WorldWideScience

Sample records for networked underwater warfare

  1. MOSES, development of an Underwater Warfare Testbed

    NARCIS (Netherlands)

    Lentze, S.G.

    2001-01-01

    The TNO underwater warfare (UWW) research programme results in a large number of models used in operational research projects. To enhance the accessibility and re-use of these models for new projects, TNO-FEL has developed the modelling environment ‘MOSES - Maritime Operations Simulation and

  2. Underwater Acoustic Networking Techniques

    CERN Document Server

    Otnes, Roald; Casari, Paolo; Goetz, Michael; Husøy, Thor; Nissen, Ivor; Rimstad, Knut; van Walree, Paul; Zorzi, Michele

    2012-01-01

    This literature study presents an overview of underwater acoustic networking. It provides a background and describes the state of the art of all networking facets that are relevant for underwater applications. This report serves both as an introduction to the subject and as a summary of existing protocols, providing support and inspiration for the development of network architectures.

  3. Implications of Network Centric Warfare

    National Research Council Canada - National Science Library

    Bailey, Alvin

    2004-01-01

    .... These areas of dependence also provide numerous vulnerabilities. This paper will focus specifically on Network Centric Warfare's vulnerabilities in terms of sensors cyberterrorism/ Electro-Magnetic Pulse (EMP...

  4. Attrition in Network Centric Warfare

    National Research Council Canada - National Science Library

    Erbetta, John

    2003-01-01

    .... Information warfare means that positive attacks on systems themselves compound the problem. Emerging technologies applicable to NCW as a force multiplier need to be recognized as counter to the impediments to progress...

  5. UML modelling of network warfare examples

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-08-01

    Full Text Available ] Affects both civilian and military domains [8] [9] Related to the concepts of infowar, information operations, hacking, hackivism, cyberterrorism and cybotage depending on motivations and techniques [10] Encompasses both technological solutions...]. In addition, Williers as well as Qingbao and Anwar discuss more offensive aspects of information security and Network Warfare like Hacking, Vulnerability Injection, Network Attacks, Denial of Capability, Interception and Blockage [6] [18] [19]. Various...

  6. Underwater Sensor Networks: A New Energy Efficient and Robust Architecture

    NARCIS (Netherlands)

    Climent, Salvador; Capella, Juan Vincente; Meratnia, Nirvana; Serrano, Juan José

    2012-01-01

    The specific characteristics of underwater environments introduce new challenges for networking protocols. In this paper, a specialized architecture for underwater sensor networks (UWSNs) is proposed and evaluated. Experiments are conducted in order to analyze the suitability of this protocol for

  7. A Networking Protocol for Underwater Acoustic Networks

    National Research Council Canada - National Science Library

    Xie, Geoffrey; Gibson, John

    2000-01-01

    ... (anti-submarine and mine/counter-mine warfare). Two specific examples of the recent efforts to develop and field UANs in shallow water regions are the Deployable Autonomous Distributed System funded by the Office of Naval Research (ONR...

  8. Optimal Node Placement in Underwater Wireless Sensor Networks

    KAUST Repository

    Felamban, M.; Shihada, Basem; Jamshaid, K.

    2013-01-01

    Wireless Sensor Networks (WSN) are expected to play a vital role in the exploration and monitoring of underwater areas which are not easily reachable by humans. However, underwater communication via acoustic waves is subject to several performance

  9. Communication and cooperation in underwater acoustic networks

    Science.gov (United States)

    Yerramalli, Srinivas

    In this thesis, we present a study of several problems related to underwater point to point communications and network formation. We explore techniques to improve the achievable data rate on a point to point link using better physical layer techniques and then study sensor cooperation which improves the throughput and reliability in an underwater network. Robust point-to-point communications in underwater networks has become increasingly critical in several military and civilian applications related to underwater communications. We present several physical layer signaling and detection techniques tailored to the underwater channel model to improve the reliability of data detection. First, a simplified underwater channel model in which the time scale distortion on each path is assumed to be the same (single scale channel model in contrast to a more general multi scale model). A novel technique, which exploits the nature of OFDM signaling and the time scale distortion, called Partial FFT Demodulation is derived. It is observed that this new technique has some unique interference suppression properties and performs better than traditional equalizers in several scenarios of interest. Next, we consider the multi scale model for the underwater channel and assume that single scale processing is performed at the receiver. We then derive optimized front end pre-processing techniques to reduce the interference caused during single scale processing of signals transmitted on a multi-scale channel. We then propose an improvised channel estimation technique using dictionary optimization methods for compressive sensing and show that significant performance gains can be obtained using this technique. In the next part of this thesis, we consider the problem of sensor node cooperation among rational nodes whose objective is to improve their individual data rates. We first consider the problem of transmitter cooperation in a multiple access channel and investigate the stability of

  10. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  11. Event localization in underwater wireless sensor networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew John Robert; Jamshaid, Kamran; Shihada, Basem; Ho, Pin-Han

    2012-01-01

    We propose m-courses (Monitoring Courses), a novel solution to localize events in an underwater wireless sensor network. These networks consists of surface gateways and relay nodes. GPS can localize the position of surface gateways which can

  12. Localization of Energy Harvesting Empowered Underwater Optical Wireless Sensor Networks

    KAUST Repository

    Saeed, Nasir; Celik, Abdulkadir; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    with insufficient battery, harvest the energy and starts communicating once it has sufficient energy storage. Network localization is carried out by measuring the RSSs of active nodes, which are modeled based on the underwater optical communication channel

  13. A Secure Communication Suite for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Angelica Lo Duca

    2012-11-01

    Full Text Available In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confidentiality and the integrity of underwater communication while taking into account the unique characteristics and constraints of the acoustic channel. By means of experiments and simulations based on real data, we show that the suite is suitable for an underwater networking environment as it introduces limited, and sometimes negligible, communication and power consumption overhead.

  14. Trade-off Analysis of Underwater Acoustic Sensor Networks

    Science.gov (United States)

    Tuna, G.; Das, R.

    2017-09-01

    In the last couple of decades, Underwater Acoustic Sensor Networks (UASNs) were started to be used for various commercial and non-commercial purposes. However, in underwater environments, there are some specific inherent constraints, such as high bit error rate, variable and large propagation delay, limited bandwidth capacity, and short-range communications, which severely degrade the performance of UASNs and limit the lifetime of underwater sensor nodes as well. Therefore, proving reliability of UASN applications poses a challenge. In this study, we try to balance energy consumption of underwater acoustic sensor networks and minimize end-to-end delay using an efficient node placement strategy. Our simulation results reveal that if the number of hops is reduced, energy consumption can be reduced. However, this increases end-to-end delay. Hence, application-specific requirements must be taken into consideration when determining a strategy for node deployment.

  15. Cluster protocols in Underwater Sensor Networks: a Research Review

    Directory of Open Access Journals (Sweden)

    K. Ovaliadis

    2014-07-01

    Full Text Available Underwater Wireless Sensor Networks (UWSN have different characteristics in relation to terrestrial wireless sensor networks; such as limited bandwidth capacity, high propagation delays and limited battery power. Although there has been much work completed in developing protocols and models for terrestrial networks, these are rarely applicable for underwater sensor networks. Up to today major efforts have been made for designing efficient protocols while considering the underwater communication characteristics. An important issue on this research area is the construction of an efficient clustering algorithm. Clustering in the context of UWSN is important as it contributes a great deal towards the efficient use of energy resources. This paper reviews the most significant cluster based protocols proposed for UWSN. Major performance issues of these protocols with respect to the network conditions such as packet delivery ratio, average packet delay, node mobility effect and energy consumption are examined. The advantages and disadvantages of each protocol are also pointed out.

  16. Optimal Node Placement in Underwater Acoustic Sensor Network

    KAUST Repository

    Felemban, Muhamad

    2011-10-01

    Almost 70% of planet Earth is covered by water. A large percentage of underwater environment is unexplored. In the past two decades, there has been an increase in the interest of exploring and monitoring underwater life among scientists and in industry. Underwater operations are extremely difficult due to the lack of cheap and efficient means. Recently, Wireless Sensor Networks have been introduced in underwater environment applications. However, underwater communication via acoustic waves is subject to several performance limitations, which makes the relevant research issues very different from those on land. In this thesis, we investigate node placement for building an initial Underwater Wireless Sensor Network infrastructure. Firstly, we formulated the problem into a nonlinear mathematic program with objectives of minimizing the total transmission loss under a given number of sensor nodes and targeted volume. We conducted experiments to verify the proposed formulation, which is solved using Matlab optimization tool. We represented each node with a truncated octahedron to fill out the 3D space. The truncated octahedrons are tiled in the 3D space with each node in the center where locations of the nodes are given using 3D coordinates. Results are supported using ns-3 simulator. Results from simulation are consistent with the obtained results from mathematical model with less than 10% error.

  17. SOUNET: Self-Organized Underwater Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Hee-won Kim

    2017-02-01

    Full Text Available In this paper, we propose an underwater wireless sensor network (UWSN named SOUNET where sensor nodes form and maintain a tree-topological network for data gathering in a self-organized manner. After network topology discovery via packet flooding, the sensor nodes consistently update their parent node to ensure the best connectivity by referring to the timevarying neighbor tables. Such a persistent and self-adaptive method leads to high network connectivity without any centralized control, even when sensor nodes are added or unexpectedly lost. Furthermore, malfunctions that frequently happen in self-organized networks such as node isolation and closed loop are resolved in a simple way. Simulation results show that SOUNET outperforms other conventional schemes in terms of network connectivity, packet delivery ratio (PDR, and energy consumption throughout the network. In addition, we performed an experiment at the Gyeongcheon Lake in Korea using commercial underwater modems to verify that SOUNET works well in a real environment.

  18. SOUNET: Self-Organized Underwater Wireless Sensor Network.

    Science.gov (United States)

    Kim, Hee-Won; Cho, Ho-Shin

    2017-02-02

    In this paper, we propose an underwater wireless sensor network (UWSN) named SOUNET where sensor nodes form and maintain a tree-topological network for data gathering in a self-organized manner. After network topology discovery via packet flooding, the sensor nodes consistently update their parent node to ensure the best connectivity by referring to the timevarying neighbor tables. Such a persistent and self-adaptive method leads to high network connectivity without any centralized control, even when sensor nodes are added or unexpectedly lost. Furthermore, malfunctions that frequently happen in self-organized networks such as node isolation and closed loop are resolved in a simple way. Simulation results show that SOUNET outperforms other conventional schemes in terms of network connectivity, packet delivery ratio (PDR), and energy consumption throughout the network. In addition, we performed an experiment at the Gyeongcheon Lake in Korea using commercial underwater modems to verify that SOUNET works well in a real environment.

  19. Optimal Node Placement in Underwater Wireless Sensor Networks

    KAUST Repository

    Felamban, M.

    2013-03-25

    Wireless Sensor Networks (WSN) are expected to play a vital role in the exploration and monitoring of underwater areas which are not easily reachable by humans. However, underwater communication via acoustic waves is subject to several performance limitations that are very different from those used for terresstrial networks. In this paper, we investigate node placement for building an initial underwater WSN infrastructure. We formulate this problem as a nonlinear mathematical program with the objective of minimizing the total transmission loss under a given number of sensor nodes and targeted coverage volume. The obtained solution is the location of each node represented via a truncated octahedron to fill out the 3D space. Experiments are conducted to verify the proposed formulation, which is solved using Matlab optimization tool. Simulation is also conducted using an ns-3 simulator, and the simulation results are consistent with the obtained results from mathematical model with less than 10% error.

  20. Underwater Optical Wireless Communications, Networking, and Localization: A Survey

    KAUST Repository

    Saeed, Nasir; Celik, Abdulkadir; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2018-01-01

    Underwater wireless communications can be carried out through acoustic, radio frequency (RF), and optical waves. Compared to its bandwidth limited acoustic and RF counterparts, underwater optical wireless communications (UOWCs) can support higher data rates at low latency levels. However, severe aquatic channel conditions (e.g., absorption, scattering, turbulence, etc.) pose great challenges for UOWCs and significantly reduce the attainable communication ranges, which necessitates efficient networking and localization solutions. Therefore, we provide a comprehensive survey on the challenges, advances, and prospects of underwater optical wireless networks (UOWNs) from a layer by layer perspective which includes: 1) Potential network architectures; 2) Physical layer issues including propagation characteristics, channel modeling, and modulation techniques 3) Data link layer problems covering link configurations, link budgets, performance metrics, and multiple access schemes; 4) Network layer topics containing relaying techniques and potential routing algorithms; 5) Transport layer subjects such as connectivity, reliability, flow and congestion control; 6) Application layer goals and state-of-the-art UOWN applications, and 7) Localization and its impacts on UOWN layers. Finally, we outline the open research challenges and point out the future directions for underwater optical wireless communications, networking, and localization research.

