tourism experiences and national identity

    NARCIS (Netherlands)

    Gieling, Joost; Ong, Chin Ee

    2016-01-01

    This paper examines through an analysis of Dutch warfare tourism whether there is a relationship between the subjective perceived salience of Dutch identity and heritage tourists’ motives, emotions and overall satisfaction. Using a social identity theory framework, this study provides a view of

  13. Underwater Coatings for Contamination Control

    Energy Technology Data Exchange (ETDEWEB)

    Julia L. Tripp; Kip Archibald; Ann-Marie Phillips; Joseph Campbell

    2004-02-01

    The Idaho National Engineering and Environmental Laboratory (INEEL) is deactivating several fuel storage basins. Airborne contamination is a concern when the sides of the basins are exposed and allowed to dry during water removal. One way of controlling this airborne contamination is to fix the contamination in place while the pool walls are still submerged. There are many underwater coatings available on the market that are used in marine, naval and other applications. A series of tests were run to determine whether the candidate underwater fixatives are easily applied and adhere well to the substrates (pool wall materials) found in INEEL fuel pools. The four pools considered included 1) Test Area North (TAN-607) with epoxy painted concrete walls; 2) Idaho Nuclear Technology and Engineering Center (INTEC) (CPP-603) with bare concrete walls; 3) Materials Test Reactor (MTR) Canal with stainless steel lined concrete walls; and 4) Power Burst Facility (PBF-620) with stainless steel lined concrete walls on the bottom and epoxy painted carbon steel lined walls on the upper portions. Therefore, the four materials chosen for testing included bare concrete, epoxy painted concrete, epoxy painted carbon steel, and stainless steel. The typical water temperature of the pools varies from 55oF to 80oF dependent on the pool and the season. These tests were done at room temperature. The following criteria were used during this evaluation. The underwater coating must: · Be easy to apply · Adhere well to the four surfaces of interest · Not change or have a negative impact on water chemistry or clarity · Not be hazardous in final applied form · Be proven in other underwater applications. In addition, it is desirable for the coating to have a high pigment or high cross-link density to prevent radiation from penetrating. This paper will detail the testing completed and the test results. A proprietary two-part, underwater epoxy owned by S. G. Pinney and Associates was selected to

  14. Channel coding for underwater acoustic single-carrier CDMA communication system

    Science.gov (United States)

    Liu, Lanjun; Zhang, Yonglei; Zhang, Pengcheng; Zhou, Lin; Niu, Jiong

    2017-01-01

    CDMA is an effective multiple access protocol for underwater acoustic networks, and channel coding can effectively reduce the bit error rate (BER) of the underwater acoustic communication system. For the requirements of underwater acoustic mobile networks based on CDMA, an underwater acoustic single-carrier CDMA communication system (UWA/SCCDMA) based on the direct-sequence spread spectrum is proposed, and its channel coding scheme is studied based on convolution, RA, Turbo and LDPC coding respectively. The implementation steps of the Viterbi algorithm of convolutional coding, BP and minimum sum algorithms of RA coding, Log-MAP and SOVA algorithms of Turbo coding, and sum-product algorithm of LDPC coding are given. An UWA/SCCDMA simulation system based on Matlab is designed. Simulation results show that the UWA/SCCDMA based on RA, Turbo and LDPC coding have good performance such that the communication BER is all less than 10-6 in the underwater acoustic channel with low signal to noise ratio (SNR) from -12 dB to -10dB, which is about 2 orders of magnitude lower than that of the convolutional coding. The system based on Turbo coding with Log-MAP algorithm has the best performance.

  15. On the Accuracy Potential in Underwater/Multimedia Photogrammetry.

    Science.gov (United States)

    Maas, Hans-Gerd

    2015-07-24

    Underwater applications of photogrammetric measurement techniques usually need to deal with multimedia photogrammetry aspects, which are characterized by the necessity of handling optical rays that are refracted at interfaces between optical media with different refractive indices according to Snell's Law. This so-called multimedia geometry has to be incorporated into geometric models in order to achieve correct measurement results. The paper shows a flexible yet strict geometric model for the handling of refraction effects on the optical path, which can be implemented as a module into photogrammetric standard tools such as spatial resection, spatial intersection, bundle adjustment or epipolar line computation. The module is especially well suited for applications, where an object in water is observed by cameras in air through one or more planar glass interfaces, as it allows for some simplifications here. In the second part of the paper, several aspects, which are relevant for an assessment of the accuracy potential in underwater/multimedia photogrammetry, are discussed. These aspects include network geometry and interface planarity issues as well as effects caused by refractive index variations and dispersion and diffusion under water. All these factors contribute to a rather significant degradation of the geometric accuracy potential in underwater/multimedia photogrammetry. In practical experiments, a degradation of the quality of results by a factor two could be determined under relatively favorable conditions.

  16. Seeking Teachers for Underwater Robotics PD Program

    Science.gov (United States)

    McGrath, Beth; Sayres, Jason

    2012-01-01

    With funding from the National Science Foundation (NSF), ITEEA members will contribute to the development of a hybrid professional development program designed to facilitate the scale-up of an innovative underwater robotics curriculum. WaterBotics[TM] is an underwater robotics curriculum that targets students in middle and high school classrooms…

  17. Multipurpose ROV system for underwater monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Graczyk, T. [Technical Univ. of Szczecin (Poland)

    1995-12-31

    The paper presents achievements of the Underwater Team at the Faculty of Maritime Technology of the Szczecin Technical University in the field of designing the equipment destined for the underwater monitoring. The multipurpose remotely operated vehicle system is described. Technical specification, some laboratory tank test results, research techniques, operational range, experience and development trends have been discussed.

  18. On the Effects of Frequency Scaling Over Capacity Scaling in Underwater Networks—Part I

    DEFF Research Database (Denmark)

    Shin, Won-Yong; Roetter, Daniel Enrique Lucani; Médard, Muriel

    2013-01-01

    In this two-part paper, information-theoretic capacity scaling laws are analyzed in an underwater acoustic network with n regularly located nodes on a square, in which both bandwidth and received signal power can be limited significantly. Parts I and II deal with an extended network of unit node...... power-limited network. Interestingly, it is shown that the upper bound is intrinsically related to the attenuation parameter but not the spreading factor. Furthermore, we propose an achievable communication scheme based on the nearest-neighbor MH transmission, which is suitable due to the low...... propagation speed of acoustic channel, and show that it is order-optimal for all operating regimes of extended networks. Finally, these scaling results are extended to the case of random node deployments providing fundamental limits to more complex scenarios of extended underwater networks....

  19. Unconventional Warfare: A Mission Metamorphosis for the 21st Century?

    Science.gov (United States)

    2000-06-01

    brigadier general and publish several more noted works on Mao and revolutionary warfare. See Samuel B. Giffith, Mao Tse-Tung on Guerrilla Warfare (New...and propagators of the faith. The bibles (in English translation) are Mao Tse-tung on Guerrilla Warfare by Brigadier General Samuel B. Griffith...Barnett, B. Hugh Tovar , and Richard H. Schultz eds., Special Operations in US Strategy (Washington, D.C.: US Government Printing Office, 1984), 2. 58

  20. Chemical Warfare Agent Decontaminant Solution Using Quaternary Ammonium Complexes

    Science.gov (United States)

    1997-12-11

    warfare agents, which include a variety of organophosphorus and organosulfur compounds, are known in the art. 15 However, these known methods use...chemical warfare agents, and works particularly well for neutralization of organosulfur agents such as mustard gas (HD), and organophosphorus agents such...detoxifying/neutralizing a variety of chemical warfare agents, including organosulfur agents such as mustard gas (HD), and organophosphorus agents such as

  1. Quantum imaging for underwater arctic navigation

    Science.gov (United States)

    Lanzagorta, Marco

    2017-05-01

    The precise navigation of underwater vehicles is a difficult task due to the challenges imposed by the variable oceanic environment. It is particularly difficult if the underwater vehicle is trying to navigate under the Arctic ice shelf. Indeed, in this scenario traditional navigation devices such as GPS, compasses and gyrocompasses are unavailable or unreliable. In addition, the shape and thickness of the ice shelf is variable throughout the year. Current Arctic underwater navigation systems include sonar arrays to detect the proximity to the ice. However, these systems are undesirable in a wartime environment, as the sound gives away the position of the underwater vehicle. In this paper we briefly describe the theoretical design of a quantum imaging system that could allow the safe and stealthy navigation of underwater Arctic vehicles.

  2. ROV based underwater blurred image restoration

    Science.gov (United States)

    Zhishen, Liu; Tianfu, Ding; Gang, Wang

    2003-04-01

    In this paper, we present a method of ROV based image processing to restore underwater blurry images from the theory of light and image transmission in the sea. Computer is used to simulate the maximum detection range of the ROV under different water body conditions. The receiving irradiance of the video camera at different detection ranges is also calculated. The ROV’s detection performance under different water body conditions is given by simulation. We restore the underwater blurry images using the Wiener filter based on the simulation. The Wiener filter is shown to be a simple useful method for underwater image restoration in the ROV underwater experiments. We also present examples of restored images of an underwater standard target taken by the video camera in these experiments.

  3. Book Review: Composite warfare: the conduct of successful ground ...

    African Journals Online (AJOL)

    Abstract. Book Title: Composite warfare: the conduct of successful ground force operations in Africa. Book Author: Eeben Barlow. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761.

  4. Proteus II: Design and Evaluation of an Integrated Power-Efficient Underwater Sensor Node

    NARCIS (Netherlands)

    van Kleunen, W.A.P.; Moseley, N.A.; Havinga, Paul J.M.; Meratnia, Nirvana

    2015-01-01

    We describe the design and evaluation of an integrated low-cost underwater sensor node designed for reconfigurability, allowing continuous operation on a relatively small rechargeable battery for one month. The node uses a host CPU for the network protocols and processing sensor data and a separate

  5. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  6. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  7. Forensic Information Warfare Requirement Study

    Science.gov (United States)

    2002-06-01

    defend our computer systems and networks. It can provide us with insight that will allow us to anticipate, and ultimately prevent an attack before it...34Electronic Sweatshop ", 28 J. Marshall L. Rev. 139 (1994). 22. Michael R. Anderson, “Electronic Fingerprints Computer Evidence Comes of Age”, www.secure

  8. Drone Warfare : Visual Primacy as a Weapon

    OpenAIRE

    Lee-Morrison, Lila

    2015-01-01

    This paper articulates drone warfare through a critical analysis of an actual drone operation and a study into its developing technologies. The first chapter moves through a discussion of the intervening role of the camera as described by Walter Benjamin and societal perspective of visual reproduction technology. This discussion then departs from the mechanical to the digital realm of realtime video, utilizing theory of Paul Virilio. The second chapter focuses on developing technologies withi...

  9. Hybrid Warfare: Implications for CAF Force Development

    Science.gov (United States)

    2014-08-01

    Scientific Terms (TEST) and that thesaurus identified. If it is not possible to select indexing terms which are Unclassified, the classification of...the assumption, almost universally cited by much hybrid warfare literature, that intervention in failed and fragile state scenarios is an automatic ...CONTROL DATA (Security markings for the title, abstract and indexing annotation must be entered when the document is Classified or Designated) 1

  10. Animal plant warfare and secondary metabolite evolution

    OpenAIRE

    Wöll, Steffen; Kim, Sun Hee; Greten, Henry Johannes; Efferth, Thomas

    2013-01-01

    Abstract The long-lasting discussion, why plants produce secondary metabolites, which are pharmacologically and toxicologically active towards mammals traces back to the eminent role of medicinal plants in the millennia-old history of manhood. In recent years, the concept of an animal plant warfare emerged, which focused on the co-evolution between plants and herbivores. As a reaction to herbivory, plants developed mechanical defenses such as thorns and hard shells, which paved the way for ad...

  11. Cyber-Warfare: Jus Post Bellum

    Science.gov (United States)

    2015-03-01

    states take to ethically end wars and transition to peace. Immanuel Kant is the first philosopher thought of as the founder of viewing warfare as...in Stahn, 2006, p. 935). Kant also expressed in his Toward Perpetual Peace, as translated and publish by Yale University Press, that states involved...in armed conflict should not conduct acts that will prohibit them from being able to reach peace ( Kant , 2006). As an example, Kant (2006) believed

  12. Finding Lawrence: Recruiting Talent for Unconventional Warfare

    Science.gov (United States)

    2011-06-01

    Velky, ―Special Forces Assessment and Selection,‖ Special Warfare 3, no. 1 (1990): 12–15; Alan Vick, Snakes in the Eagles nest: A History of Ground...skills at BUD/S. They also learn SEAL heritage, history, military bearing, ethics, the SEAL Ethos, mental toughness, nutrition , stretching and... nutrition , and the nature of a SEAL career. The website even provides a forum on which young men can discuss their preparations with each other and

  13. Modeling the Thermal Destruction of Chemical Warfare ...

    Science.gov (United States)

    Symposium Paper In the event of a terrorist attack with chemical warfare agents (CWAs), large quantities of materials, both indoor and outdoor, may be treated with thermal incineration during the site remediation process. This paper reports on a study to examine the thermal decomposition of surrogate CWAs and formation of decomposition by-products bound in model building materials (in this case, ceiling tile) in a pilot-scale rotary kiln incinerator simulator.

  14. Polarimetric imaging of underwater targets

    Science.gov (United States)

    Gilerson, Alex; Carrizo, Carlos; Tonizzo, Alberto; Ibrahim, Amir; El-Habashi, Ahmed; Foster, Robert; Ahmed, Samir

    2013-06-01

    Underwater imaging is challenging because of the significant attenuation of light due to absorption and scattering of light in water. Using polarization properties of light is one of the options for improving image quality. We present results of imaging of a polarized target in open ocean (Curacao) and coastal (NY Bight) waters. The target in the shape of a square is divided into several smaller squares, each of which is covered with a polarizing film with different polarization orientations or transmission coefficients was placed on a mirror and imaged under water by a green-band full-Stokes polarimetric video camera at the full range of azimuth angles against the Sun. The values of the Stokes vector components from the images are compared with the modeled image of the target using radiative transfer code for the atmosphere-ocean system combined with the simple imaging model. It is shown that even in clear water the impact of the water body on the polarized underwater image is very significant and retrieval of target polarization characteristics from the image is extremely challenging.

  15. 4th Pacific Rim Underwater Acoustics Conference

    CERN Document Server

    Xu, Wen; Cheng, Qianliu; Zhao, Hangfang

    2016-01-01

    These proceedings are a collection of 16 selected scientific papers and reviews by distinguished international experts that were presented at the 4th Pacific Rim Underwater Acoustics Conference (PRUAC), held in Hangzhou, China in October 2013. The topics discussed at the conference include internal wave observation and prediction; environmental uncertainty and coupling to sound propagation; environmental noise and ocean dynamics; dynamic modeling in acoustic fields; acoustic tomography and ocean parameter estimation; time reversal and matched field processing; underwater acoustic localization and communication as well as measurement instrumentations and platforms. These proceedings provide insights into the latest developments in underwater acoustics, promoting the exchange of ideas for the benefit of future research.

  16. Optimal Deployment of Sensor Nodes Based on Performance Surface of Underwater Acoustic Communication.

    Science.gov (United States)

    Kim, Sunhyo; Choi, Jee Woong

    2017-10-20

    The underwater acoustic sensor network (UWASN) is a system that exchanges data between numerous sensor nodes deployed in the sea. The UWASN uses an underwater acoustic communication technique to exchange data. Therefore, it is important to design a robust system that will function even in severely fluctuating underwater communication conditions, along with variations in the ocean environment. In this paper, a new algorithm to find the optimal deployment positions of underwater sensor nodes is proposed. The algorithm uses the communication performance surface, which is a map showing the underwater acoustic communication performance of a targeted area. A virtual force-particle swarm optimization algorithm is then used as an optimization technique to find the optimal deployment positions of the sensor nodes, using the performance surface information to estimate the communication radii of the sensor nodes in each generation. The algorithm is evaluated by comparing simulation results between two different seasons (summer and winter) for an area located off the eastern coast of Korea as the selected targeted area.