  1. Underwater Optical Wireless Communications, Networking, and Localization: A Survey

    KAUST Repository

    Saeed, Nasir

    2018-02-28

    Underwater wireless communications can be carried out through acoustic, radio frequency (RF), and optical waves. Compared to its bandwidth limited acoustic and RF counterparts, underwater optical wireless communications (UOWCs) can support higher data rates at low latency levels. However, severe aquatic channel conditions (e.g., absorption, scattering, turbulence, etc.) pose great challenges for UOWCs and significantly reduce the attainable communication ranges, which necessitates efficient networking and localization solutions. Therefore, we provide a comprehensive survey on the challenges, advances, and prospects of underwater optical wireless networks (UOWNs) from a layer by layer perspective which includes: 1) Potential network architectures; 2) Physical layer issues including propagation characteristics, channel modeling, and modulation techniques 3) Data link layer problems covering link configurations, link budgets, performance metrics, and multiple access schemes; 4) Network layer topics containing relaying techniques and potential routing algorithms; 5) Transport layer subjects such as connectivity, reliability, flow and congestion control; 6) Application layer goals and state-of-the-art UOWN applications, and 7) Localization and its impacts on UOWN layers. Finally, we outline the open research challenges and point out the future directions for underwater optical wireless communications, networking, and localization research.

  2. Task Allocation and Path Planning for Collaborative Autonomous Underwater Vehicles Operating through an Underwater Acoustic Network

    Directory of Open Access Journals (Sweden)

    Yueyue Deng

    2013-01-01

    Full Text Available Dynamic and unstructured multiple cooperative autonomous underwater vehicle (AUV missions are highly complex operations, and task allocation and path planning are made significantly more challenging under realistic underwater acoustic communication constraints. This paper presents a solution for the task allocation and path planning for multiple AUVs under marginal acoustic communication conditions: a location-aided task allocation framework (LAAF algorithm for multitarget task assignment and the grid-based multiobjective optimal programming (GMOOP mathematical model for finding an optimal vehicle command decision given a set of objectives and constraints. Both the LAAF and GMOOP algorithms are well suited in poor acoustic network condition and dynamic environment. Our research is based on an existing mobile ad hoc network underwater acoustic simulator and blind flooding routing protocol. Simulation results demonstrate that the location-aided auction strategy performs significantly better than the well-accepted auction algorithm developed by Bertsekas in terms of task-allocation time and network bandwidth consumption. We also demonstrate that the GMOOP path-planning technique provides an efficient method for executing multiobjective tasks by cooperative agents with limited communication capabilities. This is in contrast to existing multiobjective action selection methods that are limited to networks where constant, reliable communication is assumed to be available.

  3. Event localization in underwater wireless sensor networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew John Robert

    2012-08-01

    We propose m-courses (Monitoring Courses), a novel solution to localize events in an underwater wireless sensor network. These networks consists of surface gateways and relay nodes. GPS can localize the position of surface gateways which can then distribute their locations through the network using acoustic modems. Relay nodes are deployed to remain static, but these untethered nodes may drift due to water currents, resulting in disruption of communication links. We develop a novel underwater alarm system using a cyclic graph model. In the event of link failure, a series of alarm packets are broadcast in the network. These alarms are then captured by the underwater m-courses, which can also be used to assure network connectivity and identify node failures. M-courses also allow the network to localize events and identify network issues locally before forwarding results upwards to a Surface Gateway node. This reduces communication overhead and allows for efficient management of nodes in a mobile network. Our results show that m-course routing reduces the number of sends required to report an event to a Surface Gateway by up to 80% when compared to a naïve routing implementation.

  4. Cognitive Routing in Software-Defined Underwater Acoustic Networks

    Directory of Open Access Journals (Sweden)

    Huma Ghafoor

    2017-12-01

    Full Text Available There are two different types of primary users (natural acoustic and artificial acoustic, and there is a long propagation delay for acoustic links in underwater cognitive acoustic networks (UCANs. Thus, the selection of a stable route is one of the key design factors for improving overall network stability, thereby reducing end-to-end delay. Software-defined networking (SDN is a novel approach that improves network intelligence. To this end, we propose a novel SDN-based routing protocol for UCANs in order to find a stable route between source and destination. A main controller is placed in a surface buoy that is responsible for the global view of the network, whereas local controllers are placed in different autonomous underwater vehicles (AUVs that are responsible for a localized view of the network. The AUVs have fixed trajectories, and sensor nodes within transmission range of the AUVs serve as gateways to relay the gathered information to the controllers. This is an SDN-based underwater communications scheme whereby two nodes can only communicate when they have a consensus about a common idle channel. To evaluate our proposed scheme, we perform extensive simulations and improve network performance in terms of end-to-end delay, delivery ratio, and overhead.

  5. Understanding the elementary considerations in a network warfare environment: an introductory framework

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . It seeks to offer a better introductory understanding to the field of network warfare. This paper addresses the requirements for a network warfare capability and will look at the high-level approach, constraints, focus areas, levels, techniques...

  6. Warfare Ecology on an Underwater Demolition Range: Acoustic Observations of Marine Life and Shallow Water Detonations in Hawai`i

    Science.gov (United States)

    Shannon, Lee H.

    Most studies investigating the effects of military-associated anthropogenic noise concentrate on deep sea or open ocean propagation of sonar and its effect on marine mammals. In littoral waters, U.S. military special operations units regularly conduct shallow water explosives training, yet relatively little attention has been given to the potential impact on nearshore marine ecosystems from these underwater detonations. This dissertation research focused on the Pu'uloa Underwater Detonation Range off the coast of O`ahu, and examined multiple aspects of the surrounding marine ecosystem and the effects of detonations using acoustic monitoring techniques. The soundscape of a nearshore reef ecosystem adjacent to the UNDET range was characterized through analysis of passive acoustic recordings collected over the span of 6 years. Snapping shrimp were the predominant source of noise, and a diel pattern was present, with increased sound energy during the night hours. Results revealed a difference of up to 7dB between two Ecological Acoustic Recorder locations 2.5km apart along the 60ft isobath. Passive acoustic recording files were searched visually and aurally for odontocete whistles. Whistles were detected in only 0.6% of files analyzed, indicating this area is not frequently transited by coastal odontocete emitting social sounds. The study also opportunistically captured a humpback whale singing during a detonation event, during which the animal showed no obvious alteration of its singing behavior. Four separate underwater detonation events were recorded using a surface deployed F-42C transducer, and the resulting analysis showed no measurable drop in the biologically produced acoustic energy in reaction to the explosive events. Coral reef fishes were recorded visually and acoustically during detonation events at a known distance and bearing from a known explosive sound source. Individual fish behavioral responses to the explosion varied, and a sharp uptick in fish

  7. Event Localization in Underwater Wireless Sensor Networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew

    2011-11-01

    In this thesis we consider different methods to localize events in a multi-hop wireless sensor network operating underwater using acoustic modems. The network consists of surface gateway nodes and relay nodes. Localization of surface gateways can be achieved through GPS, but we cannot rely on this technology for localizing underwater nodes. Surface Gateway nodes can distribute their locations through the network using the incoming signals by the acoustic modems from the relay nodes. Relay nodes are deployed to remain static but due to water currents, floating, and the untethered nature of the nodes, they often suffer from frequent drifting which can result in a deployed network suffering link failures. In this work, we developed a novel concept of an underwater alarming system, which adapts a cyclic graph model. In the event of link failure, a series of alarm packets are broadcasted in the network. These alarms are then captured through a novel concept of underwater Monitoring Courses (M-Courses), which can also be used to assure network connectivity and identify node faults. M-Courses also allow the network to localize events and identify network issues at a local level before forwarding any results upwards to a Surface Gateway nodes. This reduces the amount of communication overhead needed and allowing for distributed management of nodes in a network which may be constantly moving. We show that the proposed algorithms can reduce the number of send operations needed for an event to be localized in a network. We have found that M-Course routing reduces the number of sends required to report an event to a Surface Gateway by up to 80% in some cases when compared to a naive routing implementation. But this is achieved by increasing the time for an event to reach a Surface Gateway. These effects are both due to the buffering effect of M-Course routing, which allows us to efficiently deal with multiple events in an local area and we find that the performance of M

  8. Understanding "Understanding" Flow for Network-Centric Warfare: Military Knowledge-Flow Mechanics

    National Research Council Canada - National Science Library

    Nissen, Mark

    2002-01-01

    Network-centric warfare (NCW) emphasizes information superiority for battlespace efficacy, but it is clear that the mechanics of how knowledge flows are just as important as those pertaining to the networks and communication...

  9. Localization of Energy Harvesting Empowered Underwater Optical Wireless Sensor Networks

    KAUST Repository

    Saeed, Nasir

    2017-12-20

    In this paper, a received signal strength (RSS) based localization technique is developed for energy harvesting underwater optical wireless sensor networks (EH-UOWSNs), where the optical noise sources and channel impairments of seawater pose significant challenges for range estimation. Energy limitation is another major problem due to the limited battery power and difficulty in replacing or recharging the battery of an underwater sensor node. In the proposed framework, sensor nodes with insufficient battery, harvest the energy and starts communicating once it has sufficient energy storage. Network localization is carried out by measuring the RSSs of active nodes, which are modeled based on the underwater optical communication channel characteristics. Thereafter, block kernel matrices are computed for the RSS based range measurements. Unlike the traditional shortest-path approach, the proposed technique reduces the shortest path estimation for each block kernel matrix. Once the complete block kernel matrices are available, a closed form localization technique is developed to find the location of every optical sensor node in the network. Furthermore, an analytical expression for Cramer Rao lower bound (CRLB) is derived as a benchmark to compare the localization performance of the proposed technique. Finally, extensive simulations show that the proposed technique outperforms the well-known network localization techniques.

  10. Advanced flooding-based routing protocols for underwater sensor networks

    OpenAIRE

    Isufi, E.; Dol, H.; Leus, G.J.T.

    2016-01-01

    Flooding-based protocols are a reliable solution to deliver packets in underwater sensor networks. However, these protocols potentially involve all the nodes in the forwarding process. Thus, the performance and energy efficiency are not optimal. In this work, we propose some advances of a flooding-based protocol with the goal to improve the performance and the energy efficiency. The first idea considers the node position information in order to reduce the number of relays that may apply flood...

  11. Localization Algorithms of Underwater Wireless Sensor Networks: A Survey

    Science.gov (United States)

    Han, Guangjie; Jiang, Jinfang; Shu, Lei; Xu, Yongjun; Wang, Feng

    2012-01-01

    In Underwater Wireless Sensor Networks (UWSNs), localization is one of most important technologies since it plays a critical role in many applications. Motivated by widespread adoption of localization, in this paper, we present a comprehensive survey of localization algorithms. First, we classify localization algorithms into three categories based on sensor nodes’ mobility: stationary localization algorithms, mobile localization algorithms and hybrid localization algorithms. Moreover, we compare the localization algorithms in detail and analyze future research directions of localization algorithms in UWSNs. PMID:22438752

  12. ECS: Efficient Communication Scheduling for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Lu Hong

    2011-03-01

    Full Text Available TDMA protocols have attracted a lot of attention for underwater acoustic sensor networks (UWSNs, because of the unique characteristics of acoustic signal propagation such as great energy consumption in transmission, long propagation delay and long communication range. Previous TDMA protocols all allocated transmission time to nodes based on discrete time slots. This paper proposes an efficient continuous time scheduling TDMA protocol (ECS for UWSNs, including the continuous time based and sender oriented conflict analysis model, the transmission moment allocation algorithm and the distributed topology maintenance algorithm. Simulation results confirm that ECS improves network throughput by 20% on average, compared to existing MAC protocols.

  13. Path Diversity Improved Opportunistic Routing for Underwater Sensor Networks.

    Science.gov (United States)

    Bai, Weigang; Wang, Haiyan; He, Ke; Zhao, Ruiqin

    2018-04-23

    The packets carried along a pre-defined route in underwater sensor networks are very vulnerble. Node mobility or intermittent channel availability easily leads to unreachable routing. Opportunistic routing has been proven to be a promising paradigm to design routing protocols for underwater sensor networks. It takes advantage of the broadcast nature of the wireless medium to combat packet losses and selects potential paths on the fly. Finding an appropriate forwarding candidate set is a key issue in opportunistic routing. Many existing solutions ignore the impact of candidates location distribution on packet forwarding. In this paper, a path diversity improved candidate selection strategy is applied in opportunistic routing to improve packet forwarding efficiency. It not only maximizes the packet forwarding advancements but also takes the candidate’s location distribution into account. Based on this strategy, we propose two effective routing protocols: position improved candidates selection (PICS) and position random candidates selection (PRCS). PICS employs two-hop neighbor information to make routing decisions. PRCS only uses one-hop neighbor information. Simulation results show that both PICS and PRCS can significantly improve network performance when compared with the previous solutions, in terms of packet delivery ratio, average energy consumption and end-to-end delay.