  17. Optimal Deployment of Sensor Nodes Based on Performance Surface of Underwater Acoustic Communication

    Directory of Open Access Journals (Sweden)

    Sunhyo Kim

    2017-10-01

    Full Text Available The underwater acoustic sensor network (UWASN is a system that exchanges data between numerous sensor nodes deployed in the sea. The UWASN uses an underwater acoustic communication technique to exchange data. Therefore, it is important to design a robust system that will function even in severely fluctuating underwater communication conditions, along with variations in the ocean environment. In this paper, a new algorithm to find the optimal deployment positions of underwater sensor nodes is proposed. The algorithm uses the communication performance surface, which is a map showing the underwater acoustic communication performance of a targeted area. A virtual force-particle swarm optimization algorithm is then used as an optimization technique to find the optimal deployment positions of the sensor nodes, using the performance surface information to estimate the communication radii of the sensor nodes in each generation. The algorithm is evaluated by comparing simulation results between two different seasons (summer and winter for an area located off the eastern coast of Korea as the selected targeted area.

  18. Employing U.S. Information Operations Against Hybrid Warfare Threats

    Science.gov (United States)

    2013-03-01

    leadership .60 Why Adversaries Will Use Hybrid Warfare Desert Storm, operations in former Yugoslavia, as well as Afghanistan and Iraq, demonstrated...February 26, 2013). 128 Manwaring, The Complexity of Modern Asymmetric Warfare, 130-131 129 Ben Sherwood , President of ABC News, discussion with author

  19. Containment 2.0: U.S. Political Warfare

    Science.gov (United States)

    2016-12-01

    emphasized dismal living conditions and blamed the Soviet Union for shortages of fuel, vegetables , and dairy. They also reported on widespread arrests and...a more traditional form of warfare. Special operations leaders agree that SOF’s proficiency in special warfare in “low-visibility, small- footprint

  20. Anti-Air Warfare Research for Naval Forces

    NARCIS (Netherlands)

    Bloemen, A.A.F.; Witberg, R.

    2000-01-01

    AAW is a warfare area with wide-spread spectrum. Command and Control Systems, sensors, effectors and electronic warfare are integrated to a system, they influence each other and must eventually be effective in coordinated action. This complexity asks for Operations Research methods to measure

  1. Relevance of information warfare models to critical infrastructure ...

    African Journals Online (AJOL)

    This article illustrates the relevance of information warfare models to critical infrastructure protection. Analogies of information warfare models to those of information security and information systems were used to deconstruct the models into their fundamental components and this will be discussed. The models were applied ...

  2. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  3. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  4. Engineering and Design: Underwater Blast Monitoring

    National Research Council Canada - National Science Library

    McPherson, John

    1991-01-01

    .... The purpose of this ETL is to assist USACE Commands in the intelligent use of underwater blast monitoring to prevent damage or injury to nearby structures, equipment, or aquatic life from water shock effects...

  5. Covert Underwater Communication with Marine Mammal Sounds

    NARCIS (Netherlands)

    Dol, H.S.; Quesson, B.A.J.; Benders, F.P.A.

    2008-01-01

    Acoustic underwater communication is essential for the participation of friendly submersible vehicles in netcentric operations. To prevent interception of exchanged information and, not less important, detection of the submersibles in a hostile environment, the communication should be sufficiently

  6. Laser remote sensing of underwater objects

    Science.gov (United States)

    Wojtanowski, J.; Mierczyk, Z.; Zygmunt, M.

    2008-10-01

    Theoretical and practical aspects of laser application in the field of underwater remote sensing have been presented. A multi-level analysis and computational results dealing with 0.532 μm laser wavelength were performed to determine the expected capabilities of underwater laser penetration with regard to the Lidar system developed in Optoelectronics Institute of Military University of Technology in Warsaw. Since the device is to perform underwater measurements from above the water level, the influence of the water-atmosphere interface had to be included in the analysis. Sea water characteristics concerning electromagnetic radiation propagation have been widely considered covering the mechanisms of absorption, scattering and the effective attenuation typical for representative types of sea waters. Software application developed in Mathcad environment enabled to model the impact of both absorption and scattering coefficients of different types of sea water on geometrical and energetic parameters of laser beam propagating in the underwater environment. The impact of reflectance properties of the remotely sensed underwater object on the reflected signal level has been investigated as well. Analytical approach covered both "echo" signal reflected from an underwater object and background noise signal level generated mainly by the sunlight and diffuse atmospheric illumination.

  7. Controllable Buoys and Networked Buoy Systems

    Science.gov (United States)

    Davoodi, Faranak (Inventor); Davoudi, Farhooman (Inventor)

    2017-01-01

    Buoyant sensor networks are described, comprising floating buoys with sensors and energy harvesting capabilities. The buoys can control their buoyancy and motion, and can organize communication in a distributed fashion. Some buoys may have tethered underwater vehicles with a smart spooling system that allows the vehicles to dive deep underwater while remaining in communication and connection with the buoys.

  8. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  9. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  10. Microwave receivers with electronic warfare applications

    CERN Document Server

    Tsui, James

    2005-01-01

    This book by the author of Digital Techniques for Wideband Receivers willbe like no other one on your book shelf as the definitive word on electronicwarfare (EW) receiver design and performance. Whether you are an EWscientist involved in the test and evaluation of EW receivers or a designerof RWR's and other EW-related receivers, Microwave Receivers withElectronic Warfare Applications is a handy reference through which you canperfect your technical art. Lucidly written, this book is a treatise on EWreceivers that is relevant to you if you are just looking for a top-levelinsight into EW receive

  11. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    Science.gov (United States)

    2013-12-01

    drawdown for Afghanistan nearing, opportunities to forge an officer corps through actual combat experience are diminishing.”10 B. A CALL FOR...The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  12. A Reference Architecture for Network-Centric Information Systems

    National Research Council Canada - National Science Library

    Renner, Scott; Schaefer, Ronald

    2003-01-01

    This paper presents the "C2 Enterprise Reference Architecture" (C2ERA), which is a new technical concept of operations for building information systems better suited to the Network-Centric Warfare (NCW) environment...

  13. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  14. Geometric documentation of underwater archaeological sites

    Directory of Open Access Journals (Sweden)

    Eleni Diamanti

    2013-12-01

    Full Text Available Photogrammetry has often been the most preferable method for the geometric documentation of monuments, especially in cases of highly complex objects, of high accuracy and quality requirements and, of course, budget, time or accessibility limitations. Such limitations, requirements and complexities are undoubtedly features of the highly challenging task of surveying an underwater archaeological site. This paper is focused on the case of a Hellenistic shipwreck found in Greece at the Southern Euboean gulf, 40-47 meters below the sea surface. Underwater photogrammetry was chosen as the ideal solution for the detailed and accurate mapping of a shipwreck located in an environment with limited accessibility. There are time limitations when diving at these depths so it is essential that the data collection time is kept as short as possible. This makes custom surveying techniques rather impossible to apply. However, with the growing use of consumer cameras and photogrammetric software, this application is becoming easier, thus benefiting a wide variety of underwater sites. Utilizing cameras for underwater photogrammetry though, poses some crucial modeling problems, due to the refraction effect and further additional parameters which have to be co-estimated [1]. The applied method involved an underwater calibration of the camera as well as conventional field survey measurements in order to establish a reference frame. The application of a three-dimensional trilateration using common tape measures was chosen for this reason. Among the software that was used for surveying and photogrammetry processing, were Site Recorder SE, Eos Systems Photomodeler, ZI’s SSK and Rhinoceros. The underwater archaeological research at the Southern Euboean gulf is a continuing project carried out by the Hellenic Institute for Marine Archaeology (H.I.M.A. in collaboration with the Greek Ephorate of Underwater Antiquities, under the direction of the archaeologist G

  15. Sensor Network Data Fusion Methods

    Directory of Open Access Journals (Sweden)

    Martynas Vervečka

    2011-03-01

    Full Text Available Sensor network data fusion is widely used in warfare, in areas such as automatic target recognition, battlefield surveillance, automatic vehicle control, multiple target surveillance, etc. Non-military use example are: medical equipment status monitoring, intelligent home. The paper describes sensor networks topologies, sensor network advantages against the isolated sensors, most common network topologies, their advantages and disadvantages.Article in Lithuanian

  16. Underwater Noise Modeling in Lithuanian Area of the Baltic Sea

    Directory of Open Access Journals (Sweden)

    Donatas Bagočius

    2017-09-01

    Full Text Available Along with rising awareness of public and scientific societies about environmental and ecological impacts of underwater noise, the need for underwater noise modelling in the shallow Lithuanian area of Baltic Sea emerged. Marine Strategy Framework Directive issues regarding underwater noise indicators refers to possibility of evaluation of Good Environmental State using underwater noise measurements as well as possibility to model underwater noise. Main anthropogenic underwater noise contributor in the Seas is the shipping lanes as known due to date, with no exclusion of Lithuanian Baltic Sea area. In this manuscript, it is presented the methods of development of simplistic underwater ambient noise model purposed for computation of underwater soundscape in shallow area of the Lithuanian Baltic Sea.

  17. Long endurance underwater power system

    Science.gov (United States)

    1989-08-01

    As part of DARPA's Artificial Gill program, Aquanautics is developing an underwater power source that uses an ambient pressure solid polymer electrolyte (SPE) hydrogen/oxygen fuel cell with an artificial gill that extracts dissolved oxygen from seawater and an Alwatt aluminum corrosion cell that generates the hydrogen. The innovation in this concept is a direct carrier feed fuel cell (CFFC) process which allows the fuel cell to operate at ambient pressure without a costly deep water pressure vessel. Activities during this quarter include: direct feed of oxygen carrier into fuel cell; new batches of electrodes were ordered. These are with a different ion-exchange membrane called Nafion (manufactured by Dupont) as against Raipore (mfd. by RAI Research). There was some concern that hydrogen at high pressures would leak out through the membrane which led to calculation of the hydrogen leakage; it appears that at 6000 m, the loss will be around 20 percent. Eight rectangular membrane cartridges were ordered. The factors varied were type of membrane (solid vs. microporous) and fiber to fiber distance. Theoretical study for sizing of the gill and pumping power required was carried out. Integration of the gill and fuel cell was carried out where oxygen extracted from synthetic ocean water was used in the fuel cell. There was no unforeseen problem. Hydrogen generation using an Alwatt battery was obtained and tested.

  18. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  19. Omnidirectional Underwater Camera Design and Calibration

    Directory of Open Access Journals (Sweden)

    Josep Bosch

    2015-03-01

    Full Text Available This paper presents the development of an underwater omnidirectional multi-camera system (OMS based on a commercially available six-camera system, originally designed for land applications. A full calibration method is presented for the estimation of both the intrinsic and extrinsic parameters, which is able to cope with wide-angle lenses and non-overlapping cameras simultaneously. This method is valid for any OMS in both land or water applications. For underwater use, a customized housing is required, which often leads to strong image distortion due to refraction among the different media. This phenomena makes the basic pinhole camera model invalid for underwater cameras, especially when using wide-angle lenses, and requires the explicit modeling of the individual optical rays. To address this problem, a ray tracing approach has been adopted to create a field-of-view (FOV simulator for underwater cameras. The simulator allows for the testing of different housing geometries and optics for the cameras to ensure a complete hemisphere coverage in underwater operation. This paper describes the design and testing of a compact custom housing for a commercial off-the-shelf OMS camera (Ladybug 3 and presents the first results of its use. A proposed three-stage calibration process allows for the estimation of all of the relevant camera parameters. Experimental results are presented, which illustrate the performance of the calibration method and validate the approach.

  20. Omnidirectional Underwater Camera Design and Calibration

    Science.gov (United States)

    Bosch, Josep; Gracias, Nuno; Ridao, Pere; Ribas, David

    2015-01-01

    This paper presents the development of an underwater omnidirectional multi-camera system (OMS) based on a commercially available six-camera system, originally designed for land applications. A full calibration method is presented for the estimation of both the intrinsic and extrinsic parameters, which is able to cope with wide-angle lenses and non-overlapping cameras simultaneously. This method is valid for any OMS in both land or water applications. For underwater use, a customized housing is required, which often leads to strong image distortion due to refraction among the different media. This phenomena makes the basic pinhole camera model invalid for underwater cameras, especially when using wide-angle lenses, and requires the explicit modeling of the individual optical rays. To address this problem, a ray tracing approach has been adopted to create a field-of-view (FOV) simulator for underwater cameras. The simulator allows for the testing of different housing geometries and optics for the cameras to ensure a complete hemisphere coverage in underwater operation. This paper describes the design and testing of a compact custom housing for a commercial off-the-shelf OMS camera (Ladybug 3) and presents the first results of its use. A proposed three-stage calibration process allows for the estimation of all of the relevant camera parameters. Experimental results are presented, which illustrate the performance of the calibration method and validate the approach. PMID:25774707

  1. Intelligent Navigation for a Solar Powered Unmanned Underwater Vehicle

    OpenAIRE

    Francisco García-Córdova; Antonio Guerrero-González

    2013-01-01

    In this paper, an intelligent navigation system for an unmanned underwater vehicle powered by renewable energy and designed for shadow water inspection in missions of a long duration is proposed. The system is composed of an underwater vehicle, which tows a surface vehicle. The surface vehicle is a small boat with photovoltaic panels, a methanol fuel cell and communication equipment, which provides energy and communication to the underwater vehicle. The underwater v...

  2. Deep sea habitats in the chemical warfare dumping areas of the Baltic Sea.

    Science.gov (United States)

    Czub, Michał; Kotwicki, Lech; Lang, Thomas; Sanderson, Hans; Klusek, Zygmunt; Grabowski, Miłosz; Szubska, Marta; Jakacki, Jaromir; Andrzejewski, Jan; Rak, Daniel; Bełdowski, Jacek

    2018-03-01

    The Baltic Sea is a severely disturbed marine ecosystem that has previously been used as a dumping ground for Chemical Warfare Agents (CW). The presence of unexploded underwater ordnance is an additional risk factor for offshore activities and an environmental risk for the natural resources of the sea. In this paper, the focus is on descriptions of the marine habitat based on the observations arising from studies linked to the CHEMSEA, MODUM and DAIMON projects. Investigated areas of Bornholm, Gotland and Gdańsk Deeps are similarly affected by the Baltic Sea eutrophication, however, at depths greater than 70m several differences in local hydrological regimes and pore-water heavy metal concentrations between those basins were observed. During the lifespan of presented studies, we were able to observe the effects of Major Baltic Inflow, that started in December 2014, on local biota and their habitats, especially in the Bornholm Deep area. Reappearance of several meiofauna taxa and one macrofauna specimen was observed approximately one year after this phenomenon, however it's ecological effects already disappeared in March 2017. According to our findings and to the EUNIS Habitat Classification, the three reviewed areas should be characterized as Deep Sea Muddy Sands, while the presence of suspicious bomb-like objects both beneath and on top of the sediments confirms their CW dumpsite status. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. A Survey on Intermediation Architectures for Underwater Robotics

    Science.gov (United States)

    Li, Xin; Martínez, José-Fernán; Rodríguez-Molina, Jesús; Martínez, Néstor Lucas

    2016-01-01

    Currently, there is a plethora of solutions regarding interconnectivity and interoperability for networked robots so that they will fulfill their purposes in a coordinated manner. In addition to that, middleware architectures are becoming increasingly popular due to the advantages that they are capable of guaranteeing (hardware abstraction, information homogenization, easy access for the applications above, etc.). However, there are still scarce contributions regarding the global state of the art in intermediation architectures for underwater robotics. As far as the area of robotics is concerned, this is a major issue that must be tackled in order to get a holistic view of the existing proposals. This challenge is addressed in this paper by studying the most compelling pieces of work for this kind of software development in the current literature. The studied works have been assessed according to their most prominent features and capabilities. Furthermore, by studying the individual pieces of work and classifying them several common weaknesses have been revealed and are highlighted. This provides a starting ground for the development of a middleware architecture for underwater robotics capable of dealing with these issues. PMID:26861321

  4. A Survey on Intermediation Architectures for Underwater Robotics

    Directory of Open Access Journals (Sweden)

    Xin Li

    2016-02-01

    Full Text Available Currently, there is a plethora of solutions regarding interconnectivity and interoperability for networked robots so that they will fulfill their purposes in a coordinated manner. In addition to that, middleware architectures are becoming increasingly popular due to the advantages that they are capable of guaranteeing (hardware abstraction, information homogenization, easy access for the applications above, etc.. However, there are still scarce contributions regarding the global state of the art in intermediation architectures for underwater robotics. As far as the area of robotics is concerned, this is a major issue that must be tackled in order to get a holistic view of the existing proposals. This challenge is addressed in this paper by studying the most compelling pieces of work for this kind of software development in the current literature. The studied works have been assessed according to their most prominent features and capabilities. Furthermore, by studying the individual pieces of work and classifying them several common weaknesses have been revealed and are highlighted. This provides a starting ground for the development of a middleware architecture for underwater robotics capable of dealing with these issues.

  5. Design and implementation of underwater wireless electromagnetic communication system

    Science.gov (United States)

    Wu, Xiangshang; Xue, Wei; Shu, Xin

    2017-08-01

    This paper introduces the design and implementation of the underwater wireless electromagnetic communication system based on the current field theory. The system realizes the wireless transmission of underwater voice signal, and has a good application prospect in underwater short-range wireless communication.

  6. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    The abstract has the title: “The Cycle of Warfare - Analysis of an Analytical Model” The Cycle of Warfare is an analytical model designed to illustrate the coherence between the organization, doctrine and technology of a military entity and the influence of the surrounding society as expressed...... by its economic, political and ideological characteristics. With the single assumption of economic rationality in human behaviour, Cycle of Warfare is not only coherent, it is applicable to all entities engaged in competition anywhere in the world at any point in history. The Cycle of Warfare can be used...... both retrospectively and predictively. As a tool for historians the model can help to identify decisive factors in developments and outcomes. As a tool for intelligence analysts, it can be used predictively to identify likely possible outcomes or unknown elements in analysed entities....

  7. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  8. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  9. Design and implementation of intelligent electronic warfare decision making algorithm

    Science.gov (United States)

    Peng, Hsin-Hsien; Chen, Chang-Kuo; Hsueh, Chi-Shun

    2017-05-01

    Electromagnetic signals and the requirements of timely response have been a rapid growth in modern electronic warfare. Although jammers are limited resources, it is possible to achieve the best electronic warfare efficiency by tactical decisions. This paper proposes the intelligent electronic warfare decision support system. In this work, we develop a novel hybrid algorithm, Digital Pheromone Particle Swarm Optimization, based on Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Shuffled Frog Leaping Algorithm (SFLA). We use PSO to solve the problem and combine the concept of pheromones in ACO to accumulate more useful information in spatial solving process and speed up finding the optimal solution. The proposed algorithm finds the optimal solution in reasonable computation time by using the method of matrix conversion in SFLA. The results indicated that jammer allocation was more effective. The system based on the hybrid algorithm provides electronic warfare commanders with critical information to assist commanders in effectively managing the complex electromagnetic battlefield.

  10. Hybrid Warfare and the Changing Character of Conflict

    National Research Council Canada - National Science Library

    Bastian Giegerich

    2016-01-01

      The idea that international conflict might be seeing more hybrid warfare and hybrid threats has animated debate among security and defense establishments in the run-up to NATO's 2016 Warsaw Summit...

  11. Hybrid warfare of the USA in South America

    National Research Council Canada - National Science Library

    A. V. Budaev

    2015-01-01

    Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard...

  12. Survivability design for a hybrid underwater vehicle

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Biao; Wu, Chao; Li, Xiang; Zhao, Qingkai; Ge, Tong [State Key Lab of Ocean Engineering, School of Naval Architecture, Ocean and Civil Engineering, Shanghai Jiao Tong University, Shanghai 200240 (China)

    2015-03-10

    A novel hybrid underwater robotic vehicle (HROV) capable of working to the full ocean depth has been developed. The battery powered vehicle operates in two modes: operate as an untethered autonomous vehicle in autonomous underwater vehicle (AUV) mode and operate under remote control connected to the surface vessel by a lightweight, fiber optic tether in remotely operated vehicle (ROV) mode. Considering the hazardous underwater environment at the limiting depth and the hybrid operating modes, survivability has been placed on an equal level with the other design attributes of the HROV since the beginning of the project. This paper reports the survivability design elements for the HROV including basic vehicle design of integrated navigation and integrated communication, emergency recovery strategy, distributed architecture, redundant bus, dual battery package, emergency jettison system and self-repairing control system.

  13. Trends in electro-optical electronic warfare

    Science.gov (United States)

    Smith, Carl R.; Grasso, Robert; Pledger, Jack; Murarka, Naveen

    2012-09-01

    Protection of military aircraft from hostile threats is paramount to ensure the survivability of aircrews, platforms, and mission success. While the threat environment continues to become more complex, shrinking defense budgets places new challenges on the development of electronic warfare (EW) systems. This paper presents the trends in electro-optical EW system development including 1) features, 2) affordability, 3) open architecture, 4) multi-functionality, 5) integrated avionics survivability equipment, and 6) enabling technologies for sensors, and optical sources. While these system attributes are not new, they have grown in importance in the design of EW systems. And, if treated correctly can have a beneficial symbiotic relationship to each other and to the airframe they support.

  14. Integrated Optimization of Long-Range Underwater Signal Detection, Feature Extraction, and Classification for Nuclear Treaty Monitoring

    NARCIS (Netherlands)

    Tuma, M.; Rorbech, V.; Prior, M.; Igel, C.

    2016-01-01

    We designed and jointly optimized an integrated signal processing chain for detection and classification of long-range passive-acoustic underwater signals recorded by the global geophysical monitoring network of the Comprehensive Nuclear-Test-Ban Treaty Organization. Starting at the level of raw

  15. DESIGN OPTIMISATION OF AN UNMANNED UNDERWATER VEHICLE

    Directory of Open Access Journals (Sweden)

    FIRDAUS ABDULLAH

    2007-08-01

    Full Text Available The results of fluid flow simulation around an unmanned underwater vehicle (UUV are presented in this paper. The UUV represents a small submarine for underwater search and rescue operation, which suits the local river conditions. The flow simulation was performed with a commercially available computational fluid dynamics package, Star-CD. The effects of the UUV geometry on the velocity and pressure distributions on the UUV surface were discussed for Re=500,000 and 3,000,000. The discussion led to an improved design of the UUV with a smoother velocity profile around the UUV body.

  16. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  17. Research of ad hoc network based on SINCGARS network

    Science.gov (United States)

    Nie, Hao; Cai, Xiaoxia; Chen, Hong; Chen, Jian; Weng, Pengfei

    2016-03-01

    In today's world, science and technology make a spurt of progress, so society has entered the era of information technology, network. Only the comprehensive use of electronic warfare and network warfare means can we maximize their access to information and maintain the information superiority. Combined with the specific combat mission and operational requirements, the research design and construction in accordance with the actual military which are Suitable for the future of information technology needs of the tactical Adhoc network, tactical internet, will greatly improve the operational efficiency of the command of the army. Through the study of the network of the U.S. military SINCGARS network, it can explore the routing protocol and mobile model, to provide a reference for the research of our army network.

  18. Underwater object classification using scattering transform of sonar signals

    Science.gov (United States)

    Saito, Naoki; Weber, David S.

    2017-08-01

    In this paper, we apply the scattering transform (ST)-a nonlinear map based off of a convolutional neural network (CNN)-to classification of underwater objects using sonar signals. The ST formalizes the observation that the filters learned by a CNN have wavelet-like structure. We achieve effective binary classification both on a real dataset of Unexploded Ordinance (UXOs), as well as synthetically generated examples. We also explore the effects on the waveforms with respect to changes in the object domain (e.g., translation, rotation, and acoustic impedance, etc.), and examine the consequences coming from theoretical results for the scattering transform. We show that the scattering transform is capable of excellent classification on both the synthetic and real problems, thanks to having more quasi-invariance properties that are well-suited to translation and rotation of the object.

  19. IVO develops a new repair technique for underwater sites. Viscous doughlike substance underwater cracks

    Energy Technology Data Exchange (ETDEWEB)

    Klingstedt, G.; Leisio, C. [ed.

    1998-07-01

    A viscous sealant is revolutionizing repair of the stone and concrete masonry of underwater dams, bridges and canals. There is now no need for expensive and time-consuming cofferdams, since a diver can extrude quick-setting mortar into underwater structures needing repair. This technique has worked well in recent years in various parts of Finland even in strongly flowing water. IVO experts are now starting to look more beyond the borders of Finland

  20. Retransmission Avoidance for Reliable Data Delivery in Underwater WSNs

    Directory of Open Access Journals (Sweden)

    Babar Ali

    2018-01-01

    Full Text Available The energy-efficient and reliable delivery of data packets in resource constraint underwater wireless sensor networks (UWSNs is one of the key considerations to enhance the network lifetime. The traditional re-transmissions approach consumes the node battery and increases the communication overhead, which results in congestion and affects the reliable data packet delivery in the network. To ensure the reliability and conserve the node battery, in this paper, we propose adaptive forwarding layer multipath power control routing protocol to reduce the energy dissipation, achieve the data reliability and avoid the energy hole problem. In order to achieve the reliability, tree based topology is exploited to direct multiple copies of the data packet towards the surface through cross nodes in the network. The energy dissipation is reduced by a substantial amount with the selection of low noise path between the source and the destination including the information of neighbors of the potential forwarder node. Extensive simulation results show that our proposed work outperforms the compared existing scheme in terms of energy efficiency and packet received ratio (PRR.

  1. Passive Mode Carbon Nanotube Underwater Acoustic Transducer

    Science.gov (United States)

    2016-09-20

    TECHNOLOGY PARTNERSHIP ENTERPRISE OFFICE NAVAL UNDERSEA WARFARE CENTER 1176 HOWELL ST. CODE 00T2, BLDG. 102T NEWPORT, RI 02841 Serial ...collection. (2) Description of the Prior Art [0004] The principle of thermal active acoustic transduction is that when alternating current is passed through...as the distance from the conductor increases. Based on the rapid production of these temperature waves; the net effect is to produce a periodic

  2. Legged Vehicle for Underwater Mobile Operations

    Science.gov (United States)

    1994-09-15

    N93-139 ___ Legged Vehicle for Underwater Mobile Operations Encl. (1): Progress Report, Prof. Joseph Ayers, Northeastern Univ. Gentlemen: This letter...gravity and searching. The following new modules have been implemented: * AntiGravity Recruiter - Allows recruitment of depressor for pitch and roll

  3. Contributions to Automated Realtime Underwater Navigation

    Science.gov (United States)

    2012-02-01

    my draft readers and presentation watchers for their patience and helpful comments: Lauren Cooney, Judy Fenwick, Al Bradley, Jon Howland , Mike Jakuba...Whitcomb, D. R. Yoerger, H. Singh, and J. C. Howland , “Advances in underwater robot vehicles for deep ocean exploration: Navigation, control, and

  4. Impacts of underwater noise on marine vertebrates

    NARCIS (Netherlands)

    Liebschner, Alexander; Seibel, Henrike; Teilmann, Jonas; Wittekind, Dietrich; Parmentier, Eric; Dähne, Michael; Dietz, Rune; Driver, Jörg; Elk, van Cornelis; Everaarts, Eligius; Findeisen, Henning; Kristensen, Jacob; Lehnert, Kristina; Lucke, Klaus; Merck, Thomas; Müller, Sabine; Pawliczka, Iwona; Ronnenberg, Katrin; Rosenberger, Tanja; Ruser, Andreas; Tougaard, Jakob; Schuster, Max; Sundermeyer, Janne; Sveegaard, Signe; Siebert, Ursula

    2016-01-01

    The project conducts application-oriented research on impacts of underwater noise on marine vertebrates in the North and Baltic Seas. In distinct subprojects, the hearing sensitivity of harbor porpoises and gray seals as well as the acoustic tolerance limit of harbor porpoises to impulsive noise

  5. Underwater noise generated by offshore pile driving

    NARCIS (Netherlands)

    Tsouvalas, A.

    2015-01-01

    Anthropogenic noise emission in the marine environment has always been an environmental issue of serious concern. In particular, the noise generated during the installation of foundation piles is considered to be one of the most significant sources of underwater noise pollution. This is mainly

  6. An lead ingot underwater in Grau Vell

    Directory of Open Access Journals (Sweden)

    Carlos De Juan Fuertes

    2014-01-01

    Full Text Available During 2001 there were several underwater archaeological survey work and drilling at the site of Grau Vell de Sagunto, motivated by the plans, now a reality, the commercial port expansion. Those jobs, as a continuation of previous campaigns, allowed a first mapping the remains of structures submerged in waters with low visibility.

  7. Underwater image mosaicking and visual odometry

    Science.gov (United States)

    Sadjadi, Firooz; Tangirala, Sekhar; Sorber, Scott

    2017-05-01

    This paper summarizes the results of studies in underwater odometery using a video camera for estimating the velocity of an unmanned underwater vehicle (UUV). Underwater vehicles are usually equipped with sonar and Inertial Measurement Unit (IMU) - an integrated sensor package that combines multiple accelerometers and gyros to produce a three dimensional measurement of both specific force and angular rate with respect to an inertial reference frame for navigation. In this study, we investigate the use of odometry information obtainable from a video camera mounted on a UUV to extract vehicle velocity relative to the ocean floor. A key challenge with this process is the seemingly bland (i.e. featureless) nature of video data obtained underwater which could make conventional approaches to image-based motion estimation difficult. To address this problem, we perform image enhancement, followed by frame to frame image transformation, registration and mosaicking/stitching. With this approach the velocity components associated with the moving sensor (vehicle) are readily obtained from (i) the components of the transform matrix at each frame; (ii) information about the height of the vehicle above the seabed; and (iii) the sensor resolution. Preliminary results are presented.

  8. The ROBLINKS underwater acoustic communication experiments

    NARCIS (Netherlands)

    Gijzen, M.B. van; Walree, P.A. van; Cano, D.; Passerieux, J-M.; Waldhorst, A.; Weber, R.B.; Maillard, C.

    2000-01-01

    Within the EU-MAST III project ROBLINKS waveforms and algorithms have been developed to establish robust underwater acoustic communication links with high data rates ín shallow water. To evaluate the signalling schemes a wide range of experiments has been performed during a sea trial that has been

  9. KE Basin underwater visual fuel survey

    Energy Technology Data Exchange (ETDEWEB)

    Pitner, A.L.

    1995-02-01

    Results of an underwater video fuel survey in KE Basin using a high resolution camera system are presented. Quantitative and qualitative information on fuel degradation are given, and estimates of the total fraction of ruptured fuel elements are provided. Representative photographic illustrations showing the range of fuel conditions observed in the survey are included.

  10. Human Injury Criteria for Underwater Blasts

    Science.gov (United States)

    2014-09-08

    levels of severity. These numerical severity ratings were based on the reported symptoms, surgical findings, and autopsy reports. Severity estimates...Definis-Gojanovic, M., et al., The American journal of forensic medicine and pathology, 22(2001), pp. 383-386. 61.  Theobald, X., Effects of Underwater

  11. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  12. Lightweight Autonomous Underwater Vehicles (AUVs) performing coastal survey operations in REP 10A

    Science.gov (United States)

    Incze, Michael L.