  14. Path Diversity Improved Opportunistic Routing for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Weigang Bai

    2018-04-01

    Full Text Available The packets carried along a pre-defined route in underwater sensor networks are very vulnerble. Node mobility or intermittent channel availability easily leads to unreachable routing. Opportunistic routing has been proven to be a promising paradigm to design routing protocols for underwater sensor networks. It takes advantage of the broadcast nature of the wireless medium to combat packet losses and selects potential paths on the fly. Finding an appropriate forwarding candidate set is a key issue in opportunistic routing. Many existing solutions ignore the impact of candidates location distribution on packet forwarding. In this paper, a path diversity improved candidate selection strategy is applied in opportunistic routing to improve packet forwarding efficiency. It not only maximizes the packet forwarding advancements but also takes the candidate’s location distribution into account. Based on this strategy, we propose two effective routing protocols: position improved candidates selection (PICS and position random candidates selection (PRCS. PICS employs two-hop neighbor information to make routing decisions. PRCS only uses one-hop neighbor information. Simulation results show that both PICS and PRCS can significantly improve network performance when compared with the previous solutions, in terms of packet delivery ratio, average energy consumption and end-to-end delay.

  15. Design and Analysis of Underwater Acoustic Networks with Reflected Links

    Science.gov (United States)

    Emokpae, Lloyd

    Underwater acoustic networks (UWANs) have applications in environmental state monitoring, oceanic profile measurements, leak detection in oil fields, distributed surveillance, and navigation. For these applications, sets of nodes are employed to collaboratively monitor an area of interest and track certain events or phenomena. In addition, it is common to find autonomous underwater vehicles (AUVs) acting as mobile sensor nodes that perform search-and-rescue missions, reconnaissance in combat zones, and coastal patrol. These AUVs are to work cooperatively to achieve a desired goal and thus need to be able to, in an ad-hoc manner, establish and sustain communication links in order to ensure some desired level of quality of service. Therefore, each node is required to adapt to environmental changes and be able to overcome broken communication links caused by external noise affecting the communication channel due to node mobility. In addition, since radio waves are quickly absorbed in the water medium, it is common for most underwater applications to rely on acoustic (or sound) rather than radio channels for mid-to-long range communications. However, acoustic channels pose multiple challenging issues, most notably the high transmission delay due to slow signal propagation and the limited channel bandwidth due to high frequency attenuation. Moreover, the inhomogeneous property of the water medium affects the sound speed profile while the signal surface and bottom reflections leads to multipath effects. In this dissertation, we address these networking challenges by developing protocols that take into consideration the underwater physical layer dynamics. We begin by introducing a novel surface-based reflection scheme (SBR), which takes advantage of the multipath effects of the acoustic channel. SBR works by using reflections from the water surface, and bottom, to establish non-line-of-sight (NLOS) communication links. SBR makes it possible to incorporate both line

  16. Distributed estimation of sensors position in underwater wireless sensor network

    Science.gov (United States)

    Zandi, Rahman; Kamarei, Mahmoud; Amiri, Hadi

    2016-05-01

    In this paper, a localisation method for determining the position of fixed sensor nodes in an underwater wireless sensor network (UWSN) is introduced. In this simple and range-free scheme, the node localisation is achieved by utilising an autonomous underwater vehicle (AUV) that transverses through the network deployment area, and that periodically emits a message block via four directional acoustic beams. A message block contains the actual known AUV position as well as a directional dependent marker that allows a node to identify the respective transmit beam. The beams form a fixed angle with the AUV body. If a node passively receives message blocks, it could calculate the arithmetic mean of the coordinates existing in each messages sequence, to find coordinates at two different time instants via two different successive beams. The node position can be derived from the two computed positions of the AUV. The major advantage of the proposed localisation algorithm is that it is silent, which leads to energy efficiency for sensor nodes. The proposed method does not require any synchronisation among the nodes owing to being silent. Simulation results, using MATLAB, demonstrated that the proposed method had better performance than other similar AUV-based localisation methods in terms of the rates of well-localised sensor nodes and positional root mean square error.

  17. Efficient Vector-Based Forwarding for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Peng Xie

    2010-01-01

    Full Text Available Underwater Sensor Networks (UWSNs are significantly different from terrestrial sensor networks in the following aspects: low bandwidth, high latency, node mobility, high error probability, and 3-dimensional space. These new features bring many challenges to the network protocol design of UWSNs. In this paper, we tackle one fundamental problem in UWSNs: robust, scalable, and energy efficient routing. We propose vector-based forwarding (VBF, a geographic routing protocol. In VBF, the forwarding path is guided by a vector from the source to the target, no state information is required on the sensor nodes, and only a small fraction of the nodes is involved in routing. To improve the robustness, packets are forwarded in redundant and interleaved paths. Further, a localized and distributed self-adaptation algorithm allows the nodes to reduce energy consumption by discarding redundant packets. VBF performs well in dense networks. For sparse networks, we propose a hop-by-hop vector-based forwarding (HH-VBF protocol, which adapts the vector-based approach at every hop. We evaluate the performance of VBF and HH-VBF through extensive simulations. The simulation results show that VBF achieves high packet delivery ratio and energy efficiency in dense networks and HH-VBF has high packet delivery ratio even in sparse networks.

  18. Energy-Efficient Channel Coding Strategy for Underwater Acoustic Networks

    Directory of Open Access Journals (Sweden)

    Grasielli Barreto

    2017-03-01

    Full Text Available Underwater acoustic networks (UAN allow for efficiently exploiting and monitoring the sub-aquatic environment. These networks are characterized by long propagation delays, error-prone channels and half-duplex communication. In this paper, we address the problem of energy-efficient communication through the use of optimized channel coding parameters. We consider a two-layer encoding scheme employing forward error correction (FEC codes and fountain codes (FC for UAN scenarios without feedback channels. We model and evaluate the energy consumption of different channel coding schemes for a K-distributed multipath channel. The parameters of the FEC encoding layer are optimized by selecting the optimal error correction capability and the code block size. The results show the best parameter choice as a function of the link distance and received signal-to-noise ratio.

  19. An Ultra-Lightweight Encryption Scheme in Underwater Acoustic Networks

    Directory of Open Access Journals (Sweden)

    Chunyan Peng

    2016-01-01

    Full Text Available We tackle a fundamental security problem in underwater acoustic networks (UANs. The S-box in the existing block encryption algorithm is more energy consuming and unsuitable for resources-constrained UANs. In this paper, instead of S-box, we present a lightweight, 8-round iteration block cipher algorithm for UANs communication based on chaotic theory and increase the key space by changing the number of iteration round. We further propose secure network architecture of UANs. By analysis, our algorithm can resist brute-force searches and adversarial attacks. Simulation results show that, compared with traditional AES-128 and PRESENT algorithms, our cryptographic algorithm can make a good trade-off between security and overhead, has better energy efficiency, and applies to UANs.

  20. Chain-based communication in cylindrical underwater wireless sensor networks.

    Science.gov (United States)

    Javaid, Nadeem; Jafri, Mohsin Raza; Khan, Zahoor Ali; Alrajeh, Nabil; Imran, Muhammad; Vasilakos, Athanasios

    2015-02-04

    Appropriate network design is very significant for Underwater Wireless Sensor Networks (UWSNs). Application-oriented UWSNs are planned to achieve certain objectives. Therefore, there is always a demand for efficient data routing schemes, which can fulfill certain requirements of application-oriented UWSNs. These networks can be of any shape, i.e., rectangular, cylindrical or square. In this paper, we propose chain-based routing schemes for application-oriented cylindrical networks and also formulate mathematical models to find a global optimum path for data transmission. In the first scheme, we devise four interconnected chains of sensor nodes to perform data communication. In the second scheme, we propose routing scheme in which two chains of sensor nodes are interconnected, whereas in third scheme single-chain based routing is done in cylindrical networks. After finding local optimum paths in separate chains, we find global optimum paths through their interconnection. Moreover, we develop a computational model for the analysis of end-to-end delay. We compare the performance of the above three proposed schemes with that of Power Efficient Gathering System in Sensor Information Systems (PEGASIS) and Congestion adjusted PEGASIS (C-PEGASIS). Simulation results show that our proposed 4-chain based scheme performs better than the other selected schemes in terms of network lifetime, end-to-end delay, path loss, transmission loss, and packet sending rate.

  1. Chain-Based Communication in Cylindrical Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadeem Javaid

    2015-02-01

    Full Text Available Appropriate network design is very significant for Underwater Wireless Sensor Networks (UWSNs. Application-oriented UWSNs are planned to achieve certain objectives. Therefore, there is always a demand for efficient data routing schemes, which can fulfill certain requirements of application-oriented UWSNs. These networks can be of any shape, i.e., rectangular, cylindrical or square. In this paper, we propose chain-based routing schemes for application-oriented cylindrical networks and also formulate mathematical models to find a global optimum path for data transmission. In the first scheme, we devise four interconnected chains of sensor nodes to perform data communication. In the second scheme, we propose routing scheme in which two chains of sensor nodes are interconnected, whereas in third scheme single-chain based routing is done in cylindrical networks. After finding local optimum paths in separate chains, we find global optimum paths through their interconnection. Moreover, we develop a computational model for the analysis of end-to-end delay. We compare the performance of the above three proposed schemes with that of Power Efficient Gathering System in Sensor Information Systems (PEGASIS and Congestion adjusted PEGASIS (C-PEGASIS. Simulation results show that our proposed 4-chain based scheme performs better than the other selected schemes in terms of network lifetime, end-to-end delay, path loss, transmission loss, and packet sending rate.

  2. A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Khalid

    2017-01-01

    Full Text Available Underwater wireless sensor networks are a newly emerging wireless technology in which small size sensors with limited energy and limited memory and bandwidth are deployed in deep sea water and various monitoring operations like tactical surveillance, environmental monitoring, and data collection are performed through these tiny sensors. Underwater wireless sensor networks are used for the exploration of underwater resources, oceanographic data collection, flood or disaster prevention, tactical surveillance systems, and unmanned underwater vehicles. Sensor nodes consist of a small memory, a central processing unit, and an antenna. Underwater networks are much different from terrestrial sensor networks as radio waves cannot be used in underwater wireless sensor networks. Acoustic channels are used for communication in deep sea water. Acoustic signals have many limitations, such as limited bandwidth, higher end-to-end delay, network path loss, higher propagation delay, and dynamic topology. Usually, these limitations result in higher energy consumption with a smaller number of packets delivered. The main aim nowadays is to operate sensor nodes having a smaller battery for a longer time in the network. This survey has discussed the state-of-the-art localization based and localization-free routing protocols. Routing associated issues in the area of underwater wireless sensor networks have also been discussed.

  3. Localization with a mobile beacon in underwater acoustic sensor networks.

    Science.gov (United States)

    Lee, Sangho; Kim, Kiseon

    2012-01-01

    Localization is one of the most important issues associated with underwater acoustic sensor networks, especially when sensor nodes are randomly deployed. Given that it is difficult to deploy beacon nodes at predetermined locations, localization schemes with a mobile beacon on the sea surface or along the planned path are inherently convenient, accurate, and energy-efficient. In this paper, we propose a new range-free Localization with a Mobile Beacon (LoMoB). The mobile beacon periodically broadcasts a beacon message containing its location. Sensor nodes are individually localized by passively receiving the beacon messages without inter-node communications. For location estimation, a set of potential locations are obtained as candidates for a node's location and then the node's location is determined through the weighted mean of all the potential locations with the weights computed based on residuals.

  4. Localization with a Mobile Beacon in Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sangho Lee

    2012-04-01

    Full Text Available Localization is one of the most important issues associated with underwater acoustic sensor networks, especially when sensor nodes are randomly deployed. Given that it is difficult to deploy beacon nodes at predetermined locations, localization schemes with a mobile beacon on the sea surface or along the planned path are inherently convenient, accurate, and energy-efficient. In this paper, we propose a new range-free Localization with a Mobile Beacon (LoMoB. The mobile beacon periodically broadcasts a beacon message containing its location. Sensor nodes are individually localized by passively receiving the beacon messages without inter-node communications. For location estimation, a set of potential locations are obtained as candidates for a node’s location and then the node’s location is determined through the weighted mean of all the potential locations with the weights computed based on residuals.

  5. DE-Sync: A Doppler-Enhanced Time Synchronization for Mobile Underwater Sensor Networks.

    Science.gov (United States)

    Zhou, Feng; Wang, Qi; Nie, DongHu; Qiao, Gang

    2018-05-25

    Time synchronization is the foundation of cooperative work among nodes of underwater sensor networks; it takes a critical role in the research and application of underwater sensor networks. Although numerous time synchronization protocols have been proposed for terrestrial wireless sensor networks, they cannot be directly applied to underwater sensor networks. This is because most of them typically assume that the propagation delay among sensor nodes is negligible, which is not the case in underwater sensor networks. Time synchronization is mainly affected by a long propagation delay among sensor nodes due to the low propagation speed of acoustic signals. Furthermore, sensor nodes in underwater tend to experience some degree of mobility due to wind or ocean current, or some other nodes are on self-propelled vehicles, such as autonomous underwater vehicles (AUVs). In this paper, we propose a Doppler-enhanced time synchronization scheme for mobile underwater sensor networks, called DE-Sync. Our new scheme considers the effect of the clock skew during the process of estimating the Doppler scale factor and directly substitutes the Doppler scale factor into linear regression to achieve the estimation of the clock skew and offset. Simulation results show that DE-Sync outperforms existing time synchronization protocols in both accuracy and energy efficiency.