    2011-11-01

    Lightweight Autonomous Underwater Vehicles (AUVs) were developed for Naval Special Warfare (NSW) Group 4 search and survey missions from a commercial AUV baseline (Iver 2) through integration of commercial off-the-shelf (COTS) hardware components, and through software development for enhanced on-board Command and Control functions. The development period was 1 year under a project sponsored by the Office of Naval Research TechSolutions Program Office. Hardware integration was completed by the commercial AUV vendor, OceanServer Technology, Inc., and software development was conducted by the Naval Undersea Warfare Center, Naval Oceanographic Office, and U MASS Dartmouth, with support from hardware and software application providers (YSI, Inc., Imagenex Technology Corp., and CARIS). At the conclusion of the integration and development period, an at-sea performance evaluation was scheduled for the Lightweight NSW AUVs with NSWG-4 personnel. The venue for this evaluation was the NATO exercise Recognized Environmental Picture 10A (REP 10A), hosted by Marinha Portuguesa, and coordinated by the Faculdade de Engenharia-Universidade do Porto. REP 10A offered an opportunity to evaluate the performance of the new AUVs and to explore the Concept of Operations (CONOPS) for employing them in military survey operations in shallow coastal waters. Shore- and ship-launched scenarios with launch/recovery by a single operator in a one-to-many coordinated survey, on-scene data product generation and visualization, data push to Reach Back Cells for product integration and enhancement, and survey optimization to streamline survey effort and timelines were included in the CONOPS review. Opportunities to explore employment of hybrid AUV fleets in Combined Force scenarios were also utilized. The Naval Undersea Warfare Center, Marinha Portuguesa, the Faculdade de Engenharia-Universidade do Porto, and OceanServer Technology, Inc., were the primary participants bringing in-water resources to

  13. Underwater Signal Modeling for Subsurface Classification Using Computational Intelligence.

    Science.gov (United States)

    Setayeshi, Saeed

    In the thesis a method for underwater layered media (UWLM) modeling is proposed, and a simple nonlinear structure for implementation of this model based on the behaviour of its characteristics and the propagation of the acoustic signal in the media accounting for attenuation effects is designed. The model that responds to the acoustic input is employed to test the artificial intelligence classifiers ability. Neural network models, the basic principles of the back-propagation algorithm, and the Hopfield model of associative memories are reviewed, and they are employed to use min-max amplitude ranges of a reflected signal of UWLM based on attenuation effects, to define the classes of the synthetic data, detect its peak features and estimate parameters of the media. It has been found that there is a correlation between the number of layers in the media and the optimum number of nodes in the hidden layer of the neural networks. The integration of the result of the neural networks that classify and detect underwater layered media acoustic signals based on attenuation effects to prove the correspondence between the peak points and decay values has introduced a powerful tool for UWLM identification. The methods appear to have applications in replacing original system, for parameter estimation and output prediction in system identification by the proposed networks. The results of computerized simulation of the UWLM modeling in conjunction with the proposed neural networks training process are given. Fuzzy sets is an idea that allows representing and manipulating inexact concepts, fuzzy min-max pattern classification method, and the learning and recalling algorithms for fuzzy neural networks implementation is explained in this thesis. A fuzzy neural network that uses peak amplitude ranges to define classes is proposed and evaluated for UWLM pattern recognition. It is demonstrated to be able to classify the layered media data sets, and can distinguish between the peak points

  14. A Novel Fractional Fourier Transform-Based ASK-OFDM System for Underwater Acoustic Communications

    Directory of Open Access Journals (Sweden)

    Rami Ashri

    2017-12-01

    Full Text Available A key research area in wireless transmission is underwater communications. It has a vital role in applications such as underwater sensor networks (UWSNs and disaster detection. The underwater channel is very unique as compared to other alternatives of transmission channels. It is characterized by path loss, multipath fading, Doppler spread and ambient noise. Thus, the bit error rate (BER is increased to a large extent when compared to its counterpart of cellular communications. Acoustic signals are the current best solution for underwater communications. The use of electromagnetic or optical waves obviously entails a much higher data rate. However, they suffer from high attenuation, absorption or scattering. This paper proposes a novel fractional fast Fourier transform (FrFT—orthogonal frequency division multiplexing (FrFT-OFDM system for underwater acoustic (UWA communication—which employs the amplitude shift keying (ASK modulation technique (FrFT-ASK-OFDM. Specifically, ASK achieves a better bandwidth efficiency as compared to other commonly used modulation techniques, such as quadrature amplitude modulation (QAM and phase shift keying (PSK. In particular, the system proposed in this article can achieve a very promising BER performance, and can reach higher data rates when compared to other systems proposed in the literature. The BER performance of the proposed system is evaluated numerically, and is compared to the corresponding M-ary QAM system in the UWA channel for the same channel conditions. Moreover, the performance of the proposed system is compared to the conventional fast Fourier transform (FFT-OFDM (FFT-OFDM system in the absence and presence of the effect of carrier frequency offset (CFO. Numerical results show that the proposed system outperforms the conventional FFT-based systems for UWA channels, even in channels dominated by CFO. Moreover, the spectral efficiency and data rate of the proposed system are approximately double

  15. Manhunting: Counter-Network Organization for Irregular Warfare

    Science.gov (United States)

    2009-09-01

    revolutionary general Francisco “Pancho” Villa raided U.S. territory to provoke an invasion of Mexico in order to discredit President Carranza , Villa’s...to the increasing likelihood the U.S. will be drawn into the ongoing European conflict.114 Diplomatic negotiations between the Wilson and Carranza

  16. Network Centric Warfare, Command, and the Nature of War

    Science.gov (United States)

    2009-05-21

    80 Consequently, Frederick‘s army was the first into Silesia in 1740 and first into Saxony 1756.81 Preemption provided Frederick a great advantage in...refinement, of what is developing into a clearer picture of the essence of command. Eisenhower‘s circumstances are again unique; therefore, the analysis...differences, and construct a common picture ,‖ the advantages are unlikely to be that pronounced because understanding is not the same as developing a

  17. Stability analysis of hybrid-driven underwater glider

    Science.gov (United States)

    Niu, Wen-dong; Wang, Shu-xin; Wang, Yan-hui; Song, Yang; Zhu, Ya-qiang

    2017-10-01

    Hybrid-driven underwater glider is a new type of unmanned underwater vehicle, which combines the advantages of autonomous underwater vehicles and traditional underwater gliders. The autonomous underwater vehicles have good maneuverability and can travel with a high speed, while the traditional underwater gliders are highlighted by low power consumption, long voyage, long endurance and good stealth characteristics. The hybrid-driven underwater gliders can realize variable motion profiles by their own buoyancy-driven and propeller propulsion systems. Stability of the mechanical system determines the performance of the system. In this paper, the Petrel-II hybrid-driven underwater glider developed by Tianjin University is selected as the research object and the stability of hybrid-driven underwater glider unitedly controlled by buoyancy and propeller has been targeted and evidenced. The dimensionless equations of the hybrid-driven underwater glider are obtained when the propeller is working. Then, the steady speed and steady glide path angle under steady-state motion have also been achieved. The steady-state operating conditions can be calculated when the hybrid-driven underwater glider reaches the desired steady-state motion. And the steadystate operating conditions are relatively conservative at the lower bound of the velocity range compared with the range of the velocity derived from the method of the composite Lyapunov function. By calculating the hydrodynamic coefficients of the Petrel-II hybrid-driven underwater glider, the simulation analysis has been conducted. In addition, the results of the field trials conducted in the South China Sea and the Danjiangkou Reservoir of China have been presented to illustrate the validity of the analysis and simulation, and to show the feasibility of the method of the composite Lyapunov function which verifies the stability of the Petrel-II hybrid-driven underwater glider.

  18. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  19. Efficient Underwater RSS Value to Distance Inversion Using the Lambert Function

    Directory of Open Access Journals (Sweden)

    Majid Hosseini

    2014-01-01

    Full Text Available There are many applications for using wireless sensor networks (WSN in ocean science; however, identifying the exact location of a sensor by itself (localization is still a challenging problem, where global positioning system (GPS devices are not applicable underwater. Precise distance measurement between two sensors is a tool of localization and received signal strength (RSS, reflecting transmission loss (TL phenomena, is widely used in terrestrial WSNs for that matter. Underwater acoustic sensor networks have not been used (UASN, due to the complexity of the TL function. In this paper, we addressed these problems by expressing underwater TL via the Lambert W function, for accurate distance inversion by the Halley method, and compared this to Newton-Raphson inversion. Mathematical proof, MATLAB simulation, and real device implementation demonstrate the accuracy and efficiency of the proposed equation in distance calculation, with fewer iterations, computation stability for short and long distances, and remarkably short processing time. Then, the sensitivities of Lambert W function and Newton-Raphson inversion to alteration in TL were examined. The simulation results showed that Lambert W function is more stable to errors than Newton-Raphson inversion. Finally, with a likelihood method, it was shown that RSS is a practical tool for distance measurement in UASN.

  20. History of biological warfare and bioterrorism.

    Science.gov (United States)

    Barras, V; Greub, G

    2014-06-01

    Bioterrorism literally means using microorganisms or infected samples to cause terror and panic in populations. Bioterrorism had already started 14 centuries before Christ, when the Hittites sent infected rams to their enemies. However, apart from some rare well-documented events, it is often very difficult for historians and microbiologists to differentiate natural epidemics from alleged biological attacks, because: (i) little information is available for times before the advent of modern microbiology; (ii) truth may be manipulated for political reasons, especially for a hot topic such as a biological attack; and (iii) the passage of time may also have distorted the reality of the past. Nevertheless, we have tried to provide to clinical microbiologists an overview of some likely biological warfare that occurred before the 18th century and that included the intentional spread of epidemic diseases such as tularaemia, plague, malaria, smallpox, yellow fever, and leprosy. We also summarize the main events that occurred during the modern microbiology era, from World War I to the recent 'anthrax letters' that followed the World Trade Center attack of September 2001. Again, the political polemic surrounding the use of infectious agents as a weapon may distort the truth. This is nicely exemplified by the Sverdlovsk accident, which was initially attributed by the authorities to a natural foodborne outbreak, and was officially recognized as having a military cause only 13 years later. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  1. Chemical Warfare Agent Degradation and Decontamination

    Energy Technology Data Exchange (ETDEWEB)

    Talmage, Sylvia Smith [ORNL; Watson, Annetta Paule [ORNL; Hauschild, Veronique [U.S. Environmental Protection Agency; Munro, Nancy B [ORNL; King, J. [U.S. Army Environmental Center

    2007-02-01

    The decontamination of chemical warfare agents (CWA) from structures, environmental media, and even personnel has become an area of particular interest in recent years due to increased homeland security concerns. In addition to terrorist attacks, scenarios such as accidental releases of CWA from U.S. stockpile sites or from historic, buried munitions are also subjects for response planning. To facilitate rapid identification of practical and effective decontamination approaches, this paper reviews pathways of CWA degradation by natural means as well as those resulting from deliberately applied solutions and technologies; these pathways and technologies are compared and contrasted. We then review various technologies, both traditional and recent, with some emphasis on decontamination materials used for surfaces that are difficult to clean. Discussion is limited to the major threat CWA, namely sulfur mustard (HD, bis(2-chloroethyl)sulfide), VX (O-ethyl S-(2-diisopropylaminoethyl) methylphosphonothioate), and the G-series nerve agents. The principal G-agents are GA (tabun, ethyl N,N-dimethylphosphoramidocyanidate), GB (sarin, isopropyl methylphosphonofluoridate), and GD (soman, pinacolyl methylphosphonofluoridate). The chemical decontamination pathways of each agent are outlined, with some discussion of intermediate and final degradation product toxicity. In all cases, and regardless of the CWA degradation pathway chosen for decontamination, it will be necessary to collect and analyze pertinent environmental samples during the treatment phase to confirm attainment of clearance levels.

  2. Research and design of underwater flow-induced vibration energy harvester based on Karman vortex street

    Science.gov (United States)

    Yao, Gang; Wang, Hai; Yang, Chunlai; Wen, Li

    2017-03-01

    With the increasing development of wireless sensor network (WSN), power supply for WSN nodes had attracted increasing attention, and the energy harvesting system based on Karman vortex street has been widely used in underwater WSN. But the research of the influences of affecting factors towards the energy harvesting system is yet to be completed. So, in this paper, an underwater flow-induced vibration energy harvesting system based on Karman vortex street was proposed and tested. The influence of bluff body geometry and flow velocity towards the performance of the energy harvesting has been researched. The results showed that the output voltage increased as the diameter of bluff body and the water velocity increase. The power generation efficiency was the best when the shape of bluff body was circular.

  3. Correcting underwater images distorted by surface waves

    Science.gov (United States)

    Savchenko, V. V.; Osadchy, V. Yu.; Levin, I. M.

    2008-12-01

    An experiment on the correction of underwater images distorted by waves at the air-water interface was conducted using a laboratory modeling installation intended for experimental examination of light and image transfer across a water surface covered with waves. A digital color camera was used for the simultaneous formation of the image of the underwater test object through the disturbed surface and of the superimposed glitter pattern. Both images are spectrally separated. Processing the glitter pattern makes it possible to obtain the values of the surface slopes at a limited number of points and to use these slopes for retrieval of image fragments. The total corrected image is formed by integration of about 300 partially corrected fragments. This image is close to that obtained through a wave-free water surface.

  4. Multipath correlations in underwater acoustic communication channels.

    Science.gov (United States)

    Huang, S H; Yang, T C; Huang, Chen-Fen

    2013-04-01

    Uncorrelated scattering (US), which assumes that multipath arrivals undergo uncorrelated scattering and are thus uncorrelated, has been the standard model for digital communications including underwater acoustic communications. This paper examines the cross-correlation of multipath arrivals based on at-sea data with different temporal coherence time, assuming quasi-stationary statistics. It is found that multipath arrivals are highly cross-correlated when the channel is temporally coherent, and are uncorrelated when the channel is temporally incoherent. A theoretical model based on the path phase rates and relative-phase fluctuations is used to explain experimentally observed phenomena, assuming the path amplitudes vary slowly compared with the phases. The implications of correlated scattering for underwater acoustic communication channel tracking are discussed.

  5. Underwater noise modelling for environmental impact assessment

    Energy Technology Data Exchange (ETDEWEB)

    Farcas, Adrian [Centre for Environment, Fisheries and Aquaculture Science (Cefas), Pakefield Road, Lowestoft, NR33 0HT (United Kingdom); Thompson, Paul M. [Lighthouse Field Station, Institute of Biological and Environmental Sciences, University of Aberdeen, Cromarty IV11 8YL (United Kingdom); Merchant, Nathan D., E-mail: nathan.merchant@cefas.co.uk [Centre for Environment, Fisheries and Aquaculture Science (Cefas), Pakefield Road, Lowestoft, NR33 0HT (United Kingdom)

    2016-02-15

    Assessment of underwater noise is increasingly required by regulators of development projects in marine and freshwater habitats, and noise pollution can be a constraining factor in the consenting process. Noise levels arising from the proposed activity are modelled and the potential impact on species of interest within the affected area is then evaluated. Although there is considerable uncertainty in the relationship between noise levels and impacts on aquatic species, the science underlying noise modelling is well understood. Nevertheless, many environmental impact assessments (EIAs) do not reflect best practice, and stakeholders and decision makers in the EIA process are often unfamiliar with the concepts and terminology that are integral to interpreting noise exposure predictions. In this paper, we review the process of underwater noise modelling and explore the factors affecting predictions of noise exposure. Finally, we illustrate the consequences of errors and uncertainties in noise modelling, and discuss future research needs to reduce uncertainty in noise assessments.

  6. Detecting underwater improvised explosive threats (DUIET)

    Science.gov (United States)

    Feeley, Terry

    2010-04-01

    Improvised Explosive Devices (IEDs) have presented a major threat in the wars in Afghanistan and Iraq. These devices are powerful homemade land mines that can be small and easily hidden near roadsides. They are then remotely detonated when Coalition Forces pass by either singly or in convoys. Their rapid detection, classification and destruction is key to the safety of troops in the area. These land based bombs will have an analogue in the underwater theater especially in ports, lakes, rivers and streams. These devices may be used against Americans on American soil as an element of the global war on terrorism (GWOT) Rapid detection and classification of underwater improvised explosive devices (UIED) is critical to protecting innocent lives and maintaining the day to day flow of commerce. This paper will discuss a strategy and tool set to deal with this potential threat.

  7. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  8. Hybrid warfare of the USA in South America

    Directory of Open Access Journals (Sweden)

    A. V. Budaev

    2015-01-01

    Full Text Available Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard” power as well as their combination in the form of the “smart power”. The increasing importance of hybrid warfare technologies in the US foreign policy in Latin America predetermines the necessity of thorough studies and analysis of this phenomenon for providing Russian interests.

  9. Underwater radiated noise from modern commercial ships.

    Science.gov (United States)

    McKenna, Megan F; Ross, Donald; Wiggins, Sean M; Hildebrand, John A

    2012-01-01

    Underwater radiated noise measurements for seven types of modern commercial ships during normal operating conditions are presented. Calibrated acoustic data (Stern aspect noise levels are 5 to 10 dB higher than bow aspect noise levels. Collectively, these results emphasize the importance of including modern ship-types in quantifying shipping noise for predictive models of global, regional, and local marine environments. © 2012 Acoustical Society of America.

  10. Efficient Modelling Methodology for Reconfigurable Underwater Robots

    DEFF Research Database (Denmark)

    Nielsen, Mikkel Cornelius; Blanke, Mogens; Schjølberg, Ingrid

    2016-01-01

    This paper considers the challenge of applying reconfigurable robots in an underwater environment. The main result presented is the development of a model for a system comprised of N, possibly heterogeneous, robots dynamically connected to each other and moving with 6 Degrees of Freedom (DOF...... in the orientation and, thereby, allow the robots to undertake any relative configuration the attitude is represented in Euler parameters....

  11. Positioning an underwater vehicle through image mosaicking

    OpenAIRE

    García Campos, Rafael; Batlle i Grabulosa, Joan; Cufí i Solé, Xavier; Amat i Girbau, Josep

    2001-01-01

    Mosaics have been commonly used as visual maps for undersea exploration and navigation. The position and orientation of an underwater vehicle can be calculated by integrating the apparent motion of the images which form the mosaic. A feature-based mosaicking method is proposed in this paper. The creation of the mosaic is accomplished in four stages: feature selection and matching, detection of points describing the dominant motion, homography computation and mosaic construction. In this work ...