  6. Cooperative Opportunistic Pressure Based Routing for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadeem Javaid

    2017-03-01

    Full Text Available In this paper, three opportunistic pressure based routing techniques for underwater wireless sensor networks (UWSNs are proposed. The first one is the cooperative opportunistic pressure based routing protocol (Co-Hydrocast, second technique is the improved Hydrocast (improved-Hydrocast, and third one is the cooperative improved Hydrocast (Co-improved Hydrocast. In order to minimize lengthy routing paths between the source and the destination and to avoid void holes at the sparse networks, sensor nodes are deployed at different strategic locations. The deployment of sensor nodes at strategic locations assure the maximum monitoring of the network field. To conserve the energy consumption and minimize the number of hops, greedy algorithm is used to transmit data packets from the source to the destination. Moreover, the opportunistic routing is also exploited to avoid void regions by making backward transmissions to find reliable path towards the destination in the network. The relay cooperation mechanism is used for reliable data packet delivery, when signal to noise ratio (SNR of the received signal is not within the predefined threshold then the maximal ratio combining (MRC is used as a diversity technique to improve the SNR of the received signals at the destination. Extensive simulations validate that our schemes perform better in terms of packet delivery ratio and energy consumption than the existing technique; Hydrocast.

  7. Cooperative Opportunistic Pressure Based Routing for Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Javaid, Nadeem; Muhammad; Sher, Arshad; Abdul, Wadood; Niaz, Iftikhar Azim; Almogren, Ahmad; Alamri, Atif

    2017-03-19

    In this paper, three opportunistic pressure based routing techniques for underwater wireless sensor networks (UWSNs) are proposed. The first one is the cooperative opportunistic pressure based routing protocol (Co-Hydrocast), second technique is the improved Hydrocast (improved-Hydrocast), and third one is the cooperative improved Hydrocast (Co-improved Hydrocast). In order to minimize lengthy routing paths between the source and the destination and to avoid void holes at the sparse networks, sensor nodes are deployed at different strategic locations. The deployment of sensor nodes at strategic locations assure the maximum monitoring of the network field. To conserve the energy consumption and minimize the number of hops, greedy algorithm is used to transmit data packets from the source to the destination. Moreover, the opportunistic routing is also exploited to avoid void regions by making backward transmissions to find reliable path towards the destination in the network. The relay cooperation mechanism is used for reliable data packet delivery, when signal to noise ratio (SNR) of the received signal is not within the predefined threshold then the maximal ratio combining (MRC) is used as a diversity technique to improve the SNR of the received signals at the destination. Extensive simulations validate that our schemes perform better in terms of packet delivery ratio and energy consumption than the existing technique; Hydrocast.

  8. Totally opportunistic routing algorithm (TORA) for underwater wireless sensor network.

    Science.gov (United States)

    Rahman, Ziaur; Hashim, Fazirulhisyam; Rasid, Mohd Fadlee A; Othman, Mohamed

    2018-01-01

    Underwater Wireless Sensor Network (UWSN) has emerged as promising networking techniques to monitor and explore oceans. Research on acoustic communication has been conducted for decades, but had focused mostly on issues related to physical layer such as high latency, low bandwidth, and high bit error. However, data gathering process is still severely limited in UWSN due to channel impairment. One way to improve data collection in UWSN is the design of routing protocol. Opportunistic Routing (OR) is an emerging technique that has the ability to improve the performance of wireless network, notably acoustic network. In this paper, we propose an anycast, geographical and totally opportunistic routing algorithm for UWSN, called TORA. Our proposed scheme is designed to avoid horizontal transmission, reduce end to end delay, overcome the problem of void nodes and maximize throughput and energy efficiency. We use TOA (Time of Arrival) and range based equation to localize nodes recursively within a network. Once nodes are localized, their location coordinates and residual energy are used as a matrix to select the best available forwarder. All data packets may or may not be acknowledged based on the status of sender and receiver. Thus, the number of acknowledgments for a particular data packet may vary from zero to 2-hop. Extensive simulations were performed to evaluate the performance of the proposed scheme for high network traffic load under very sparse and very dense network scenarios. Simulation results show that TORA significantly improves the network performance when compared to some relevant existing routing protocols, such as VBF, HHVBF, VAPR, and H2DAB, for energy consumption, packet delivery ratio, average end-to-end delay, average hop-count and propagation deviation factor. TORA reduces energy consumption by an average of 35% of VBF, 40% of HH-VBF, 15% of VAPR, and 29% of H2DAB, whereas the packet delivery ratio has been improved by an average of 43% of VBF, 26

  9. Totally opportunistic routing algorithm (TORA) for underwater wireless sensor network

    Science.gov (United States)

    Hashim, Fazirulhisyam; Rasid, Mohd Fadlee A.; Othman, Mohamed

    2018-01-01

    Underwater Wireless Sensor Network (UWSN) has emerged as promising networking techniques to monitor and explore oceans. Research on acoustic communication has been conducted for decades, but had focused mostly on issues related to physical layer such as high latency, low bandwidth, and high bit error. However, data gathering process is still severely limited in UWSN due to channel impairment. One way to improve data collection in UWSN is the design of routing protocol. Opportunistic Routing (OR) is an emerging technique that has the ability to improve the performance of wireless network, notably acoustic network. In this paper, we propose an anycast, geographical and totally opportunistic routing algorithm for UWSN, called TORA. Our proposed scheme is designed to avoid horizontal transmission, reduce end to end delay, overcome the problem of void nodes and maximize throughput and energy efficiency. We use TOA (Time of Arrival) and range based equation to localize nodes recursively within a network. Once nodes are localized, their location coordinates and residual energy are used as a matrix to select the best available forwarder. All data packets may or may not be acknowledged based on the status of sender and receiver. Thus, the number of acknowledgments for a particular data packet may vary from zero to 2-hop. Extensive simulations were performed to evaluate the performance of the proposed scheme for high network traffic load under very sparse and very dense network scenarios. Simulation results show that TORA significantly improves the network performance when compared to some relevant existing routing protocols, such as VBF, HHVBF, VAPR, and H2DAB, for energy consumption, packet delivery ratio, average end-to-end delay, average hop-count and propagation deviation factor. TORA reduces energy consumption by an average of 35% of VBF, 40% of HH-VBF, 15% of VAPR, and 29% of H2DAB, whereas the packet delivery ratio has been improved by an average of 43% of VBF, 26

  10. A Probabilistic and Highly Efficient Topology Control Algorithm for Underwater Cooperating AUV Networks.

    Science.gov (United States)

    Li, Ning; Cürüklü, Baran; Bastos, Joaquim; Sucasas, Victor; Fernandez, Jose Antonio Sanchez; Rodriguez, Jonathan

    2017-05-04

    The aim of the Smart and Networking Underwater Robots in Cooperation Meshes (SWARMs) project is to make autonomous underwater vehicles (AUVs), remote operated vehicles (ROVs) and unmanned surface vehicles (USVs) more accessible and useful. To achieve cooperation and communication between different AUVs, these must be able to exchange messages, so an efficient and reliable communication network is necessary for SWARMs. In order to provide an efficient and reliable communication network for mission execution, one of the important and necessary issues is the topology control of the network of AUVs that are cooperating underwater. However, due to the specific properties of an underwater AUV cooperation network, such as the high mobility of AUVs, large transmission delays, low bandwidth, etc., the traditional topology control algorithms primarily designed for terrestrial wireless sensor networks cannot be used directly in the underwater environment. Moreover, these algorithms, in which the nodes adjust their transmission power once the current transmission power does not equal an optimal one, are costly in an underwater cooperating AUV network. Considering these facts, in this paper, we propose a Probabilistic Topology Control (PTC) algorithm for an underwater cooperating AUV network. In PTC, when the transmission power of an AUV is not equal to the optimal transmission power, then whether the transmission power needs to be adjusted or not will be determined based on the AUV's parameters. Each AUV determines their own transmission power adjustment probability based on the parameter deviations. The larger the deviation, the higher the transmission power adjustment probability is, and vice versa. For evaluating the performance of PTC, we combine the PTC algorithm with the Fuzzy logic Topology Control (FTC) algorithm and compare the performance of these two algorithms. The simulation results have demonstrated that the PTC is efficient at reducing the transmission power

  11. A Probabilistic and Highly Efficient Topology Control Algorithm for Underwater Cooperating AUV Networks

    Directory of Open Access Journals (Sweden)

    Ning Li

    2017-05-01

    Full Text Available The aim of the Smart and Networking Underwater Robots in Cooperation Meshes (SWARMs project is to make autonomous underwater vehicles (AUVs, remote operated vehicles (ROVs and unmanned surface vehicles (USVs more accessible and useful. To achieve cooperation and communication between different AUVs, these must be able to exchange messages, so an efficient and reliable communication network is necessary for SWARMs. In order to provide an efficient and reliable communication network for mission execution, one of the important and necessary issues is the topology control of the network of AUVs that are cooperating underwater. However, due to the specific properties of an underwater AUV cooperation network, such as the high mobility of AUVs, large transmission delays, low bandwidth, etc., the traditional topology control algorithms primarily designed for terrestrial wireless sensor networks cannot be used directly in the underwater environment. Moreover, these algorithms, in which the nodes adjust their transmission power once the current transmission power does not equal an optimal one, are costly in an underwater cooperating AUV network. Considering these facts, in this paper, we propose a Probabilistic Topology Control (PTC algorithm for an underwater cooperating AUV network. In PTC, when the transmission power of an AUV is not equal to the optimal transmission power, then whether the transmission power needs to be adjusted or not will be determined based on the AUV’s parameters. Each AUV determines their own transmission power adjustment probability based on the parameter deviations. The larger the deviation, the higher the transmission power adjustment probability is, and vice versa. For evaluating the performance of PTC, we combine the PTC algorithm with the Fuzzy logic Topology Control (FTC algorithm and compare the performance of these two algorithms. The simulation results have demonstrated that the PTC is efficient at reducing the

  12. The Abbott and Costello Effect: Who's on What, and What's Where When? A Human-Centered Method to Investigate Network Centric Warfare Systems

    National Research Council Canada - National Science Library

    Reed, Derek W

    2007-01-01

    ...), fundamentally changing how warfare is being conducted. Network centric warfare (NCW) systems are being rushed to the field and are offered as a solution for the fog of war and as a way to reduce manpower costs...

  13. A Novel Cooperative Opportunistic Routing Scheme for Underwater Sensor Networks.

    Science.gov (United States)

    Ghoreyshi, Seyed Mohammad; Shahrabi, Alireza; Boutaleb, Tuleen

    2016-02-26

    Increasing attention has recently been devoted to underwater sensor networks (UWSNs) because of their capabilities in the ocean monitoring and resource discovery. UWSNs are faced with different challenges, the most notable of which is perhaps how to efficiently deliver packets taking into account all of the constraints of the available acoustic communication channel. The opportunistic routing provides a reliable solution with the aid of intermediate nodes' collaboration to relay a packet toward the destination. In this paper, we propose a new routing protocol, called opportunistic void avoidance routing (OVAR), to address the void problem and also the energy-reliability trade-off in the forwarding set selection. OVAR takes advantage of distributed beaconing, constructs the adjacency graph at each hop and selects a forwarding set that holds the best trade-off between reliability and energy efficiency. The unique features of OVAR in selecting the candidate nodes in the vicinity of each other leads to the resolution of the hidden node problem. OVAR is also able to select the forwarding set in any direction from the sender, which increases its flexibility to bypass any kind of void area with the minimum deviation from the optimal path. The results of our extensive simulation study show that OVAR outperforms other protocols in terms of the packet delivery ratio, energy consumption, end-to-end delay, hop count and traversed distance.

  14. Cross Deployment Networking and Systematic Performance Analysis of Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhengxian Wei

    2017-07-01

    Full Text Available Underwater wireless sensor networks (UWSNs have become a new hot research area. However, due to the work dynamics and harsh ocean environment, how to obtain an UWSN with the best systematic performance while deploying as few sensor nodes as possible and setting up self-adaptive networking is an urgent problem that needs to be solved. Consequently, sensor deployment, networking, and performance calculation of UWSNs are challenging issues, hence the study in this paper centers on this topic and three relevant methods and models are put forward. Firstly, the normal body-centered cubic lattice to cross body-centered cubic lattice (CBCL has been improved, and a deployment process and topology generation method are built. Then most importantly, a cross deployment networking method (CDNM for UWSNs suitable for the underwater environment is proposed. Furthermore, a systematic quar-performance calculation model (SQPCM is proposed from an integrated perspective, in which the systematic performance of a UWSN includes coverage, connectivity, durability and rapid-reactivity. Besides, measurement models are established based on the relationship between systematic performance and influencing parameters. Finally, the influencing parameters are divided into three types, namely, constraint parameters, device performance and networking parameters. Based on these, a networking parameters adjustment method (NPAM for optimized systematic performance of UWSNs has been presented. The simulation results demonstrate that the approach proposed in this paper is feasible and efficient in networking and performance calculation of UWSNs.

  15. On the Impacts and Benefits of Implementing Full-Duplex Communications Links in an Underwater Acoustic Network

    National Research Council Canada - National Science Library

    Gibson, J; Larraza, A; Rice, J; Smith, K; Xie, G

    2002-01-01

    .... These networks may provide command and control for autonomous underwater vehicles, forward reporting by arrays of sensor grids, ad hoc communications links to covert forces, or positive control...

  16. Network lifetime-aware data collection in Underwater Sensor ...

    Indian Academy of Sciences (India)

    Jalaja Janardanan Kartha

    2017-09-07

    Sep 7, 2017 ... existing models to assess their effectiveness and to investigate the trade-offs. Results show ... coverage drops below a predefined threshold and (vi) connectivity is .... Cost Clustering Protocol (MCCP), Distributed Underwater.

  17. On the Performance of the Underwater Acoustic Sensor Networks

    Science.gov (United States)

    2015-05-01

    performance of UWSN. 5.1 Hardware and Software Details 5.1.1 Equipment Our experimental model consisted of an indoor swimming pool , two pairs...UWSN has many constraints mainly due to limited capacity, propagation loss, as well as power limitation since in underwater environment solar energy ...since in underwater environment solar energy cannot be used to recharge batteries. In our approach, we estimate the number of operating receivers

  18. Game Theory-Based Cooperation for Underwater Acoustic Sensor Networks: Taxonomy, Review, Research Challenges and Directions

    Directory of Open Access Journals (Sweden)

    Dalhatu Muhammed

    2018-02-01

    Full Text Available Exploring and monitoring the underwater world using underwater sensors is drawing a lot of attention these days. In this field cooperation between acoustic sensor nodes has been a critical problem due to the challenging features such as acoustic channel failure (sound signal, long propagation delay of acoustic signal, limited bandwidth and loss of connectivity. There are several proposed methods to improve cooperation between the nodes by incorporating information/game theory in the node’s cooperation. However, there is a need to classify the existing works and demonstrate their performance in addressing the cooperation issue. In this paper, we have conducted a review to investigate various factors affecting cooperation in underwater acoustic sensor networks. We study various cooperation techniques used for underwater acoustic sensor networks from different perspectives, with a concentration on communication reliability, energy consumption, and security and present a taxonomy for underwater cooperation. Moreover, we further review how the game theory can be applied to make the nodes cooperate with each other. We further analyze different cooperative game methods, where their performance on different metrics is compared. Finally, open issues and future research direction in underwater acoustic sensor networks are highlighted.

  19. Game Theory-Based Cooperation for Underwater Acoustic Sensor Networks: Taxonomy, Review, Research Challenges and Directions.

    Science.gov (United States)

    Muhammed, Dalhatu; Anisi, Mohammad Hossein; Zareei, Mahdi; Vargas-Rosales, Cesar; Khan, Anwar

    2018-02-01

    Exploring and monitoring the underwater world using underwater sensors is drawing a lot of attention these days. In this field cooperation between acoustic sensor nodes has been a critical problem due to the challenging features such as acoustic channel failure (sound signal), long propagation delay of acoustic signal, limited bandwidth and loss of connectivity. There are several proposed methods to improve cooperation between the nodes by incorporating information/game theory in the node's cooperation. However, there is a need to classify the existing works and demonstrate their performance in addressing the cooperation issue. In this paper, we have conducted a review to investigate various factors affecting cooperation in underwater acoustic sensor networks. We study various cooperation techniques used for underwater acoustic sensor networks from different perspectives, with a concentration on communication reliability, energy consumption, and security and present a taxonomy for underwater cooperation. Moreover, we further review how the game theory can be applied to make the nodes cooperate with each other. We further analyze different cooperative game methods, where their performance on different metrics is compared. Finally, open issues and future research direction in underwater acoustic sensor networks are highlighted.

  20. Game Theory-Based Cooperation for Underwater Acoustic Sensor Networks: Taxonomy, Review, Research Challenges and Directions

    Science.gov (United States)

    Muhammed, Dalhatu; Anisi, Mohammad Hossein; Vargas-Rosales, Cesar; Khan, Anwar

    2018-01-01

    Exploring and monitoring the underwater world using underwater sensors is drawing a lot of attention these days. In this field cooperation between acoustic sensor nodes has been a critical problem due to the challenging features such as acoustic channel failure (sound signal), long propagation delay of acoustic signal, limited bandwidth and loss of connectivity. There are several proposed methods to improve cooperation between the nodes by incorporating information/game theory in the node’s cooperation. However, there is a need to classify the existing works and demonstrate their performance in addressing the cooperation issue. In this paper, we have conducted a review to investigate various factors affecting cooperation in underwater acoustic sensor networks. We study various cooperation techniques used for underwater acoustic sensor networks from different perspectives, with a concentration on communication reliability, energy consumption, and security and present a taxonomy for underwater cooperation. Moreover, we further review how the game theory can be applied to make the nodes cooperate with each other. We further analyze different cooperative game methods, where their performance on different metrics is compared. Finally, open issues and future research direction in underwater acoustic sensor networks are highlighted. PMID:29389874

  1. Localization of an Underwater Control Network Based on Quasi-Stable Adjustment

    Science.gov (United States)

    Chen, Xinhua; Zhang, Hongmei; Feng, Jie

    2018-01-01

    There exists a common problem in the localization of underwater control networks that the precision of the absolute coordinates of known points obtained by marine absolute measurement is poor, and it seriously affects the precision of the whole network in traditional constraint adjustment. Therefore, considering that the precision of underwater baselines is good, we use it to carry out quasi-stable adjustment to amend known points before constraint adjustment so that the points fit the network shape better. In addition, we add unconstrained adjustment for quality control of underwater baselines, the observations of quasi-stable adjustment and constrained adjustment, to eliminate the unqualified baselines and improve the results’ accuracy of the two adjustments. Finally, the modified method is applied to a practical LBL (Long Baseline) experiment and obtains a mean point location precision of 0.08 m, which improves by 38% compared with the traditional method. PMID:29570627

  2. Efficient Data Gathering in 3D Linear Underwater Wireless Sensor Networks Using Sink Mobility.

    Science.gov (United States)

    Akbar, Mariam; Javaid, Nadeem; Khan, Ayesha Hussain; Imran, Muhammad; Shoaib, Muhammad; Vasilakos, Athanasios

    2016-03-19

    Due to the unpleasant and unpredictable underwater environment, designing an energy-efficient routing protocol for underwater wireless sensor networks (UWSNs) demands more accuracy and extra computations. In the proposed scheme, we introduce a mobile sink (MS), i.e., an autonomous underwater vehicle (AUV), and also courier nodes (CNs), to minimize the energy consumption of nodes. MS and CNs stop at specific stops for data gathering; later on, CNs forward the received data to the MS for further transmission. By the mobility of CNs and MS, the overall energy consumption of nodes is minimized. We perform simulations to investigate the performance of the proposed scheme and compare it to preexisting techniques. Simulation results are compared in terms of network lifetime, throughput, path loss, transmission loss and packet drop ratio. The results show that the proposed technique performs better in terms of network lifetime, throughput, path loss and scalability.

  3. Efficient Data Gathering in 3D Linear Underwater Wireless Sensor Networks Using Sink Mobility

    Directory of Open Access Journals (Sweden)

    Mariam Akbar

    2016-03-01

    Full Text Available Due to the unpleasant and unpredictable underwater environment, designing an energy-efficient routing protocol for underwater wireless sensor networks (UWSNs demands more accuracy and extra computations. In the proposed scheme, we introduce a mobile sink (MS, i.e., an autonomous underwater vehicle (AUV, and also courier nodes (CNs, to minimize the energy consumption of nodes. MS and CNs stop at specific stops for data gathering; later on, CNs forward the received data to the MS for further transmission. By the mobility of CNs and MS, the overall energy consumption of nodes is minimized. We perform simulations to investigate the performance of the proposed scheme and compare it to preexisting techniques. Simulation results are compared in terms of network lifetime, throughput, path loss, transmission loss and packet drop ratio. The results show that the proposed technique performs better in terms of network lifetime, throughput, path loss and scalability.

  4. An Environment-Friendly Multipath Routing Protocol for Underwater Acoustic Sensor Network

    Directory of Open Access Journals (Sweden)

    Yun Li

    2017-01-01

    Full Text Available Underwater Acoustic Sensor Network (UASN is a promising technique by facilitating a wide range of aquatic applications. However, routing scheme in UASN is a challenging task because of the characteristics of the nodes mobility, interruption of link, and interference caused by other underwater acoustic systems such as marine mammals. In order to achieve reliable data delivery in UASN, in this work, we present a disjoint multipath disruption-tolerant routing protocol for UASN (ENMR, which incorporates the Hue, Saturation, and Value color space (HSV model to establish routing paths to greedily forward data packets to sink nodes. ENMR applies the mechanism to maintain the network topology. Simulation results show that, compared with the classic underwater routing protocols named PVBF, ENMR can improve packet delivery ratio and reduce network latency while avoiding introducing additional energy consumption.

  5. Monitoring Coral Growth - the Dichotomy Between Underwater Photogrammetry and Geodetic Control Network

    Science.gov (United States)

    Neyer, F.; Nocerino, E.; Gruen, A.

    2018-05-01

    Creating 3-dimensional (3D) models of underwater scenes has become a common approach for monitoring coral reef changes and its structural complexity. Also in underwater archeology, 3D models are often created using underwater optical imagery. In this paper, we focus on the aspect of detecting small changes in the coral reef using a multi-temporal photogrammetric modelling approach, which requires a high quality control network. We show that the quality of a good geodetic network limits the direct change detection, i.e., without any further registration process. As the photogrammetric accuracy is expected to exceed the geodetic network accuracy by at least one order of magnitude, we suggest to do a fine registration based on a number of signalized points. This work is part of the Moorea Island Digital Ecosystem Avatar (IDEA) project that has been initiated in 2013 by a group of international researchers (https://mooreaidea.ethz.ch/).

  6. Energy Harvesting Hybrid Acoustic-Optical Underwater Wireless Sensor Networks Localization.

    Science.gov (United States)

    Saeed, Nasir; Celik, Abdulkadir; Al-Naffouri, Tareq Y; Alouini, Mohamed-Slim

    2017-12-26

    Underwater wireless technologies demand to transmit at higher data rate for ocean exploration. Currently, large coverage is achieved by acoustic sensor networks with low data rate, high cost, high latency, high power consumption, and negative impact on marine mammals. Meanwhile, optical communication for underwater networks has the advantage of the higher data rate albeit for limited communication distances. Moreover, energy consumption is another major problem for underwater sensor networks, due to limited battery power and difficulty in replacing or recharging the battery of a sensor node. The ultimate solution to this problem is to add energy harvesting capability to the acoustic-optical sensor nodes. Localization of underwater sensor networks is of utmost importance because the data collected from underwater sensor nodes is useful only if the location of the nodes is known. Therefore, a novel localization technique for energy harvesting hybrid acoustic-optical underwater wireless sensor networks (AO-UWSNs) is proposed. AO-UWSN employs optical communication for higher data rate at a short transmission distance and employs acoustic communication for low data rate and long transmission distance. A hybrid received signal strength (RSS) based localization technique is proposed to localize the nodes in AO-UWSNs. The proposed technique combines the noisy RSS based measurements from acoustic communication and optical communication and estimates the final locations of acoustic-optical sensor nodes. A weighted multiple observations paradigm is proposed for hybrid estimated distances to suppress the noisy observations and give more importance to the accurate observations. Furthermore, the closed form solution for Cramer-Rao lower bound (CRLB) is derived for localization accuracy of the proposed technique.

  7. Energy Harvesting Hybrid Acoustic-Optical Underwater Wireless Sensor Networks Localization

    KAUST Repository

    Saeed, Nasir

    2017-12-26

    Underwater wireless technologies demand to transmit at higher data rate for ocean exploration. Currently, large coverage is achieved by acoustic sensor networks with low data rate, high cost, high latency, high power consumption, and negative impact on marine mammals. Meanwhile, optical communication for underwater networks has the advantage of the higher data rate albeit for limited communication distances. Moreover, energy consumption is another major problem for underwater sensor networks, due to limited battery power and difficulty in replacing or recharging the battery of a sensor node. The ultimate solution to this problem is to add energy harvesting capability to the acoustic-optical sensor nodes. Localization of underwater sensor networks is of utmost importance because the data collected from underwater sensor nodes is useful only if the location of the nodes is known. Therefore, a novel localization technique for energy harvesting hybrid acoustic-optical underwater wireless sensor networks (AO-UWSNs) is proposed. AO-UWSN employs optical communication for higher data rate at a short transmission distance and employs acoustic communication for low data rate and long transmission distance. A hybrid received signal strength (RSS) based localization technique is proposed to localize the nodes in AO-UWSNs. The proposed technique combines the noisy RSS based measurements from acoustic communication and optical communication and estimates the final locations of acoustic-optical sensor nodes. A weighted multiple observations paradigm is proposed for hybrid estimated distances to suppress the noisy observations and give more importance to the accurate observations. Furthermore, the closed form solution for Cramer-Rao lower bound (CRLB) is derived for localization accuracy of the proposed technique.