  12. Hybrid Warfare: an Orientating or Misleading Concept in Analysing Russia’s Military Actions in Ukraine?

    Directory of Open Access Journals (Sweden)

    Kilinskas Kęstutis

    2016-12-01

    Full Text Available Hybrid warfare is perhaps the most frequently used concept in seeking to explain and define Russia‘s military actions in Ukraine. This article thoroughly analyses the development of the theory of hybrid warfare and circumstances of its formation, draws a line between hybrid warfare and hybrid threats, and discusses the perception of hybrid warfare in the armies of Western states and Russia. Actions of the Russian army in Crimea are analysed on the grounds of the provisions of the theory of hybrid warfare formulated by Frank Hoffman through revealing the impact on a military operation not only of the changing warfare tendencies but also of political, cultural, demographic and military conditions that existed on the Crimean peninsula. The article ends with an assessment of the capability of the hybrid warfare theory, as an analytical category, to explain Russia’s military actions in Crimea.

  13. Research on Operational Aspects of Large Autonomous Underwater Glider Fleets

    National Research Council Canada - National Science Library

    Fratantoni, David M

    2007-01-01

    This program supported research on the operational and management issues stemming from application of large fleets of autonomous underwater gliders to oceanographic research and rapid environmental...

  14. Autopilot Using Differential Thrust for ARIES Autonomous Underwater Vehicle

    National Research Council Canada - National Science Library

    Sarton, Christopher

    2003-01-01

    .... Unfortunately, communication antennas must point to specific satellites in this system and thus underwater vehicles must steer a specific course on the surface during the communication process...

  15. Calibration Techniques for Accurate Measurements by Underwater Camera Systems

    Science.gov (United States)

    Shortis, Mark

    2015-01-01

    Calibration of a camera system is essential to ensure that image measurements result in accurate estimates of locations and dimensions within the object space. In the underwater environment, the calibration must implicitly or explicitly model and compensate for the refractive effects of waterproof housings and the water medium. This paper reviews the different approaches to the calibration of underwater camera systems in theoretical and practical terms. The accuracy, reliability, validation and stability of underwater camera system calibration are also discussed. Samples of results from published reports are provided to demonstrate the range of possible accuracies for the measurements produced by underwater camera systems. PMID:26690172

  16. Underwater photosynthesis of submerged plants - recent advances and methods

    National Research Council Canada - National Science Library

    Pedersen, Ole; Colmer, Timothy D; Sand-Jensen, Kaj

    2013-01-01

    We describe the general background and the recent advances in research on underwater photosynthesis of leaf segments, whole communities, and plant dominated aquatic ecosystems and present contemporary...

  17. An underwater blood pressure measuring device.

    Science.gov (United States)

    Sieber, Arne; Kuch, Benjamin; L'abbate, Antonio; Wagner, Matthias; Dario, Paolo; Bedini, Remo

    2008-09-01

    Measurement of arterial blood pressure is an important vital sign for monitoring the circulation. However, up to now no instrument has been available that enables the measurement of blood pressure underwater. The present paper details a novel, oscillometric, automatic digital blood pressure (BP) measurement device especially designed for this purpose. It consists mainly of analogue and digital electronics in a lexan housing that is rated to a depth of up to 200 metres' sea water, a cuff and a solenoid for inflation of the cuff with air supplied from a scuba tank. An integrated differential pressure sensor, exposed to the same ambient pressure as the cuff, allows accurate BP measurement. Calculation of systolic and diastolic pressures is based on the analysis of pressure oscillations recorded during the deflation. In hyperbaric chamber tests to pressures up to 405 kPa, BP measurements taken with the prototype were comparable to those obtained with established manual and automated methods. Swimming pool tests confirmed the correct functioning of the system underwater. The quality of the recorded pressure oscillations was very good even at 10 metres' fresh water, and allowed determination of diastolic and systolic pressure values. Based on these results we envisage that this device will lead to a better understanding of human cardiovascular physiology in underwater and hyperbaric environments.

  18. Femtosecond Laser Induced Underwater Superoleophobic Surfaces

    Directory of Open Access Journals (Sweden)

    Yong Jiale

    2015-01-01

    Full Text Available Femtosecond laser microfabrication has been recently utilized in interface science to modify the liquid wettability of solid surfaces. Silicon surface with hierarchical micro/nanostructure is fabricated by a femtosecond laser. Similar to the fish’s scales, the laser-induced surface shows superhydrophilicity in air and superoleophobicity underwater. The oil contact angles can reach up to 159.4 ± 1° for the 1,2-dichloroethane droplets in water. Besides, the surface exhibits ultralow oil-adhesion. In the oil/water/solid three-phase system, water can be trapped in the hierarchical rough structure and forms a repulsive oil layer according to underwater Cassie’s theory. The contact area between the asprepared surface and oil droplet is significantly reduced, resulting in superoleophobicity and ultralow oil-adhesion in water. In addition, transparent underwater superoleophobic and anti-oil surfaces are achieved on silica glass surfaces by femtosecond laser ablation. This transparent property is attributed to the presence of the water environment because scattering and refraction are effectively weakened. The presented method is simple and can accurately control the processing location, which may have widely potential applications in, for instance, microfluidics, biotechnologies, and antifouling coatings.

  19. Modeling and Control of Underwater Robotic Systems

    Energy Technology Data Exchange (ETDEWEB)

    Schjoelberg, I:

    1996-12-31

    This doctoral thesis describes modeling and control of underwater vehicle-manipulator systems. The thesis also presents a model and a control scheme for a system consisting of a surface vessel connected to an underwater robotic system by means of a slender marine structure. The equations of motion of the underwater vehicle and manipulator are described and the system kinematics and properties presented. Feedback linearization technique is applied to the system and evaluated through a simulation study. Passivity-based controllers for vehicle and manipulator control are presented. Stability of the closed loop system is proved and simulation results are given. The equation of motion for lateral motion of a cable/riser system connected to a surface vessel at the top end and to a thruster at the bottom end is described and stability analysis and simulations are presented. The equations of motion in 3 degrees of freedom of the cable/riser, surface vessel and robotic system are given. Stability analysis of the total system with PD-controllers is presented. 47 refs., 32 figs., 7 tabs.

  20. Underwater Noise Modelling of Wave Energy Devices

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-07-01

    Future large-scale implementation of wave energy converts (WECs) will introduce an anthropogenic activity in the ocean which may contribute to underwater noise. The Ocean houses several marine species with acoustic sensibility; consequently the potential impact of the underwater noise needs to be addressed. At present, there are no acoustic impact studies based on acquired data. The WEAM project (Wave Energy Acoustic Monitoring) aims at developing an underwater noise monitoring plan for WECs. The development of an acoustic monitoring plan must consider the sound propagation in the ocean, identify noise sources, understand the operational characteristics and select adequate instrumentation. Any monitoring strategy must involve in-situ measurements. However, the vast distances which sound travels within the ocean, can make in-situ measurements covering the entire area of interest, impracticable. This difficulty can be partially overcome through acoustic numerical modelling. This paper presents a synthetic study, on the application of acoustic forward modelling and the evaluation of the impact of noise produced by wave energy devices on marine mammals using criteria based on audiograms of dolphins, or other species. The idea is to illustrate the application of that methodology, and to show to what extent it allows for estimating distances of impacts due to acoustic noise.

  1. Underwater detection by using ultrasonic sensor

    Science.gov (United States)

    Bakar, S. A. A.; Ong, N. R.; Aziz, M. H. A.; Alcain, J. B.; Haimi, W. M. W. N.; Sauli, Z.

    2017-09-01

    This paper described the low cost implementation of hardware and software in developing the system of ultrasonic which can visualize the feedback of sound in the form of measured distance through mobile phone and monitoring the frequency of detection by using real time graph of Java application. A single waterproof transducer of JSN-SR04T had been used to determine the distance of an object based on operation of the classic pulse echo detection method underwater. In this experiment, the system was tested by placing the housing which consisted of Arduino UNO, Bluetooth module of HC-06, ultrasonic sensor and LEDs at the top of the box and the transducer was immersed in the water. The system which had been tested for detection in vertical form was found to be capable of reporting through the use of colored LEDs as indicator to the relative proximity of object distance underwater form the sensor. As a conclusion, the system can detect the presence of an object underwater within the range of ultrasonic sensor and display the measured distance onto the mobile phone and the real time graph had been successfully generated.

  2. Biological warfare in a historical perspective.

    Science.gov (United States)

    Roffey, R; Tegnell, A; Elgh, F

    2002-08-01

    There are some early examples of biological warfare (BW), but in modern times it was used first for sabotage by Germany during WWI. Development of biological weapons on a military significant scale was initiated in several countries in the period between the world wars. During WWII, several countries had active programs such as the USA, UK, Canada, Germany, Japan and the Soviet Union. It was only Japan that on a fairly large scale used BW. The US program continued until 1969, when President Nixon took a decision to end it in connection with signing the BTWC. The Soviet Union had also continued its program after the war, and this was enhanced after signing the BTWC: in the 1980s the program consisted of around fifty facilities and involved around 60,000 people. The Soviet Union produced and maintained a large stockpile of BW-agents. After the collapse of the Soviet Union, and due to pressure from USA and UK, President Yeltsin issued a decree in 1992 banning continued offensive BW activity. However, there are still concerns of residual activity in Russia. Another program of concern is the Iraqi BW-program. After 10 years of UN inspections that were stopped in 1998, there are still many unanswered questions concerning the BW program. There was also a covert BW-program in South Africa that was terminated around 1993. There have also been a number of allegations of alleged use or possession. In addition, there are indications that 10-12 states are now trying to acquire BW, and this assessment is based on intelligence information, mainly from the USA. For example Iraq, North Korea, Iran, Syria, Sudan and Libya. Another aspect is the strong driving force of technology developments to promote this type of program, opening new risks for future potential military misuse.

  3. Chemical Warfare Materiel in Sediment at a Deep-Water Discarded Military Munitions Site

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Understanding the release and transformation of chemical agent (CA) at underwater discarded military munitions (DMM) sites is essential to determine the potential risk to human health and impact on the ocean environment; yet few studies have been conducted at sites in excess of 250 m, the depth at which most U.S. CA munitions were disposed. Maritime construction workers installing cables or pipelines at a CA DMM site, as well as fishermen and scientific researchers deploying bottom-contact gear, represent possible exposure pathways to human receptors. The Hawai`i Undersea Military Munitions Assessment (HUMMA) sought to characterize a historic munitions sea-disposal site at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect sediments within two meters of suspected World War II chemical munitions, confirmed to be 100-lb M47 series bombs containing sulfur mustard. When environmental media was brought to the surface, samples were screened for distilled sulfur mustard (HD) and related agent breakdown products (ABP) (collectively referred to as chemical warfare materiel [CWM]). Detectable concentrations of HD and/or its ABP 1,4-dithiane were found in sediments collected at all CA DMM sites; HD was also detected at two control sites. The location and extent of munitions casing deterioration strongly influenced the distribution and level of CWM in sediment. The interior of the casing contained levels of CWM orders of magnitudes higher than that observed in the surrounding sediment at one meter distance, indicating the majority of the CWM is hydrolyzed as it is released from the munitions casing and a fraction of the fill materiel persists in the environment for decades following disposal. Although the potential for future site users to become exposed to CWA in recovered sediments and debris exists, the level of risk is significantly mitigated by the depth and location of the sea-disposal site.

  4. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in German South West Africa (GSWA). The GSWA campaign has been described in many ways as a secondary theatre within the greater geostrategic chess game of the First World War. The objective ...

  5. relevance of information warfare models to critical infrastructure

    African Journals Online (AJOL)

    ismith

    information security and information systems were used to deconstruct the models into their fundamental components and this .... emptive strikes on communications and logistics may be conducted using computer- based information warfare or physical ..... and risk to infrastructure. Preventing an aggressor from acquiring ...

  6. Environmental assessments of sea dumped chemical warfare agents

    DEFF Research Database (Denmark)

    Sanderson, Hans; Fauser, Patrik

    This is a report on the information gathered during work related to sea dumped chemical warfare agents. It mainly reviews the work conducted in relation to the installation of the two Nord Stream gas pipeline from 2008-2012. The focus was on the weight-of-evidence risk assessment of disturbed CWA...

  7. US and UK Military Cultural Relevance for Future Warfare

    Science.gov (United States)

    2009-03-01

    thinking from ‘heavy metal ’, armour oriented manoeuvre warfare thinking to more agile and intellectual military actions then those adjectives serve their...flourish the power distance and excess testosterone needs to be reduced. A similar problem of Power Distance exists in the British Army but is perhaps less

  8. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  9. Command and Control for Large-Scale Hybrid Warfare Systems

    Science.gov (United States)

    2014-06-05

    warfare have included couriers on horseback, sig- nal flags, encryption and code breaking, telegraph , wire- less radio, aerial reconnaissance and...Leavenworth, KS, 1990). [18] P. C. Niedfeldt, B. T. Carroll, J. A. Howard, R. W. Beard, B. S. Morse , and S. Pledgie, Enhanced UAS surveillance using a

  10. Public Discussion of Nuclear Warfare: A Time for Hope.

    Science.gov (United States)

    Cooper, Martha

    Anti-nuclear discourse, which peaked in 1981-82, signaled an emergence of public discourse on the nuclear warfare issue. During the development of the original atomic bomb, public discussion of the issue was severely restricted, but immediately after the bombing of Hiroshima and Nagasaki, discourse on the subject increased. During the Cold War…

  11. The political economy of warfare in nineteeth century Benin kingdom ...

    African Journals Online (AJOL)

    This paper examines how the interactions of politics and economy influenced the changing perspective on warfare in nineteenth century Benin Kingdom. The study investigates how the combined political and economic behaviour of Benin affected the rebuilding of military power as instrument of political policy in furtherance ...

  12. Composite warfare : the conduct of successful ground force ...

    African Journals Online (AJOL)

    COMPOSITE WARFARE: THE CONDUCT OF. SUCCESSFUL GROUND FORCE. OPERATIONS IN AFRICA. Eeben Barlow. Abel Esterhuyse, PhD. Stellenbosch University. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from ...

  13. The Enemy Below: Preparing Ground Forces for Subterranean Warfare

    Science.gov (United States)

    2013-12-01

    underground structure through social media. Social media such as Facebook , Twitter, Instagram , and YouTube are this generation’s leaflet technology for...66 E . TUNNEL WARFARE DURING THE VIETNAM WAR (1966) ..............67 1. Introduction...89 d. Indicators and Detection of Subterranean Activity ...............90 e . Alternate Approaches

  14. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  15. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  16. SWARMs Ontology: A Common Information Model for the Cooperation of Underwater Robots

    Science.gov (United States)

    Li, Xin; Bilbao, Sonia; Martín-Wanton, Tamara; Bastos, Joaquim; Rodriguez, Jonathan

    2017-01-01

    In order to facilitate cooperation between underwater robots, it is a must for robots to exchange information with unambiguous meaning. However, heterogeneity, existing in information pertaining to different robots, is a major obstruction. Therefore, this paper presents a networked ontology, named the Smart and Networking Underwater Robots in Cooperation Meshes (SWARMs) ontology, to address information heterogeneity and enable robots to have the same understanding of exchanged information. The SWARMs ontology uses a core ontology to interrelate a set of domain-specific ontologies, including the mission and planning, the robotic vehicle, the communication and networking, and the environment recognition and sensing ontology. In addition, the SWARMs ontology utilizes ontology constructs defined in the PR-OWL ontology to annotate context uncertainty based on the Multi-Entity Bayesian Network (MEBN) theory. Thus, the SWARMs ontology can provide both a formal specification for information that is necessarily exchanged between robots and a command and control entity, and also support for uncertainty reasoning. A scenario on chemical pollution monitoring is described and used to showcase how the SWARMs ontology can be instantiated, be extended, represent context uncertainty, and support uncertainty reasoning. PMID:28287468

  17. SWARMs Ontology: A Common Information Model for the Cooperation of Underwater Robots

    Directory of Open Access Journals (Sweden)

    Xin Li

    2017-03-01

    Full Text Available In order to facilitate cooperation between underwater robots, it is a must for robots to exchange information with unambiguous meaning. However, heterogeneity, existing in information pertaining to different robots, is a major obstruction. Therefore, this paper presents a networked ontology, named the Smart and Networking Underwater Robots in Cooperation Meshes (SWARMs ontology, to address information heterogeneity and enable robots to have the same understanding of exchanged information. The SWARMs ontology uses a core ontology to interrelate a set of domain-specific ontologies, including the mission and planning, the robotic vehicle, the communication and networking, and the environment recognition and sensing ontology. In addition, the SWARMs ontology utilizes ontology constructs defined in the PR-OWL ontology to annotate context uncertainty based on the Multi-Entity Bayesian Network (MEBN theory. Thus, the SWARMs ontology can provide both a formal specification for information that is necessarily exchanged between robots and a command and control entity, and also support for uncertainty reasoning. A scenario on chemical pollution monitoring is described and used to showcase how the SWARMs ontology can be instantiated, be extended, represent context uncertainty, and support uncertainty reasoning.