  8. Energy Harvesting Hybrid Acoustic-Optical Underwater Wireless Sensor Networks Localization

    Directory of Open Access Journals (Sweden)

    Nasir Saeed

    2017-12-01

    Full Text Available Underwater wireless technologies demand to transmit at higher data rate for ocean exploration. Currently, large coverage is achieved by acoustic sensor networks with low data rate, high cost, high latency, high power consumption, and negative impact on marine mammals. Meanwhile, optical communication for underwater networks has the advantage of the higher data rate albeit for limited communication distances. Moreover, energy consumption is another major problem for underwater sensor networks, due to limited battery power and difficulty in replacing or recharging the battery of a sensor node. The ultimate solution to this problem is to add energy harvesting capability to the acoustic-optical sensor nodes. Localization of underwater sensor networks is of utmost importance because the data collected from underwater sensor nodes is useful only if the location of the nodes is known. Therefore, a novel localization technique for energy harvesting hybrid acoustic-optical underwater wireless sensor networks (AO-UWSNs is proposed. AO-UWSN employs optical communication for higher data rate at a short transmission distance and employs acoustic communication for low data rate and long transmission distance. A hybrid received signal strength (RSS based localization technique is proposed to localize the nodes in AO-UWSNs. The proposed technique combines the noisy RSS based measurements from acoustic communication and optical communication and estimates the final locations of acoustic-optical sensor nodes. A weighted multiple observations paradigm is proposed for hybrid estimated distances to suppress the noisy observations and give more importance to the accurate observations. Furthermore, the closed form solution for Cramer-Rao lower bound (CRLB is derived for localization accuracy of the proposed technique.

  9. Energy Harvesting Hybrid Acoustic-Optical Underwater Wireless Sensor Networks Localization

    KAUST Repository

    Saeed, Nasir; Celik, Abdulkadir; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    Underwater wireless technologies demand to transmit at higher data rate for ocean exploration. Currently, large coverage is achieved by acoustic sensor networks with low data rate, high cost, high latency, high power consumption, and negative impact on marine mammals. Meanwhile, optical communication for underwater networks has the advantage of the higher data rate albeit for limited communication distances. Moreover, energy consumption is another major problem for underwater sensor networks, due to limited battery power and difficulty in replacing or recharging the battery of a sensor node. The ultimate solution to this problem is to add energy harvesting capability to the acoustic-optical sensor nodes. Localization of underwater sensor networks is of utmost importance because the data collected from underwater sensor nodes is useful only if the location of the nodes is known. Therefore, a novel localization technique for energy harvesting hybrid acoustic-optical underwater wireless sensor networks (AO-UWSNs) is proposed. AO-UWSN employs optical communication for higher data rate at a short transmission distance and employs acoustic communication for low data rate and long transmission distance. A hybrid received signal strength (RSS) based localization technique is proposed to localize the nodes in AO-UWSNs. The proposed technique combines the noisy RSS based measurements from acoustic communication and optical communication and estimates the final locations of acoustic-optical sensor nodes. A weighted multiple observations paradigm is proposed for hybrid estimated distances to suppress the noisy observations and give more importance to the accurate observations. Furthermore, the closed form solution for Cramer-Rao lower bound (CRLB) is derived for localization accuracy of the proposed technique.

  10. Russian Perspectives on Network-Centric Warfare: The Key Aim of Serdyukov’s Reform

    Science.gov (United States)

    2011-01-01

    has faced with its GLObal’naya NAvigatsionnaya Sputnikovaya Sistema —(GLONASS) system, and introducing advanced digitized communications in the armed...of targeting data will be accomplished by organizing virtual channels for data transmission or via a web -portal. The successful function- ing of the...Operations: Tactical Web Takes Shape,” Signal, November 2003; Col. Alan D. Campen, USAF (Ret.), “Look Closely At Network-Centric Warfare: Technology Can

  11. A Survey on Underwater Wireless Sensor Networks: Progresses, Applications, and Challenges

    Directory of Open Access Journals (Sweden)

    Premalatha J.

    2016-01-01

    Full Text Available The endangered underwater species always drew the attention of the scientific society since their disappearance would cause irreplaceable loss. Asia is home to some of the most diverse habitats in the earth, but it is estimated that more than one in four species are endangered. In Underwater, a lot of factors are putting marine life under immense pressure. Extreme population pressure is leading to pollution, over-fishing and the devastation of crucial habitats. Consequently, the numbers of almost all fish are declining and many are already endangered. To help these species to survive, their habitat should be strictly protected. This can be achieved by strictly monitoring them. During this course, several parameters, constraints about the species and its environments are focused. Now, advances in sensor technology facilitate the monitoring of species and their habitat with less expenditure. Indeed, the increasing sophistication of underwater wireless sensors offers chances that enable new challenges in a lot of areas, like surveillance one. This paper endorses the use of sensors for monitoring underwater species endangered in their habitat. This paper further examines the key approaches and challenges in the design and implementation of underwater wireless sensor networks. We summarize major applications and the main phenomena related to acoustic propagation, and discuss how they affect the design and operation of communication systems and networking protocols at various layers.

  12. Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers

    NARCIS (Netherlands)

    Climent, S.; Sanchez, A.; Capella, J.V.; Meratnia, Nirvana; Serrano, J.J.

    2014-01-01

    This survey aims to provide a comprehensive overview of the current research on underwater wireless sensor networks, focusing on the lower layers of the communication stack, and envisions future trends and challenges. It analyzes the current state-of-the-art on the physical, medium access control

  13. Scheduled MAC in Beacon Overlay Networks for Underwater Localization and Time-Synchronization

    NARCIS (Netherlands)

    van Kleunen, W.A.P.; Meratnia, Nirvana; Havinga, Paul J.M.

    2011-01-01

    In this article we introduce a MAC protocol designed for underwater localization and time-synchronisation. The MAC protocol assumes a network of static reference nodes and allows blind nodes to be localized by listening-only to the beacon messages. Such a system is known to be very scalable. We show

  14. A matched Bow-tie antenna at 433MHz for use in underwater wireless sensor networks

    International Nuclear Information System (INIS)

    Abdou, A A; Shaw, A; Mason, A; Al-Shamma'a, A; Cullen, J; Wylie, S; Diallo, M

    2013-01-01

    Electromagnetic (EM) wave propagation underwater is been disregarded because of attenuation at high frequencies, however the theory predicts that propagation is possible at some useful distance in the lower Industrial, Scientific and Medical (ISM) band. Common transceivers rely on narrowband antennas and matching circuit. The aim of this paper is to design a broadband 433MHz bow-tie antenna and experiment it in air and water without a matching circuit. This antenna could be attached to wireless transceivers and form a Wireless Sensor Network for deployment in various underwater applications. The bow-tie antennas were designed, simulated and constructed in laboratory. Experiments were setup carefully by using a completely isolated transmitter from electronics to avoid airborne transmission. The 433MHz. bow-tie proved its suitability for use in Underwater.

  15. Blind equalization for underwater communications

    NARCIS (Netherlands)

    Blom, K.C.H.

    2014-01-01

    Underwater wireless (sensor) networks would vastly improve man's ability to explore and exploit remote aquatic environments. Despite underwater sensor and vehicle technology being relatively mature, underwater communications is still a major challenge. The most challenging characteristics of the

  16. Fighting Networks: The Defining Challenge of Irregular Warfare

    Science.gov (United States)

    2011-06-01

    fighting networks, different skills allow for increased operational complexity. Lawrence and Lorsch found that organizations in more uncertain...Uncertainty in the Face of Risk,” in Cooperation and Prosocial Behavior, ed. Robert Hindle and Jo Groebel (New York: Cambridge University Press, 1991...simplistic to describe al-Qaeda as a guerrilla organization as they have transcended traditional practices by their skilled utilization of the network form

  17. Secure Cooperation of Autonomous Mobile Sensors Using an Underwater Acoustic Network

    Directory of Open Access Journals (Sweden)

    Gianluca Dini

    2012-02-01

    Full Text Available Methodologies and algorithms are presented for the secure cooperation of a team of autonomous mobile underwater sensors, connected through an acoustic communication network, within surveillance and patrolling applications. In particular, the work proposes a cooperative algorithm in which the mobile underwater sensors (installed on Autonomous Underwater Vehicles—AUVs respond to simple local rules based on the available information to perform the mission and maintain the communication link with the network (behavioral approach. The algorithm is intrinsically robust: with loss of communication among the vehicles the coverage performance (i.e., the mission goal is degraded but not lost. The ensuing form of graceful degradation provides also a reactive measure against Denial of Service. The cooperative algorithm relies on the fact that the available information from the other sensors, though not necessarily complete, is trustworthy. To ensure trustworthiness, a security suite has been designed, specifically oriented to the underwater scenario, and in particular with the goal of reducing the communication overhead introduced by security in terms of number and size of messages. The paper gives implementation details on the integration between the security suite and the cooperative algorithm and provides statistics on the performance of the system as collected during the UAN project sea trial held in Trondheim, Norway, in May 2011.

  18. An Efficient Data-Gathering Routing Protocol for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadeem Javaid

    2015-11-01

    Full Text Available Most applications of underwater wireless sensor networks (UWSNs demand reliable data delivery over a longer period in an efficient and timely manner. However, the harsh and unpredictable underwater environment makes routing more challenging as compared to terrestrial WSNs. Most of the existing schemes deploy mobile sensors or a mobile sink (MS to maximize data gathering. However, the relatively high deployment cost prevents their usage in most applications. Thus, this paper presents an autonomous underwater vehicle (AUV-aided efficient data-gathering (AEDG routing protocol for reliable data delivery in UWSNs. To prolong the network lifetime, AEDG employs an AUV for data collection from gateways and uses a shortest path tree (SPT algorithm while associating sensor nodes with the gateways. The AEDG protocol also limits the number of associated nodes with the gateway nodes to minimize the network energy consumption and to prevent the gateways from overloading. Moreover, gateways are rotated with the passage of time to balance the energy consumption of the network. To prevent data loss, AEDG allows dynamic data collection at the AUV depending on the limited number of member nodes that are associated with each gateway. We also develop a sub-optimal elliptical trajectory of AUV by using a connected dominating set (CDS to further facilitate network throughput maximization. The performance of the AEDG is validated via simulations, which demonstrate the effectiveness of AEDG in comparison to two existing UWSN routing protocols in terms of the selected performance metrics.

  19. An Efficient Data-Gathering Routing Protocol for Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Javaid, Nadeem; Ilyas, Naveed; Ahmad, Ashfaq; Alrajeh, Nabil; Qasim, Umar; Khan, Zahoor Ali; Liaqat, Tayyaba; Khan, Majid Iqbal

    2015-11-17

    Most applications of underwater wireless sensor networks (UWSNs) demand reliable data delivery over a longer period in an efficient and timely manner. However, the harsh and unpredictable underwater environment makes routing more challenging as compared to terrestrial WSNs. Most of the existing schemes deploy mobile sensors or a mobile sink (MS) to maximize data gathering. However, the relatively high deployment cost prevents their usage in most applications. Thus, this paper presents an autonomous underwater vehicle (AUV)-aided efficient data-gathering (AEDG) routing protocol for reliable data delivery in UWSNs. To prolong the network lifetime, AEDG employs an AUV for data collection from gateways and uses a shortest path tree (SPT) algorithm while associating sensor nodes with the gateways. The AEDG protocol also limits the number of associated nodes with the gateway nodes to minimize the network energy consumption and to prevent the gateways from overloading. Moreover, gateways are rotated with the passage of time to balance the energy consumption of the network. To prevent data loss, AEDG allows dynamic data collection at the AUV depending on the limited number of member nodes that are associated with each gateway. We also develop a sub-optimal elliptical trajectory of AUV by using a connected dominating set (CDS) to further facilitate network throughput maximization. The performance of the AEDG is validated via simulations, which demonstrate the effectiveness of AEDG in comparison to two existing UWSN routing protocols in terms of the selected performance metrics.

  20. A Localization Based Cooperative Routing Protocol for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nadeem Javaid

    2017-01-01

    Full Text Available Localization is one of the major aspects in underwater wireless sensor networks (UWSNs. Therefore, it is important to know the accurate position of the sensor node in large scale applications like disaster prevention, tactical surveillance, and monitoring. Due to the inefficiency of the global positioning system (GPS in UWSN, it is very difficult to localize a node in underwater environment compared to terrestrial networks. To minimize the localization error and enhance the localization coverage of the network, two routing protocols are proposed; the first one is mobile autonomous underwater vehicle (MobiL-AUV and the second one is cooperative MobiL (CO-MobiL. In MobiL-AUV, AUVs are deployed and equipped with GPS and act as reference nodes. These reference nodes are used to localize all the nonlocalized ordinary sensor nodes in order to reduce the localization error and maximize the network coverage. CO-MobiL is presented in order to improve the network throughput by using the maximal ratio combining (MRC as diversity technique which combines both signals, received from the source and received from the relay at the destination. It uses amplify-and-forward (AF mechanism to improve the signal between the source and the destination. To support our claims, extensive simulations are performed.

  1. Dynamics of the congestion control model in underwater wireless sensor networks with time delay

    International Nuclear Information System (INIS)

    Dong, Tao; Hu, Wenjie; Liao, Xiaofeng

    2016-01-01

    In this paper, a congestion control model in underwater wireless sensor network with time delay is considered. First, the boundedness of the positive equilibrium, where the samples density is positive for each node and the different event flows coexist, is investigated, which implies that the samples density of sensor node cannot exceed the Environmental carrying capacity. Then, by considering the time delay can be regarded as a bifurcating parameter, the dynamical behaviors, which include local stability and Hopf bifurcation, are investigated. It is found that when the communication time delay passes a critical value, the system loses its stability and a Hopf bifurcation occurs, which means the underwater wireless sensor network will be congested, even collapsed. Furthermore, the direction and stability of the bifurcating periodic solutions are derived by applying the normal form theory and the center manifold theorem. Finally, some numerical examples are finally performed to verify the theoretical results.

  2. An OFDM Receiver with Frequency Domain Diversity Combined Impulsive Noise Canceller for Underwater Network

    Science.gov (United States)

    Saotome, Rie; Hai, Tran Minh; Matsuda, Yasuto; Suzuki, Taisaku; Wada, Tomohisa

    2015-01-01

    In order to explore marine natural resources using remote robotic sensor or to enable rapid information exchange between ROV (remotely operated vehicles), AUV (autonomous underwater vehicle), divers, and ships, ultrasonic underwater communication systems are used. However, if the communication system is applied to rich living creature marine environment such as shallow sea, it suffers from generated Impulsive Noise so-called Shrimp Noise, which is randomly generated in time domain and seriously degrades communication performance in underwater acoustic network. With the purpose of supporting high performance underwater communication, a robust digital communication method for Impulsive Noise environments is necessary. In this paper, we propose OFDM ultrasonic communication system with diversity receiver. The main feature of the receiver is a newly proposed Frequency Domain Diversity Combined Impulsive Noise Canceller. The OFDM receiver utilizes 20–28 KHz ultrasonic channel and subcarrier spacing of 46.875 Hz (MODE3) and 93.750 Hz (MODE2) OFDM modulations. In addition, the paper shows Impulsive Noise distribution data measured at a fishing port in Okinawa and at a barge in Shizuoka prefectures and then proposed diversity OFDM transceivers architecture and experimental results are described. By the proposed Impulsive Noise Canceller, frame bit error rate has been decreased by 20–30%. PMID:26351656

  3. An OFDM Receiver with Frequency Domain Diversity Combined Impulsive Noise Canceller for Underwater Network.

    Science.gov (United States)

    Saotome, Rie; Hai, Tran Minh; Matsuda, Yasuto; Suzuki, Taisaku; Wada, Tomohisa

    2015-01-01

    In order to explore marine natural resources using remote robotic sensor or to enable rapid information exchange between ROV (remotely operated vehicles), AUV (autonomous underwater vehicle), divers, and ships, ultrasonic underwater communication systems are used. However, if the communication system is applied to rich living creature marine environment such as shallow sea, it suffers from generated Impulsive Noise so-called Shrimp Noise, which is randomly generated in time domain and seriously degrades communication performance in underwater acoustic network. With the purpose of supporting high performance underwater communication, a robust digital communication method for Impulsive Noise environments is necessary. In this paper, we propose OFDM ultrasonic communication system with diversity receiver. The main feature of the receiver is a newly proposed Frequency Domain Diversity Combined Impulsive Noise Canceller. The OFDM receiver utilizes 20-28 KHz ultrasonic channel and subcarrier spacing of 46.875 Hz (MODE3) and 93.750 Hz (MODE2) OFDM modulations. In addition, the paper shows Impulsive Noise distribution data measured at a fishing port in Okinawa and at a barge in Shizuoka prefectures and then proposed diversity OFDM transceivers architecture and experimental results are described. By the proposed Impulsive Noise Canceller, frame bit error rate has been decreased by 20-30%.

  4. An OFDM Receiver with Frequency Domain Diversity Combined Impulsive Noise Canceller for Underwater Network

    Directory of Open Access Journals (Sweden)

    Rie Saotome

    2015-01-01

    Full Text Available In order to explore marine natural resources using remote robotic sensor or to enable rapid information exchange between ROV (remotely operated vehicles, AUV (autonomous underwater vehicle, divers, and ships, ultrasonic underwater communication systems are used. However, if the communication system is applied to rich living creature marine environment such as shallow sea, it suffers from generated Impulsive Noise so-called Shrimp Noise, which is randomly generated in time domain and seriously degrades communication performance in underwater acoustic network. With the purpose of supporting high performance underwater communication, a robust digital communication method for Impulsive Noise environments is necessary. In this paper, we propose OFDM ultrasonic communication system with diversity receiver. The main feature of the receiver is a newly proposed Frequency Domain Diversity Combined Impulsive Noise Canceller. The OFDM receiver utilizes 20–28 KHz ultrasonic channel and subcarrier spacing of 46.875 Hz (MODE3 and 93.750 Hz (MODE2 OFDM modulations. In addition, the paper shows Impulsive Noise distribution data measured at a fishing port in Okinawa and at a barge in Shizuoka prefectures and then proposed diversity OFDM transceivers architecture and experimental results are described. By the proposed Impulsive Noise Canceller, frame bit error rate has been decreased by 20–30%.

  5. Underwater Inherent Optical Properties Estimation Using a Depth Aided Deep Neural Network

    Directory of Open Access Journals (Sweden)

    Zhibin Yu

    2017-01-01

    Full Text Available Underwater inherent optical properties (IOPs are the fundamental clues to many research fields such as marine optics, marine biology, and underwater vision. Currently, beam transmissometers and optical sensors are considered as the ideal IOPs measuring methods. But these methods are inflexible and expensive to be deployed. To overcome this problem, we aim to develop a novel measuring method using only a single underwater image with the help of deep artificial neural network. The power of artificial neural network has been proved in image processing and computer vision fields with deep learning technology. However, image-based IOPs estimation is a quite different and challenging task. Unlike the traditional applications such as image classification or localization, IOP estimation looks at the transparency of the water between the camera and the target objects to estimate multiple optical properties simultaneously. In this paper, we propose a novel Depth Aided (DA deep neural network structure for IOPs estimation based on a single RGB image that is even noisy. The imaging depth information is considered as an aided input to help our model make better decision.

  6. Underwater Inherent Optical Properties Estimation Using a Depth Aided Deep Neural Network.

    Science.gov (United States)

    Yu, Zhibin; Wang, Yubo; Zheng, Bing; Zheng, Haiyong; Wang, Nan; Gu, Zhaorui

    2017-01-01

    Underwater inherent optical properties (IOPs) are the fundamental clues to many research fields such as marine optics, marine biology, and underwater vision. Currently, beam transmissometers and optical sensors are considered as the ideal IOPs measuring methods. But these methods are inflexible and expensive to be deployed. To overcome this problem, we aim to develop a novel measuring method using only a single underwater image with the help of deep artificial neural network. The power of artificial neural network has been proved in image processing and computer vision fields with deep learning technology. However, image-based IOPs estimation is a quite different and challenging task. Unlike the traditional applications such as image classification or localization, IOP estimation looks at the transparency of the water between the camera and the target objects to estimate multiple optical properties simultaneously. In this paper, we propose a novel Depth Aided (DA) deep neural network structure for IOPs estimation based on a single RGB image that is even noisy. The imaging depth information is considered as an aided input to help our model make better decision.

  7. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    Science.gov (United States)

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  8. Toward a Mobility-Driven Architecture for Multimodal Underwater Networking

    Science.gov (United States)

    2017-02-01

    correspondence to high-level functionalities defined in the classical OSI model ...the Network and Transport layers of the Open Systems Interconnection ( OSI ) model . Specific technology requirements are mentioned as required. Before...functional layers of MobArch and their correspondence to high-level functionalities defined in the classical OSI model . 4.1 NETWORKING LAYER This

  9. Event Coverage Detection and Event Source Determination in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhangbing Zhou

    2015-12-01

    Full Text Available With the advent of the Internet of Underwater Things, smart things are deployed in the ocean space and establish underwater wireless sensor networks for the monitoring of vast and dynamic underwater environments. When events are found to have possibly occurred, accurate event coverage should be detected, and potential event sources should be determined for the enactment of prompt and proper responses. To address this challenge, a technique that detects event coverage and determines event sources is developed in this article. Specifically, the occurrence of possible events corresponds to a set of neighboring sensor nodes whose sensory data may deviate from a normal sensing range in a collective fashion. An appropriate sensor node is selected as the relay node for gathering and routing sensory data to sink node(s. When sensory data are collected at sink node(s, the event coverage is detected and represented as a weighted graph, where the vertices in this graph correspond to sensor nodes and the weight specified upon the edges reflects the extent of sensory data deviating from a normal sensing range. Event sources are determined, which correspond to the barycenters in this graph. The results of the experiments show that our technique is more energy efficient, especially when the network topology is relatively steady.

  10. Social networks as a new tool of information warfare in the modern world

    Directory of Open Access Journals (Sweden)

    B. W. Kovalevych

    2014-03-01

    Full Text Available With the rapid development of information technologies, especially the Internet, people are becoming increasingly dependent on information that surrounds them. And social networks, where a person spends most of their time, become the ideal instruments of influence on the people consciousness and information warfare. Due to psychological factors ( such as ‘spiral of silence’, the herd instinct, the entire credibility of published information, opinion leaders, the desire for self­realization or replacement of reality that influence the human behavior in the network and the use of models of influence (model of network attack, model of involving users as volunteers, total block model, social networks become a platform for the dissemination of political ideas, ideologies and implementation of the ‘color revolutions’. However, social media play a positive role, especially in the establishment of civil society and the free flow of information. Positive or negative impact of networks primary depends on the purpose of use of social networking tools.

  11. Self-generation of controller of an underwater robot with neural network

    International Nuclear Information System (INIS)

    Suto, T.; Ura, T.

    1994-01-01

    A self-organizing controller system is constructed based on artificial neural networks and applied to constant altitude swimming of the autonomous underwater robot PTEROA 150. The system consists of a controller and a forward model which calculates the values for evaluation as a result of control. Some methods are introduced for quick and appropriate adjustment of the controller network. Modification of the controller network is executed based on error-back-propagation method utilizing the forward model network. The forward model is divided into three sub-networks which represent dynamics of the vehicle, estimation of relative position to the seabed and calculation of the altitude. The proposed adaptive system is demonstrated in computer simulations where objective of a vehicle is keeping a constant altitude from seabed which is constituted of triangular ridges

  12. A scalable global positioning system-free localization scheme for underwater wireless sensor networks

    KAUST Repository

    Mohammed, A.M.

    2013-05-07

    Seaweb is an acoustic communication technology that enables communication between sensor nodes. Seaweb technology utilizes the commercially available telesonar modems that has developed link and network layer firmware to provide a robust undersea communication capability. Seaweb interconnects the underwater nodes through digital signal processing-based modem by using acoustic links between the neighboring sensors. In this paper, we design and investigate a global positioning system-free passive localization protocol by integrating the innovations of levelling and localization with the Seaweb technology. This protocol uses the range data and planar trigonometry principles to estimate the positions of the underwater sensor nodes. Moreover, for precise localization, we consider more realistic conditions namely, (a) small displacement of sensor nodes due to watch circles and (b) deployment of sensor nodes over non-uniform water surface. Once the nodes are localized, we divide the whole network field into circular levels and sectors to minimize the traffic complexity and thereby increases the lifetime of the sensor nodes in the network field. We then form the mesh network inside each of the sectors that increases the reliability. The algorithm is designed in such a way that it overcomes the ambiguous nodes errata and reflected paths and therefore makes the algorithm more robust. The synthetic network geometries are so designed which can evaluate the algorithm in the presence of perfect or imperfect ranges or in case of incomplete data. A comparative study is made with the existing algorithms which proves the efficiency of our newly proposed algorithm. 2013 Mohammed et al.

  13. Throughput Analysis on 3-Dimensional Underwater Acoustic Network with One-Hop Mobile Relay

    Science.gov (United States)

    Zhong, Xuefeng; Fan, Jiasheng; Guan, Quansheng; Ji, Fei; Yu, Hua

    2018-01-01

    Underwater acoustic communication network (UACN) has been considered as an essential infrastructure for ocean exploitation. Performance analysis of UACN is important in underwater acoustic network deployment and management. In this paper, we analyze the network throughput of three-dimensional randomly deployed transmitter–receiver pairs. Due to the long delay of acoustic channels, complicated networking protocols with heavy signaling overhead may not be appropriate. In this paper, we consider only one-hop or two-hop transmission, to save the signaling cost. That is, we assume the transmitter sends the data packet to the receiver by one-hop direct transmission, or by two-hop transmission via mobile relays. We derive the closed-form formulation of packet delivery rate with respect to the transmission delay and the number of transmitter–receiver pairs. The correctness of the derivation results are verified by computer simulations. Our analysis indicates how to obtain a precise tradeoff between the delay constraint and the network capacity. PMID:29337911

  14. UMDR: Multi-Path Routing Protocol for Underwater Ad Hoc Networks with Directional Antenna

    Science.gov (United States)

    Yang, Jianmin; Liu, Songzuo; Liu, Qipei; Qiao, Gang

    2018-01-01

    This paper presents a new routing scheme for underwater ad hoc networks based on directional antennas. Ad hoc networks with directional antennas have become a hot research topic because of space reuse may increase networks capacity. At present, researchers have applied traditional self-organizing routing protocols (such as DSR, AODV) [1] [2] on this type of networks, and the routing scheme is based on the shortest path metric. However, such routing schemes often suffer from long transmission delays and frequent link fragmentation along the intermediate nodes of the selected route. This is caused by a unique feature of directional transmission, often called as “deafness”. In this paper, we take a different approach to explore the advantages of space reuse through multipath routing. This paper introduces the validity of the conventional routing scheme in underwater ad hoc networks with directional antennas, and presents a special design of multipath routing algorithm for directional transmission. The experimental results show a significant performance improvement in throughput and latency.