  18. SWARMs Ontology: A Common Information Model for the Cooperation of Underwater Robots.

    Science.gov (United States)

    Li, Xin; Bilbao, Sonia; Martín-Wanton, Tamara; Bastos, Joaquim; Rodriguez, Jonathan

    2017-03-11

    In order to facilitate cooperation between underwater robots, it is a must for robots to exchange information with unambiguous meaning. However, heterogeneity, existing in information pertaining to different robots, is a major obstruction. Therefore, this paper presents a networked ontology, named the Smart and Networking Underwater Robots in Cooperation Meshes (SWARMs) ontology, to address information heterogeneity and enable robots to have the same understanding of exchanged information. The SWARMs ontology uses a core ontology to interrelate a set of domain-specific ontologies, including the mission and planning, the robotic vehicle, the communication and networking, and the environment recognition and sensing ontology. In addition, the SWARMs ontology utilizes ontology constructs defined in the PR-OWL ontology to annotate context uncertainty based on the Multi-Entity Bayesian Network (MEBN) theory. Thus, the SWARMs ontology can provide both a formal specification for information that is necessarily exchanged between robots and a command and control entity, and also support for uncertainty reasoning. A scenario on chemical pollution monitoring is described and used to showcase how the SWARMs ontology can be instantiated, be extended, represent context uncertainty, and support uncertainty reasoning.

  19. Underwater Chaotic Lidar using Blue Laser Diodes

    Science.gov (United States)

    Rumbaugh, Luke K.

    The thesis proposes and explores an underwater lidar system architecture based on chaotic modulation of recently introduced, commercially available, low cost blue laser diodes. This approach is experimentally shown to allow accurate underwater impulse response measurements while eliminating the need for several major components typically found in high-performance underwater lidar systems. The proposed approach is to: 1. Generate wideband, noise-like intensity modulation signals using optical chaotic modulation of blue-green laser diodes, and then 2. Use this signal source to develop an underwater chaotic lidar system that uses no electrical signal generator, no electro-optic modulator, no optical frequency doubler, and no large-aperture photodetector. The outcome of this thesis is the demonstration of a new underwater lidar system architecture that could allow high resolution ranging, imaging, and water profiling measurements in turbid water, at a reduced size, weight, power and cost relative to state-of-the-art high-performance underwater lidar sensors. This work also makes contributions to the state of the art in optics, nonlinear dynamics, and underwater sensing by demonstrating for the first time: 1. Wideband noise-like intensity modulation of a blue laser diode using no electrical signal generator or electro-optic modulator. Optical chaotic modulation of a 462 nm blue InGaN laser diode by self-feedback is explored for the first time. The usefulness of the signal to chaotic lidar is evaluated in terms of bandwidth, modulation depth, and autocorrelation peak-to-sidelobe-ratio (PSLR) using both computer and laboratory experiments. In laboratory experiments, the optical feedback technique is shown to be effective in generating wideband, noise-like chaotic signals with strong modulation depth when the diode is operated in an external-cavity dominated state. The modulation signal strength is shown to be limited by the onset of lasing within the diode's internal

  20. Underwater reflectance transformation imaging: a technology for in situ underwater cultural heritage object-level recording

    Science.gov (United States)

    Selmo, David; Sturt, Fraser; Miles, James; Basford, Philip; Malzbender, Tom; Martinez, Kirk; Thompson, Charlie; Earl, Graeme; Bevan, George

    2017-01-01

    There is an increasing demand for high-resolution recording of in situ underwater cultural heritage. Reflectance transformation imaging (RTI) has a proven track record in terrestrial contexts for acquiring high-resolution diagnostic data at small scales. The research presented here documents the first adaptation of RTI protocols to the subaquatic environment, with a scuba-deployable method designed around affordable off-the-shelf technologies. Underwater RTI (URTI) was used to capture detail from historic shipwrecks in both the Solent and the western Mediterranean. Results show that URTI can capture submillimeter levels of qualitative diagnostic detail from in situ archaeological material. In addition, this paper presents the results of experiments to explore the impact of turbidity on URTI. For this purpose, a prototype fixed-lighting semisubmersible RTI photography dome was constructed to allow collection of data under controlled conditions. The signal-to-noise data generated reveals that the RGB channels of underwater digital images captured in progressive turbidity degraded faster than URTI object geometry calculated from them. URTI is shown to be capable of providing analytically useful object-level detail in conditions that would render ordinary underwater photography of limited use.

  1. The WODA guidance paper on underwater sound from dredging (abstract)

    NARCIS (Netherlands)

    Thomsen, F.; Borsani, F.; Clarke, D.; Jong, C.A.F. de; Witt, P. de; Holtkamp, M.; Goethals, F.; San Martin, E.; Spadaro, P.; Raalte, G. van; Jensen, A.

    2013-01-01

    The World Organisation of Dredging Associations (WODA) has identified underwater sound as an environmental issue that needs further consideration. A WODA Expert Group on Underwater Sound (WEGUS) was established to provide a guidance paper on dredging sound, impact on aquatic biota and advice on

  2. Inspection of the Engineering Condition of Underwater Concrete Structures

    Science.gov (United States)

    1989-04-01

    civil works structures. Specific objectives are: (a) to summarize the typical types of deterioration that occur in underwater concrete structures ; (b...Standardized and other methods that have proven satisfactory for inspection are emphasized. Methods that have potential for detection of the extent and cause of inadequacies in underwater concrete structures are also included.

  3. Kalman filter applied in underwater integrated navigation system

    Directory of Open Access Journals (Sweden)

    Yan Xincun

    2013-02-01

    Full Text Available For the underwater integrated navigation system, information fusion is an important technology. This paper introduces the Kalman filter as the most useful information fusion technology, and then gives a summary of the Kalman filter applied in underwater integrated navigation system at present, and points out the further research directions in this field.

  4. Underwater hearing in the great cormorant (Phalacrocorax carbo sinensis)

    DEFF Research Database (Denmark)

    Hansen, Kirstin Anderson; Larsen, Ole Næsbye; Wahlberg, Magnus

    2016-01-01

    The underwater hearing threshold of a great cormorant (Phalacrocroax carbo sinensis) was measured at 2 kHz using psychophysical methods. Previous in-air and underwater testing suggests that cormorants have rather poor in-air hearing compared to other birds of similar size (Johansen, 2016...

  5. Underwater landscapes: unrecognized cultural heritage and research resource

    OpenAIRE

    Ole Gron

    2004-01-01

    Maritime archaeologists have until recently focused on the excavation of sites on land, but advances in underwater techniques of survey and excavation now allow direct investigation of submerged sites and even landscapes, where preservation, especially of organic remains, is often better than in land sites. The potential importance of underwater archaeology is demonstrated by recent research on submerged Mesolithic sites in Denmark.

  6. Mexican Underwater Archaeology and Some of its Challenges and Solutions

    Directory of Open Access Journals (Sweden)

    Pilar Luna Erreguerena

    2013-10-01

    Full Text Available In response to Carver’s lead article, I’d like to highlight an easily overlooked aspect of archaeology: underwater archaeology. I will offer some examples and experiences from Mexico, which will perhaps resonate in other cities and nations around the world with a rich underwater cultural heritage.

  7. Mexican Underwater Archaeology and Some of its Challenges and Solutions

    OpenAIRE

    Pilar Luna Erreguerena

    2013-01-01

    In response to Carver’s lead article, I’d like to highlight an easily overlooked aspect of archaeology: underwater archaeology. I will offer some examples and experiences from Mexico, which will perhaps resonate in other cities and nations around the world with a rich underwater cultural heritage.

  8. Underwater hearing in the great cormorant (Phalacrocorax carbo sinensis)

    DEFF Research Database (Denmark)

    Hansen, Kirstin Anderson; Larsen, Ole Næsbye; Wahlberg, Magnus

    2016-01-01

    The underwater hearing threshold of a great cormorant (Phalacrocroax carbo sinensis) was measured at 2 kHz using psychophysical methods. Previous in-air and underwater testing suggests that cormorants have rather poor in-air hearing compared to other birds of similar size (Johansen, 2016). Prelim...

  9. Underwater Acoustic Positioning Systems for MEC Detection and Reacquisition Operations

    Science.gov (United States)

    2016-01-22

    FINAL REPORT UNDERWATER ACOUSTIC POSITIONING SYSTEMS FOR MEC DETECTION AND REACQUISITION OPERATIONS ESTCP Project MR-200734...Report i January 2016 FINAL REPORT: UNDERWATER ACOUSTIC POSITIONING SYSTEMS FOR MEC DETECTION AND REACQUISITION OPERATIONS ESTCP... communication port. The approximate retail cost of a NOMAD system, including four baseline stations, is $86K. MR-200734 Final Report viii January

  10. Development of underwater laser cutting technique for steel and ...

    Indian Academy of Sciences (India)

    Abstract. In nuclear field, underwater cutting and welding technique is required for post-irradiation examination, maintenance, decommissioning and to reduce storage space of irradiated materials like used zircaloy pressure tubes etc., of nuclear power plants. We have developed underwater cutting technique for 4.2 mm ...

  11. Real-time underwater image enhancement: An improved approach ...

    Indian Academy of Sciences (India)

    Abstract. An RGB YCbCr Processing method (RYPro) is proposed for underwater images commonly suffer- ing from low contrast and poor color quality. The degradation in image quality may be attributed to absorption and backscattering of light by suspended underwater particles. Moreover, as the depth increases, different ...

  12. Real-time underwater image enhancement: An improved approach ...

    Indian Academy of Sciences (India)

    An RGB YCbCr Processing method (RYPro) is proposed for underwater images commonly suffering from low contrast and poor color quality. The degradation in image quality may be attributed to absorption and backscattering of light by suspended underwater particles. Moreover, as the depth increases, different colors are ...

  13. Remarks on the observability of single beacon underwater navigation

    DEFF Research Database (Denmark)

    Jouffroy, Jerome; Ross, Andrew

    This paper contributes a simple and intuitive result in the analysis of underwater navigation using a single ranging beacon. This analysis should help with the design of small and lightweight underwater vehicles by reducing the amount of instrumentation required for accurate navigation. The concept...

  14. History of the Chemical Warfare Service in World War II. Biological Warfare Research in the United States, Volume 2

    Science.gov (United States)

    1947-11-01

    Hired Commission for the Reduction of Arma - ments (A. 16. 1924.. H), Geneva, 30 Jul 1924., pp. 29-30. In Hist files. Extracts from this League...Department of Agriculture in Kay 1942, several rice pathogens were considered as potential biologica warfare agents, one of «rich »as Hel

  15. Psychological and Unconventional Warfare, 1941-1952: Origins of a Special Warfare Capability for the United States Army

    Science.gov (United States)

    1979-11-01

    over the conferral of First Special Service and Ranger unit colors , lineage, and honors to the Army’s Special Forces. Looking back upon that scene...Against E-e y, n D_:2a to VE-V1. New York: George. W. Stewart, Inc., 1949. Linebarger, Paul M. A. Psichological Warfare, New York: ]>jell, Sloan and Pearce

  16. Design and implementation of an underwater sound recording device

    Energy Technology Data Exchange (ETDEWEB)

    Martinez, Jayson J.; Myers, Joshua R.; Carlson, Thomas J.; Deng, Zhiqun; Rohrer, John S.; Caviggia, Kurt A.

    2011-09-19

    The purpose of this study was to design and build two versions of an underwater sound recording device. The device designed is referred to as the Underwater Sound Recorder (USR), which can be connected to one or two hydrophones or other underwater sound sensors. The URS contains a 26 dB preamplifier and a user selectable gain that permits additional amplification of input to the system from 26 dB to 46 dB. Signals within the frequency range up to 15 kHz may be recorded using the USR. Examples of USR applications are monitoring underwater processes that have the potential to create large pressure waves that could potentially harm fish or other aquatic life, such as underwater explosions or pile driving. Additional applications are recording sound generated by vessels or the vocalizations of some marine mammals, such as the calls from many species of whales.

  17. Capacitive Micromachined Ultrasonic Transducers (CMUTs for Underwater Imaging Applications

    Directory of Open Access Journals (Sweden)

    Jinlong Song

    2015-09-01

    Full Text Available A capacitive micromachined ultrasonic transducer structure for use in underwater imaging is designed, fabricated and tested in this paper. In this structure, a silicon dioxide insulation layer is inserted between the top electrodes and the vibration membrane to prevent ohmic contact. The capacitance-voltage (C-V characteristic curve shows that the transducer offers suitable levels of hysteresis and repeatability performance. The −6 dB center frequency is 540 kHz and the transducer has a bandwidth of 840 kHz for a relative bandwidth of 155%. Underwater pressure of 143.43 Pa is achieved 1 m away from the capacitive micromachined ultrasonic transducer under 20  excitation. Two-dimensional underwater ultrasonic imaging, which is able to prove that a rectangular object is present underwater, is achieved. The results presented here indicate that our work will be highly beneficial for the establishment of an underwater ultrasonic imaging system.

  18. Strong, reversible underwater adhesion via gecko-inspired hydrophobic fibers.

    Science.gov (United States)

    Soltannia, Babak; Sameoto, Dan

    2014-12-24

    Strong, reversible underwater adhesion using gecko-inspired surfaces is achievable through the use of a hydrophobic structural material and does not require surface modification or suction cup effects for this adhesion to be effective. Increased surface energy can aid in dry adhesion in an air environment but strongly degrades wet adhesion via reduction of interfacial energy underwater. A direct comparison of structurally identical but chemically different mushroom shaped fibers shows that strong, reversible adhesion, even in a fully wetted, stable state, is feasible underwater if the structural material of the fibers is hydrophobic and the mating surface is not strongly hydrophilic. The exact adhesion strength will be a function of the underwater interfacial energy between surfaces and the specific failure modes of individual fibers. This underwater adhesion has been calculated to be potentially greater than the dry adhesion for specific combinations of hydrophobic surfaces.

  19. Acquisition and tracking for underwater optical communications

    Science.gov (United States)

    Williams, Andrew J.; Laycock, Leslie L.; Griffith, Michael S.; McCarthy, Andrew G.; Rowe, Duncan P.

    2017-10-01

    There is a growing requirement to transfer large volumes of data between underwater platforms. As seawater is transmissive in the visible band, underwater optical communications is an active area of interest since it offers the potential for power efficient, covert and high bandwidth datalinks at short to medium ranges. Short range systems have been successfully demonstrated using sources with low directionality. To realise higher data rates and/or longer ranges, the use of more efficient directional beams is required; by necessity, these must be sufficiently aligned to achieve the required link margin. For mobile platforms, the acquisition and tracking of each node is therefore critical in order to establish and maintain an optical datalink. This paper describes work undertaken to demonstrate acquisition and tracking in a 3D underwater environment. A range of optical sources, beam steering technologies, and tracking sensors have been assessed for suitability. A novel scanning strategy exploiting variable beam divergence was developed to provide robust acquisition whilst minimising acquisition time. A prototype system was assembled and demonstrated in a large water tank. This utilised custom quadrant detectors based on Silicon PhotoMultiplier (SiPM) arrays for fine tracking, and a Wide Field of View (WFoV) sCMOS camera for link acquisition. Fluidic lenses provided dynamic control of beam divergence, and AC modulation/filtering enabled background rejection. The system successfully demonstrated robust optical acquisition and tracking between two nodes with only nanowatt received optical powers. The acquisition time was shown to be dependent on the initial conditions and the transmitted optical power.

  20. Navigation System Fault Diagnosis for Underwater Vehicle

    DEFF Research Database (Denmark)

    Falkenberg, Thomas; Gregersen, Rene Tavs; Blanke, Mogens

    2014-01-01

    This paper demonstrates fault diagnosis on unmanned underwater vehicles (UUV) based on analysis of structure of the nonlinear dynamics. Residuals are generated using dierent approaches in structural analysis followed by statistical change detection. Hypothesis testing thresholds are made signal...... based to cope with non-ideal properties seen in real data. Detection of both sensor and thruster failures are demonstrated. Isolation is performed using the residual signature of detected faults and the change detection algorithm is used to assess severity of faults by estimating their magnitude...

  1. Water waves generated by underwater explosion

    CERN Document Server

    Mehaute, Bernard Le

    1996-01-01

    This is the first book on explosion-generated water waves. It presents the theoretical foundations and experimental results of the generation and propagation of impulsively generated waves resulting from underwater explosions. Many of the theories and concepts presented herein are applicable to other types of water waves, in particular, tsunamis and waves generated by the fall of a meteorite. Linear and nonlinear theories, as well as experimental calibrations, are presented for cases of deep and shallow water explosions. Propagation of transient waves on dissipative, nonuniform bathymetries to

  2. Sound radiation in atmosphere during underwater earthquake

    Science.gov (United States)

    Vdovichenko, S. P.; Zaslavskiy, Y. M.

    1986-01-01

    Acoustic fields in the atmosphere generated by hydroacoustic disturbances which are caused by seismic movements of bottom rocks during an underwater earthquake are used to predict tsunami waves. Different models of deepened seismic sources equivalent to an earthquake focus with respect to the total quantity of released energy are outlined. The characteristics of radiation introduced by the ocean water layer are examined. The dependence of the level and directional diagram of radiation of focal depth is examined. The level of acoustic oscillations is examined at the maximum of the diagram at altitudes were the appearance of ionized regions detectable during sounding by Doppler radars is possible.

  3. Hemispherical optical dome for underwater communication

    Science.gov (United States)

    Shiri, Ron S.; Lunde, Emily L.; Coronado, Patrick L.; Quijada, Manuel A.

    2017-08-01

    For many years, acoustic systems have been used as the primary method for underwater communication; however, the data transfer rate of such systems is low because sound propagates slowly through water. A higher throughput can be achieved using visible light to transmit data underwater. The first issue with this approach is that there is generally a large loss of the light signal due to scattering and absorption in water, even though there is an optimal wavelength for transmission in the blue or green wavelengths of the visible spectrum. The second issue is that a simple communication system, consisting only of a highly directional source/transmitter and small optical detector/receiver, has a very narrow field of view. The goal of this project is to improve an optical, underwater communication system by increasing the effective field of view of the receiving optics. To this end, we make two changes to the simple system: (1) An optical dome was added near the receiver. An array of lenses is placed radially on the surface of the dome, reminiscent of the compound eye of an insect. The lenses make the source and detector planes conjugate, and each lens adds a new region of the source plane to the instrument's total field of view. (2) The receiver was expanded to include multiple photodiodes. With these two changes, the receiver has much more tolerance to misalignments (in position and angle) of the transmitter. Two versions of the optical dome (with 6" and 8" diameters) were designed using PTC's Creo CAD software and modeled using Synopsys' CODE V optical design software. A series of these transparent hemispherical domes, with both design diameters, were manufactured using a 5-axis mill. The prototype was then retrofitted with lenses and compared with the computer-generated model to demonstrate the effectiveness of this solution. This work shows that the dome design improves the optical field of view of the underwater communication system considerably. Furthermore, with

  4. Covert underwater acoustic communication using dolphin sounds.

    Science.gov (United States)

    Liu, Songzuo; Qiao, Gang; Ismail, Asim

    2013-04-01

    In November 2012, an experiment demonstrating biological mimicry method for covert underwater acoustic communication (UAC) was conducted at Lianhua Lake in Heilongjiang China. Dolphin whistles were used for synchronization while dolphin clicks were used as information carrier. The time interval between dolphin clicks conveys the information bits. Channel estimates were obtained with matching pursuit (MP) algorithm, which is useful for sparse channel estimation. Adaptive RAKE Equalization was employed at the receiver. Bit error rates were less than 10(-4) with 37 bits per second data rate in the lake trial.

  5. Working underwater: deepwater drilling support by ROV

    Energy Technology Data Exchange (ETDEWEB)

    1958-01-01

    Experience with the drill ships Discoverer Seven Seas and Penrod 78 explains some of the problems associated with the use of remotely operated vehicles (ROVs) for underwater operations. Support services are a bigger problem than depth. The author describes developments, such as the new guidewire methods, side launch A-frame davit, and top hat stabilizing frame. All parts of the ROV system must be of heavy duty design, and operative skill is of paramount importance. The major requirements for deep water ROVs are reliability, fail-safe redundancy, cage deployment, compact size, adequate power, and capacity for heavy intervention work. 8 figures.

  6. On Using Self Contained Underwater Breathing Apparatus

    Science.gov (United States)

    1952-01-01

    itself I. Surges 2. Surf 3. Rocks and coral 4. Caves 5. Kelp 11. Related to underwater life I, Sea Urchins 2. Moray, Conger and Electric eels 3. Rays...you, and you must keep each other in sight at all times’.’) A. Descent -- as fast as is comfortable to ears, (The boat’s anchor line is handy for...and Diving. A. Descent -- as fast as is comfortable to ers. (The boat’s anchor line is handy for descending and gives the beginner a greater feeling

  7. Underwater Sound Propagation from Marine Pile Driving.

    Science.gov (United States)

    Reyff, James A

    2016-01-01

    Pile driving occurs in a variety of nearshore environments that typically have very shallow-water depths. The propagation of pile-driving sound in water is complex, where sound is directly radiated from the pile as well as through the ground substrate. Piles driven in the ground near water bodies can produce considerable underwater sound energy. This paper presents examples of sound propagation through shallow-water environments. Some of these examples illustrate the substantial variation in sound amplitude over time that can be critical to understand when computing an acoustic-based safety zone for aquatic species.

  8. Hemispherical Optical Dome for Underwater Communication

    Science.gov (United States)

    Shiri, Ron S.; Lunde, Emily L.; Coronado, Patrick L.; Quijada, Manuel A.

    2017-01-01

    For many years, acoustic systems have been used as the primary method for underwater communication; however, the data transfer rate of such systems is low because sound propagates slowly through the water. A higher throughput can be achieved using visible light to transmit data underwater. The first issue with using this approach is that there is generally a large loss of the light signal due to scattering and absorption in water even though there is an optimal wavelength for transmission in the blue or green wavelengths of the visible spectrum. The second issue is that a simple system consisting only of a highly directional source transmitter and small optical detector receiver has a very narrow field of view. The goal of this project is to improve an optical, underwater communication system by increasing the effective field of view of the receiving optics. To this end, we make two changes to the simple system: (1) An optical dome was added near the receiver. An array of lenses is placed radially on the surface of the dome, reminiscent of the compound eye of an insect. The lenses make the source and detector planes conjugate, and each lens adds a new region of the source plane to the instrument's total field of view. (2) The receiver was expanded to include multiple photodiodes. With these two changes, the receiver has much more tolerance to misalignments (in position and angle) of the transmitter.Two versions of the optical dome (with 6 and 8 diameters) were designed using the CREO CAD software and modeled using the CODE V optical design software. A series of these transparent hemispherical domes, with both design diameters, were manufactured using a 5-axis mill. The prototype was then retrofitted with lenses and compared with the computer-generated model to demonstrate the effectiveness of this solution. This work shows the dome design improves the optical field of view of the underwater communication system considerably. Furthermore, with the experimental test

  9. The Law Governing Aerospace Warfare in the Twenty-First Century

    Science.gov (United States)

    2000-07-01

    Yet, there are currently no treaties dealing specifically with the law of armed conflict in the air and space environments. Chapter 1 describes the...evolution to date of the law governing aerospace warfare. Chapter II analyzes the relevance of military interventions in Iraq and Yugoslavia (Bosnia...Kosovo) to the law of air and space warfare. Chapter III discusses the impact of humanitarian intervention’ on the law of aerospace warfare. Chapters IV

  10. Modelling cavitating flow around underwater missiles

    Directory of Open Access Journals (Sweden)

    Fabien Petitpas

    2011-12-01

    Full Text Available The diffuse interface model of Saurel et al. (2008 is used for the computation of compressible cavitating flows around underwater missiles. Such systems use gas injection and natural cavitation to reduce drag effects. Consequently material interfaces appear separating liquid and gas. These interfaces may have a really complex dynamics such that only a few formulations are able to predict their evolution. Contrarily to front tracking or interface reconstruction method the interfaces are computed as diffused numerical zones, that are captured in a routinely manner, as is done usually with gas dynamics solvers for shocks and contact discontinuity. With the present approach, a single set of partial differential equations is solved everywhere, with a single numerical scheme. This leads to very efficient solvers. The algorithm derived in Saurel et al. (2009 is used to compute cavitation pockets around solid bodies. It is first validated against experiments done in cavitation tunnel at CNU. Then it is used to compute flows around high speed underwater systems (Shkval-like missile. Performance data are then computed showing method ability to predict forces acting on the system.

  11. GAS FLOW IN UNDERWATER BREATHING INSTALLATIONS

    Directory of Open Access Journals (Sweden)

    Anca CONSTANTIN

    2017-11-01

    Full Text Available The open circuit underwater breathing apparatus can be a one or two-stage regulator used in scuba diving or a two-stage regulator used in surface supplied installations. These installations are proper in underwater sites at small depth. The pneumatic circuit of a two-stage regulator is composed mainly of a first stage regulator mounted on the air cylinders and a second stage carried by the diver in his mouth. The two regulators are linked together by a medium pressure hose. The circuit opens when the depression created by the diver’s inhalation, in the second stage body, reaches a certain value. The second stage opening causes a transient movement, namely an expansion wave that propagates through the medium pressure hose to the first stage regulator. The first stage regulator opens and the air in the cylinders is allowed to flow to the diver. The longer the hose, the greater the duration of the expansion wave propagation. Investigations on the wave propagation offer data on the inspiration unsteady motion duration which influences the respiratory effort of the diver.

  12. Software architecture of biomimetic underwater vehicle

    Science.gov (United States)

    Praczyk, Tomasz; Szymak, Piotr

    2016-05-01

    Autonomous underwater vehicles are vehicles that are entirely or partly independent of human decisions. In order to obtain operational independence, the vehicles have to be equipped with a specialized software. The main task of the software is to move the vehicle along a trajectory with collision avoidance. Moreover, the software has also to manage different devices installed on the vehicle board, e.g. to start and stop cameras, sonars etc. In addition to the software embedded on the vehicle board, the software responsible for managing the vehicle by the operator is also necessary. Its task is to define mission of the vehicle, to start, to stop the mission, to send emergency commands, to monitor vehicle parameters, and to control the vehicle in remotely operated mode. An important objective of the software is also to support development and tests of other software components. To this end, a simulation environment is necessary, i.e. simulation model of the vehicle and all its key devices, the model of the sea environment, and the software to visualize behavior of the vehicle. The paper presents architecture of the software designed for biomimetic autonomous underwater vehicle (BAUV) that is being constructed within the framework of the scientific project financed by Polish National Center of Research and Development.

  13. An explanatory model of underwater adaptation

    Directory of Open Access Journals (Sweden)

    Joaquín Colodro

    Full Text Available The underwater environment is an extreme environment that requires a process of human adaptation with specific psychophysiological demands to ensure survival and productive activity. From the standpoint of existing models of intelligence, personality and performance, in this explanatory study we have analyzed the contribution of individual differences in explaining the adaptation of military personnel in a stressful environment. Structural equation analysis was employed to verify a model representing the direct effects of psychological variables on individual adaptation to an adverse environment, and we have been able to confirm, during basic military diving courses, the structural relationships among these variables and their ability to predict a third of the variance of a criterion that has been studied very little to date. In this way, we have confirmed in a sample of professionals (N = 575 the direct relationship of emotional adjustment, conscientiousness and general mental ability with underwater adaptation, as well as the inverse relationship of emotional reactivity. These constructs are the psychological basis for working under water, contributing to an improved adaptation to this environment and promoting risk prevention and safety in diving activities.

  14. Underwater Wireless Acousto-Optic Waveguide (UWAOW)

    Science.gov (United States)

    Giuliano, Giovanni; Kent, Lionel W. J.; Laycock, Leslie C.

    2017-10-01

    The present study originated in the lack of research into achieving underwater total internal reflection (TIR) via the acousto-optic effect. The uniqueness of this technique exists in the fact that it is based on a high sound pressure level which induces a localised change in refractive index of seawater sufficient to achieve total internal reflection within the communication channel. Different transducer systems for generating the pressure wave have been investigated and take the form of a wave which may be either a standing wave, or a novel beamforming technique. The former is based on an array of transducers and with an acoustic mirror at the receiver in order to establish the standing wave. The alternative approach relies on the high intrinsic directionality of a novel beamformer where an annular transducer array is examined as an acoustic source. In this paper, the main characteristics of the acoustic optic waveguide will be presented. This will include both sound and light propagation in the ocean, TIR, novel beam propagation, the refractive index of water as a function of the externally applied acoustic pressure, and the acoustic technology. The modelled results, the limitations imposed by the challenging medium, and the system requirements required to obtain an Underwater Wireless Acousto-Optic Waveguide (UWAOW) will be also addressed.

  15. Underwater pipeline impact localization using piezoceramic transducers

    Science.gov (United States)

    Zhu, Junxiao; Ho, Siu Chun Michael; Patil, Devendra; Wang, Ning; Hirsch, Rachel; Song, Gangbing

    2017-10-01

    Reports indicated that impact events accounted for 47% of offshore pipeline failures, which calls for impact detection and localization for subsea pipelines. In this paper, an innovative method for rapid localization of impacts on underwater pipelines utilizing a novel determination technique for both arrival-time and group velocity (ATGV) of ultrasonic guided waves with lead zirconate titanate (PZT) transducers is described. PZT transducers mounted on the outer surface of a model pipeline were utilized to measure ultrasonic guided waves generated by impact events. Based on the signals from PZT sensors, the ATGV technique integrates wavelet decomposition, Hilbert transform and statistical analysis to pinpoint the arrival-time of the designated ultrasonic guided waves with a specific group velocity. Experimental results have verified the effectiveness and the localization accuracy for eight impact points along a model underwater pipeline. All estimations errors were small and were comparable with the wavelength of the designated ultrasonic guided waves. Furthermore, the method is robust against the low frequency structural vibration introduced by other external forces.

  16. Underwater noise from a wave energy converter

    DEFF Research Database (Denmark)

    Tougaard, Jakob

    A recent addition to the anthropogenic sources of underwater noise is offshore wave energy converters. Underwater noise was recorded from the Wavestar wave energy converter located at Hastholm, Denmark (57°7.73´N, 8°37.23´E). The Wavestar is a full-scale test and demonstration converter...... in full operation and start and stop of the converter. Median broad band (10 Hz – 20 kHz) sound pressure level (Leq) was 123 dB re. 1 Pa, irrespective of status of the wave energy converter (stopped, running or starting/stopping). The most pronounced peak in the third-octave spectrum was in the 160 Hz...... significant noise above ambient could be detected above the 250 Hz band. The absolute increase in noise above ambient was very small. L50 third-octave levels in the four bands with the converter running were thus only 1-2 dB above ambient L50 levels. The noise recorded 25 m from the wave energy converter...

  17. Impact of Vessel Noise on Oyster Toadfish (Opsanus tau) Behavior and Implications for Underwater Noise Management

    Science.gov (United States)

    Krahforst, Cecilia S.

    Underwater noise and its impacts on marine life are growing management concerns. This dissertation considers both the ecological and social concerns of underwater noise, using the oyster toadfish (Opsanus tau) as a model species. Oyster toadfish call for mates using a boatwhistle sound, but increased ambient noise levels from vessels or other anthropogenic activities are likely to influence the ability of males to find mates. If increased ambient noise levels reduce fish fitness then underwater noise can impact socially valued ecosystem services (e.g. fisheries). The following ecological objectives of the impacts of underwater noise on oyster toadfish were investigated: (1) to determine how noise influences male calling behavior; (2) to assess how areas of high vessel activity ("noisy") and low vessel activity ("quiet") influence habitat utilization (fish standard length and occupancy rate); and (3) to discover if fitness (number of clutches and number of embryos per clutch) is lower in "noisy" compared with "quiet" sites. Field experiments were executed in "noisy" and "quiet" areas. Recorded calls by males in response to playback sounds (vessel, predator, and snapping shrimp sounds) and egg deposition by females ("noisy" vs. "quiet" sites) demonstrated that oyster toadfish are impacted by underwater noise. First, males decreased their call rates and called louder in response to increased ambient noise levels. Second, oyster toadfish selected nesting sites in areas with little or no inboard motorboat activity. Third, male oyster toadfish at "noisy" sites either had no egg clutches on their shelters or the number of embryos per clutch was significantly lower than in the "quiet" areas. Underwater noise and disturbance from vessels are influencing the fitness of the oyster toadfish. The social significance of the growing concerns regarding underwater noise was investigated by identifying dominant themes found within two types of texts: four recent underwater noise

  18. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available -1 International Journal of Cyber Warfare and Terrorism, vol. 6(3), 65-78 Using an Ontology for Network Attack Planning Renier van Heerden1,2, Peter Chan2 , Louise Leenen2,3 Jacques Theron4 1 Nelson Mandela Metropolitan University, South Africa 2...

  19. Underwater fiber-wireless communication with a passive front end

    Science.gov (United States)

    Xu, Jing; Sun, Bin; Lyu, Weichao; Kong, Meiwei; Sarwar, Rohail; Han, Jun; Zhang, Wei; Deng, Ning

    2017-11-01

    We propose and experimentally demonstrate a novel concept on underwater fiber-wireless (Fi-Wi) communication system with a fully passive wireless front end. A low-cost step-index (SI) plastic optical fiber (POF) together with a passive collimating lens at the front end composes the underwater Fi-Wi architecture. We have achieved a 1.71-Gb/s transmission at a mean BER of 4.97 × 10-3 (1.30 × 10-3 when using power loading) over a 50-m SI-POF and 2-m underwater wireless channel using orthogonal frequency division multiplexing (OFDM). Although the wireless part is very short, it actually plays a crucial role in practical underwater implementation, especially in deep sea. Compared with the wired solution (e.g. using a 52-m POF cable without the UWOC part), the proposed underwater Fi-Wi scheme can save optical wet-mate connectors that are sophisticated, very expensive and difficult to install in deep ocean. By combining high-capacity robust POF with the mobility and ubiquity of underwater wireless optical communication (UWOC), the proposed underwater Fi-Wi technology will find wide application in ocean exploration.

  20. Intelligent Navigation for a Solar Powered Unmanned Underwater Vehicle

    Directory of Open Access Journals (Sweden)

    Francisco García-Córdova

    2013-04-01

    Full Text Available In this paper, an intelligent navigation system for an unmanned underwater vehicle powered by renewable energy and designed for shadow water inspection in missions of a long duration is proposed. The system is composed of an underwater vehicle, which tows a surface vehicle. The surface vehicle is a small boat with photovoltaic panels, a methanol fuel cell and communication equipment, which provides energy and communication to the underwater vehicle. The underwater vehicle has sensors to monitor the underwater environment such as sidescan sonar and a video camera in a flexible configuration and sensors to measure the physical and chemical parameters of water quality on predefined paths for long distances. The underwater vehicle implements a biologically inspired neural architecture for autonomous intelligent navigation. Navigation is carried out by integrating a kinematic adaptive neuro-controller for trajectory tracking and an obstacle avoidance adaptive neuro- controller. The autonomous underwater vehicle is capable of operating during long periods of observation and monitoring. This autonomous vehicle is a good tool for observing large areas of sea, since it operates for long periods of time due to the contribution of renewable energy. It correlates all sensor data for time and geodetic position. This vehicle has been used for monitoring the Mar Menor lagoon.

  1. Time Reversal Aided Bidirectional OFDM Underwater Cooperative Communication Algorithm with the Same Frequency Transmission

    OpenAIRE

    Zhang, Lingling; Huang, Jianguo; Tang, Chengkai; Song, Houbing

    2017-01-01

    In underwater acoustic channel, signal transmission may experience significant latency and attenuation that would degrade the performance of underwater communication. The cooperative communication technique can solve it but the spectrum efficiency is lower than traditional underwater communication. So we proposed a time reversal aided bidirectional OFDM underwater cooperative communication algorithm. The algorithm allows all underwater sensor nodes to share the same uplink and downlink freque...

  2. Stuxnet and Cyber-Warfare (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic.   Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction. The lecturer invites comments via email to Gian.Piero.Siroli@cern.ch NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  3. Stuxnet and Cyber-Warfare (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The first part of the lecture is devoted to the description of the Stuxnet worm, the first cyber-weapon whose existence has been made public, discovered in 2010 and targeting a specific industrial control system; the worm is responsible for the damaging of many centrifuges at an uranium enrichment facility, with the goal of sabotaging Iran's nuclear program. In the second part, the main features of cyber-warfare in conflict and pre-conflict activities will be discussed and compared to the conventional warfare domains, with also a general view at the international political debate on this topic. Check the http://pugwash.org web site, an organisation that seeks a world free of nuclear weapons and other weapons of mass destruction.   NB! All Academic Training lectures are recorded and are publicly available. There is no live webcast.

  4. Heterogeneity in the long term health effects of warfare.

    Science.gov (United States)

    Akbulut-Yuksel, Mevlude; Yuksel, Mutlu

    2017-11-01

    This paper estimates the long-term heterogeneous legacies of exposures to war in utero and during early childhood on height in adulthood. Using a novel dataset on the regional WWII destruction in Germany, combined with the German Socio-Economic Panel (SOEP), we find that individuals who experienced warfare in utero and during childhood are an average of 2cm shorter as adults, suggesting that the negative scarring effect of WWII dominated the positive effect coming from a selection. Among war survivors, children from less privileged families who resided in highly destroyed regions, particularly girls, suffered the greatest health consequences of warfare. Our analyses also show that wartime children who lost their parents during the war years are an average of 1.3cm shorter as adults. However, the father's conscription during WWII had no long-term effect on adult height. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Centralised versus Decentralised Control Reconfiguration for Collaborating Underwater Robots

    DEFF Research Database (Denmark)

    Furno, Lidia; Nielsen, Mikkel Cornelius; Blanke, Mogens

    2015-01-01

    The present paper introduces an approach to fault-tolerant reconfiguration for collaborating underwater robots. Fault-tolerant reconfiguration is obtained using the virtual actuator approach, Steen (2005). The paper investigates properties of a centralised versus a decentralised implementation...... an underwater drill needs to be transported and positioned by three collaborating robots as part of an underwater autonomous operation....... and assesses the capabilities under communication constraints between the individual robots. In the centralised case, each robot sends information related to its own status to a unique virtual actuator that computes the necessary reconfiguration. In the decentralised case, each robot is equipped with its own...

  6. Adaptive underwater channel estimation for hybrid lidar/radar

    Science.gov (United States)

    Lee, Robert W.; Illig, David W.; Mullen, Linda J.

    2017-05-01

    Adaptive filtering and channel estimation techniques are applied to laser based ranging systems that utilize wide-band intensity modulation to measure the range and reflectivity of underwater objects. The proposed method aims to iteratively learn the frequency dependent characteristics of the underwater environment using a frequency domain adaptive filter, which results in an estimate for the channels optical impulse response. This work presents the application of the frequency domain adaptive filter to simulated and experimental data, and shows it is possible to iteratively learn the underwater optical channel impulse response while using Hybrid Lidar/Radar techniques.

  7. Algorithms and analysis for underwater vehicle plume tracing.

    Energy Technology Data Exchange (ETDEWEB)

    Byrne, Raymond Harry; Savage, Elizabeth L. (Texas A& M University, College Station, TX); Hurtado, John Edward (Texas A& M University, College Station, TX); Eskridge, Steven E.

    2003-07-01

    The goal of this research was to develop and demonstrate cooperative 3-D plume tracing algorithms for miniature autonomous underwater vehicles. Applications for this technology include Lost Asset and Survivor Location Systems (L-SALS) and Ship-in-Port Patrol and Protection (SP3). This research was a joint effort that included Nekton Research, LLC, Sandia National Laboratories, and Texas A&M University. Nekton Research developed the miniature autonomous underwater vehicles while Sandia and Texas A&M developed the 3-D plume tracing algorithms. This report describes the plume tracing algorithm and presents test results from successful underwater testing with pseudo-plume sources.

  8. A Study of Combined Arms Warfare by Alexander the Great.

    Science.gov (United States)

    1998-06-05

    Arms Warfare by Alexander the Great Approved by: ^§FC ^ohn T. Broom, Ph.D. ^c^. Thesis Committee Chairman y v^X^; ■-. ■SA: Gary J. Bjorge ...research. Dr. Bjorge and LTC Clay have provided technical advice and copy editing for much of this thesis. Special acknowledgment is due LTC David...objective to destroy or disrupt the enemy forces. Additionally, ancient armies did not have the communication ability that the modern army possess

  9. Theoretical, Legal and Ethical Impact of Robots on Warfare

    Science.gov (United States)

    2007-03-30

    with the Theory of War Carl von Clausewitz believed that there were certain laws and principles of warfare but that they tended to exist at the... Carl von Clausewitz ,” Parameters (Spring 2006): 83-84. 47 Peter Paret, ed. Makers of Modern Strategy from Machiavelli to the Nuclear Age...Princeton, NJ: Princeton University Press, 1986), 193. 48 Paret, 107. 49 Michael Howard and Peter Paret, ed and trans, Carl Von Clausewitz : On War

  10. Numerical simulation of RCS for carrier electronic warfare airplanes

    OpenAIRE

    Yue, Kuizhi; Liu, Wenlin; Li, Guanxiong; Ji, Jinzu; Yu, Dazhao

    2015-01-01

    This paper studies the radar cross section (RCS) of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carr...

  11. Sub state Unconventional Warfare: Expanding United States Military Political Options

    Science.gov (United States)

    2016-05-26

    de Colombia FID Foreign Internal Defense FM Field Manual GVN Government of South Vietnam ICP Indochinese Communist Party ISIL Islamic State of Iraq...abound throughout the world. Hezbollah, Hamas, ISIL, and the Taliban in the Middle East, the Fuerzas Armadas Revolucionarias de Colombia (FARC) in South...describing what UW consists of, and how it is applied, in FM 31-21 (1969). “Unconventional warfare consists of military, political, psychological , or

  12. Friction in the U.S. Army During Irregular Warfare

    Science.gov (United States)

    2014-05-22

    32Nic Fields and Peter Dennis, Boudicca’s Rebellion AD 60-61: The Britons Rise up against Rome (Long Island City, NY: Osprey Publication, 2011), 47–51...Colonial Pacification in Tonkin and Madagascar , 1885-1900, 2013, 13. 19 validated entrenched ideas of traditional warfare codified in General...counterinsurgency operation. The Philippine-American War, the unintended result of purchasing the island chain from Spain after a naval victory at

  13. Design and implementation of an omni-directional underwater acoustic micro-modem based on a low-power micro-controller unit.

    Science.gov (United States)

    Won, Tae-Hee; Park, Sung-Joon

    2012-01-01

    For decades, underwater acoustic communication has been restricted to the point-to-point long distance applications such as deep sea probes and offshore oil fields. For this reason, previous acoustic modems were typically characterized by high data rates and long working ranges at the expense of large size and high power consumption. Recently, as the need for underwater wireless sensor networks (UWSNs) has increased, the research and development of compact and low-power consuming communication devices has become the focus. From the consideration that the requisites of acoustic modems for UWSNs are low power consumption, omni-directional beam pattern, low cost and so on, in this paper, we design and implement an omni-directional underwater acoustic micro-modem satisfying these requirements. In order to execute fast digital domain signal processing and support flexible interfaces with other peripherals, an ARM Cortex-M3 is embedded in the micro-modem. Also, for the realization of small and omni-directional properties, a spherical transducer having a resonant frequency of 70 kHz and a diameter of 34 mm is utilized for the implementation. Physical layer frame format and symbol structure for efficient packet-based underwater communication systems are also investigated. The developed acoustic micro-modem is verified analytically and experimentally in indoor and outdoor environments in terms of functionality and performance. Since the modem satisfies the requirements for use in UWSNs, it could be deployed in a wide range of applications requiring underwater acoustic communication.

  14. Relaxation of Distributed Data Aggregation for Underwater Acoustic Sensor Networks

    Science.gov (United States)

    2014-03-31

    2 3.1 Gossip algorithms for distributed averaging . . . . . . . . . . . . . . . . . 3 3.2 Distributed particle filtering...algorithm that had direct access to all of the measurements. We use gossip algorithms (discussed in Section 3.1) to diffuse information across the...2 3.1 Gossip algorithms for distributed averaging We begin by discussing gossip algorithms, which we use to synchronize and spread infor- mation

  15. Underwater Acoustic Network as a Deployable Positioning System

    Science.gov (United States)

    2012-06-01

    positions were recorded with a Garmin GPSmap76CS logger. The two G-Log 760 GPS loggers used to record the vehicle track also had errors, as seen by plotting...the Garmin GPSmap76CS logger were entered into Google Earth. The pictured location of node 22 indicates an error either in the logged GPS locations...DieHard Automatic Battery Charger (Model #71222); LS1 towed sled; G-Log 760 GPS Recorders (S/N 8410000916 and 8410000917); Garmin GPSmap 76CS logger

  16. Development of Underwater Laser Cladding and Underwater Laser Seal Welding Techniques for Reactor Components

    Science.gov (United States)

    Hino, Takehisa; Tamura, Masataka; Tanaka, Yoshimi; Kouno, Wataru; Makino, Yoshinobu; Kawano, Shohei; Matsunaga, Keiji

    Stress corrosion cracking (SCC) has been reported at the aged components in many nuclear power plants. Toshiba has been developing the underwater laser welding. This welding technique can be conducted without draining the water in the reactor vessel. It is beneficial for workers not to exposure the radiation. The welding speed can be attaining twice as fast as that of Gas Tungsten Arc Welding (GTAW). The susceptibility of SCC can also be lower than the Alloy 600 base metal.

  17. Major General George Crook's Use of Counterinsurgency Compound Warfare during the Great Sioux War of 1876-77

    National Research Council Canada - National Science Library

    Pirkle, Wesley M

    2008-01-01

    ... implementing the concept of counterinsurgency compound warfare. Counterinsurgency Compound Warfare is the simultaneous use of a regular or conventional force and an irregular, indigenous force in unison against a common enemy...

  18. 46 CFR 71.50-27 - Alternative Hull Examination (AHE) program options: Divers or underwater remotely operated...

    Science.gov (United States)

    2010-10-01

    ...: Divers or underwater remotely operated vehicle (ROV). 71.50-27 Section 71.50-27 Shipping COAST GUARD...-27 Alternative Hull Examination (AHE) program options: Divers or underwater remotely operated vehicle.... (b) You may use an underwater ROV to conduct the underwater survey. The underwater ROV operating team...

  19. Transducers and arrays for underwater sound

    CERN Document Server

    Butler, John L

    2016-01-01

    This improved and updated second edition covers the theory, development, and design of electro-acoustic transducers for underwater applications. This highly regarded text discusses the basics of piezoelectric and magnetostrictive transducers that are currently being used as well as promising new designs. It presents the basic acoustics as well as the specific acoustics data needed in transducer design and evaluation. A broad range of designs of projectors and hydrophones are described in detail along with methods of modeling, evaluation, and measurement. Analysis of projector and hydrophone transducer arrays, including the effects of mutual radiation impedance and numerical models for elements and arrays, are also covered. The book includes new advances in transducer design and transducer materials and has been completely reorganized to be suitable for use as a textbook, as well as a reference or handbook. The new edition contains updates to the first edition, end-of-chapter exercises, and solutions to select...

  20. Improved Underwater Excitation-Emission Matrix Fluorometer

    Science.gov (United States)

    Moore, Casey; daCunha, John; Rhoades, Bruce; Twardowski, Michael

    2007-01-01

    A compact, high-resolution, two-dimensional excitation-emission matrix fluorometer (EEMF) has been designed and built specifically for use in identifying and measuring the concentrations of organic compounds, including polluting hydrocarbons, in natural underwater settings. Heretofore, most EEMFs have been designed and built for installation in laboratories, where they are used to analyze the contents of samples collected in the field and brought to the laboratories. Because the present EEMF can be operated in the field, it is better suited to measurement of spatially and temporally varying concentrations of substances of interest. In excitation-emission matrix (EEM) fluorometry, fluorescence is excited by irradiating a sample at one or more wavelengths, and the fluorescent emission from the sample is measured at multiple wavelengths. When excitation is provided at only one wavelength, the technique is termed one-dimensional (1D) EEM fluorometry because the resulting matrix of fluorescence emission data (the EEM) contains only one row or column. When excitation is provided at multiple wavelengths, the technique is termed two-dimensional (2D) EEM fluorometry because the resulting EEM contains multiple rows and columns. EEM fluorometry - especially the 2D variety - is well established as a means of simultaneously detecting numerous dissolved and particulate compounds in water. Each compound or pool of compounds has a unique spectral fluorescence signature, and each EEM is rich in information content, in that it can contain multiple fluorescence signatures. By use of deconvolution and/or other mixture-analyses techniques, it is often possible to isolate the spectral signature of compounds of interest, even when their fluorescence spectra overlap. What distinguishes the present 2D EEMF over prior laboratory-type 2D EEMFs are several improvements in packaging (including a sealed housing) and other aspects of design that render it suitable for use in natural underwater