  15. Throughput Analysis on 3-Dimensional Underwater Acoustic Network with One-Hop Mobile Relay.

    Science.gov (United States)

    Zhong, Xuefeng; Chen, Fangjiong; Fan, Jiasheng; Guan, Quansheng; Ji, Fei; Yu, Hua

    2018-01-16

    Underwater acoustic communication network (UACN) has been considered as an essential infrastructure for ocean exploitation. Performance analysis of UACN is important in underwater acoustic network deployment and management. In this paper, we analyze the network throughput of three-dimensional randomly deployed transmitter-receiver pairs. Due to the long delay of acoustic channels, complicated networking protocols with heavy signaling overhead may not be appropriate. In this paper, we consider only one-hop or two-hop transmission, to save the signaling cost. That is, we assume the transmitter sends the data packet to the receiver by one-hop direct transmission, or by two-hop transmission via mobile relays. We derive the closed-form formulation of packet delivery rate with respect to the transmission delay and the number of transmitter-receiver pairs. The correctness of the derivation results are verified by computer simulations. Our analysis indicates how to obtain a precise tradeoff between the delay constraint and the network capacity.

  16. Latency-Optimized and Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks: A Cross-Layer Approach

    Directory of Open Access Journals (Sweden)

    Cheng Xiuzhen

    2010-01-01

    Full Text Available Considering the energy constraint for fixed sensor nodes and the unacceptable long propagation delay, especially for latency sensitive applications of underwater acoustic sensor networks, we propose a MAC protocol that is latency-optimized and energy-efficient scheme and combines the physical layer and the MAC layer to shorten transmission delay. On physical layer, we apply convolution coding and interleaver for transmitted information. Moreover, dynamic code rate is exploited at the receiver side to accelerate data reception rate. On MAC layer, unfixed frame length scheme is applied to reduce transmission delay, and to ensure the data successful transmission rate at the same time. Furthermore, we propose a network topology: an underwater acoustic sensor network with mobile agent. Through fully utilizing the supper capabilities on computation and mobility of autonomous underwater vehicles, the energy consumption for fixed sensor nodes can be extremely reduced, so that the lifetime of networks is extended.

  17. A GPS-free passive acoustic localization scheme for underwater wireless sensor networks

    KAUST Repository

    Mirza, Mohammed

    2011-10-01

    Seaweb is an acoustic communication technology that enables communication between sensor nodes. Seaweb interconnects the underwater nodes through digital signal processing (DSP)-based modem by using acoustic links between the neighbouring sensors. In this paper, we design and investigate a global positioning system (GPS)-free passive localization protocol using seaweb technology. This protocol uses the range data and planar trigonometry to estimate the positions of the discovered nodes. We take into consideration the small displacement of sensor nodes due to watch circles and placement of sensor nodes on non-uniform underwater surface, for precise localization. Once the nodes are localized, we divide the whole network .eld into circular levels that minimizes the traf.c complexity and thereby increases the lifetime of the sensor network .eld. We then form the mesh network inside each of the circular levels that increases the reliability. The algorithm is designed in such a way that it overcomes the ambiguous nodes errata and re.ected paths and makes the algorithm more robust. The synthetic network geometries are so designed which can evaluate the algorithm in the presence of perfect or imperfect ranges or in case of incomplete data. A comparative study is made with the existing algorithms which proves our newly proposed algorithm to be more effective. © 2011 IEEE.

  18. A New Resource Allocation Protocol for the Backhaul of Underwater Cellular Wireless Networks

    Directory of Open Access Journals (Sweden)

    Changho Yun

    2018-01-01

    Full Text Available In this paper, an underwater base station initiating (UBSI resource allocation is proposed for underwater cellular wireless networks (UCWNs, which is a new approach to determine the backhaul capacity of underwater base stations (UBSs. This backhaul is a communication link from a UBS to a UBS controller (UBSC. Contrary to conventional resource allocation protocols, a UBS initiates to re-determine its backhaul capacity for itself according to its queue status; it releases a portion of its backhaul capacity in the case of experiencing resource under-utilization, and also requests additional backhaul capacity to the UBSC if packet drops are caused due to queue-overflow. This protocol can be appropriate and efficient to the underwater backhaul link where the transmission rate is quite low and the latency is unneglectable. In order to investigate the applicability of the UBSI resource allocation protocol to the UCWN, its performance is extensively analyzed via system level simulations. In our analysis, considered performance measures include average packet drop rate, average resource utilization, average message overhead, and the reserved capacity of the UBSC. In particular, the simulation results show that our proposed protocol not only utilizes most of the given backhaul capacity (more than 90 percent of resource utilization on the average, but also reduces controlling message overheads induced by resource allocation (less than 2 controlling messages on the average. It is expected that the simulation results and analysis in this paper can be used as operating guidelines to apply our new resource allocation protocol for the UCWN.

  19. A climatology of the California Current System from a network of underwater gliders

    Science.gov (United States)

    Rudnick, Daniel L.; Zaba, Katherine D.; Todd, Robert E.; Davis, Russ E.

    2017-05-01

    Autonomous underwater gliders offer the possibility of sustained observation of the coastal ocean. Since 2006 Spray underwater gliders in the California Underwater Glider Network (CUGN) have surveyed along California Cooperative Oceanic Fisheries Investigations (CalCOFI) lines 66.7, 80.0, and 90.0, constituting the world's longest sustained glider network, to our knowledge. In this network, gliders dive between the surface and 500 m, completing a cycle in 3 h and covering 3 km in that time. Sections extend 350-500 km offshore and take 2-3 weeks to occupy. Measured variables include pressure, temperature, salinity, and depth-average velocity. The CUGN has amassed over 10,000 glider-days, covering over 210,000 km with over 95,000 dives. These data are used to produce a climatology whose products are for each variable a mean field, an annual cycle, and the anomaly from the annual cycle. The analysis includes a weighted least-squares fit to derive the mean and annual cycle, and an objective map to produce the anomaly. The final results are variables on rectangular grids in depth, distance offshore, and time. The mean fields are finely resolved sections across the main flows in the California Current System, including the poleward California Undercurrent and the equatorward California Current. The annual cycle shows a phase change from the surface to the thermocline, reflecting the effects of air/sea fluxes at the surface and upwelling in the thermocline. The interannual anomalies are examined with an emphasis on climate events of the last ten years including the 2009-2010 El Niño, the 2010-2011 La Niña, the warm anomaly of 2014-2015, and the 2015-2016 El Niño.

  20. Compression of a Deep Competitive Network Based on Mutual Information for Underwater Acoustic Targets Recognition

    Directory of Open Access Journals (Sweden)

    Sheng Shen

    2018-04-01

    Full Text Available The accuracy of underwater acoustic targets recognition via limited ship radiated noise can be improved by a deep neural network trained with a large number of unlabeled samples. However, redundant features learned by deep neural network have negative effects on recognition accuracy and efficiency. A compressed deep competitive network is proposed to learn and extract features from ship radiated noise. The core idea of the algorithm includes: (1 Competitive learning: By integrating competitive learning into the restricted Boltzmann machine learning algorithm, the hidden units could share the weights in each predefined group; (2 Network pruning: The pruning based on mutual information is deployed to remove the redundant parameters and further compress the network. Experiments based on real ship radiated noise show that the network can increase recognition accuracy with fewer informative features. The compressed deep competitive network can achieve a classification accuracy of 89.1 % , which is 5.3 % higher than deep competitive network and 13.1 % higher than the state-of-the-art signal processing feature extraction methods.

  1. EARLY DETECTION OF NEAR-FIELD TSUNAMIS USING UNDERWATER SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    L. E. Freitag

    2012-01-01

    Full Text Available We propose a novel approach for near-field tsunami detection, specifically for the area near the city of Padang, Indonesia. Padang is located on the western shore of Sumatra, directly across from the Mentawai segment of the Sunda Trench, where accumulated strain has not been released since the great earthquake of 1797. Consequently, the risk of a major tsunamigenic earthquake on this segment is high. Currently, no ocean-bottom pressure sensors are deployed in the Mentawai basin to provide a definitive tsunami warning for Padang. Timely warnings are essential to initiate evacuation procedures and minimize loss of human life. Our approach augments existing technology with a network of underwater sensors to detect tsunamis generated by an earthquake or landslide fast enough to provide at least 15 minutes of warning. Data from the underwater sensor network would feed into existing decision support systems that accept input from land and sea-based sensors and provide warning information to city and regional authorities.

  2. Exploiting Outage and Error Probability of Cooperative Incremental Relaying in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hina Nasir

    2016-07-01

    Full Text Available This paper embeds a bi-fold contribution for Underwater Wireless Sensor Networks (UWSNs; performance analysis of incremental relaying in terms of outage and error probability, and based on the analysis proposition of two new cooperative routing protocols. Subject to the first contribution, a three step procedure is carried out; a system model is presented, the number of available relays are determined, and based on cooperative incremental retransmission methodology, closed-form expressions for outage and error probability are derived. Subject to the second contribution, Adaptive Cooperation in Energy (ACE efficient depth based routing and Enhanced-ACE (E-ACE are presented. In the proposed model, feedback mechanism indicates success or failure of data transmission. If direct transmission is successful, there is no need for relaying by cooperative relay nodes. In case of failure, all the available relays retransmit the data one by one till the desired signal quality is achieved at destination. Simulation results show that the ACE and E-ACE significantly improves network performance, i.e., throughput, when compared with other incremental relaying protocols like Cooperative Automatic Repeat reQuest (CARQ. E-ACE and ACE achieve 69% and 63% more throughput respectively as compared to CARQ in hard underwater environment.

  3. SIMULATION AND ANALYSIS OF GREEDY ROUTING PROTOCOL IN VIEW OF ENERGY CONSUMPTION AND NETWORK LIFETIME IN THREE DIMENSIONAL UNDERWATER WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    SHEENA KOHLI

    2017-11-01

    Full Text Available Underwater Wireless Sensor Network (UWSN comprises of a number of miniature sized sensing devices deployed in the sea or ocean, connected by dint of acoustic links to each other. The sensors trap the ambient conditions and transmit the data from one end to another. For transmission of data in any medium, routing protocols play a crucial role. Moreover, being battery limited, an unavoidable parameter to be considered in operation and analysis of protocols is the network energy and the network lifetime. The paper discusses the greedy routing protocol for underwater wireless sensor networks. The simulation of this routing protocol also takes into consideration the characteristics of acoustic communication like attenuation, transmission loss, signal to noise ratio, noise, propagation delay. The results from these observations may be used to construct an accurate underwater communication model.

  4. EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks.

    Science.gov (United States)

    Bouk, Safdar Hussain; Ahmed, Syed Hassan; Park, Kyung-Joon; Eun, Yongsoon

    2017-09-26

    Underwater Acoustic Sensor Network (UASN) comes with intrinsic constraints because it is deployed in the aquatic environment and uses the acoustic signals to communicate. The examples of those constraints are long propagation delay, very limited bandwidth, high energy cost for transmission, very high signal attenuation, costly deployment and battery replacement, and so forth. Therefore, the routing schemes for UASN must take into account those characteristics to achieve energy fairness, avoid energy holes, and improve the network lifetime. The depth based forwarding schemes in literature use node's depth information to forward data towards the sink. They minimize the data packet duplication by employing the holding time strategy. However, to avoid void holes in the network, they use two hop node proximity information. In this paper, we propose the Energy and Depth variance-based Opportunistic Void avoidance (EDOVE) scheme to gain energy balancing and void avoidance in the network. EDOVE considers not only the depth parameter, but also the normalized residual energy of the one-hop nodes and the normalized depth variance of the second hop neighbors. Hence, it avoids the void regions as well as balances the network energy and increases the network lifetime. The simulation results show that the EDOVE gains more than 15 % packet delivery ratio, propagates 50 % less copies of data packet, consumes less energy, and has more lifetime than the state of the art forwarding schemes.

  5. Equation Chapter 1 Section 1Cross Layer Design for Localization in Large-Scale Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yuanfeng ZHANG

    2014-02-01

    Full Text Available There are many technical challenges for designing large-scale underwater sensor networks, especially the sensor node localization. Although many papers studied for large-scale sensor node localization, previous studies mainly study the location algorithm without the cross layer design for localization. In this paper, by utilizing the network hierarchical structure of underwater sensor networks, we propose a new large-scale underwater acoustic localization scheme based on cross layer design. In this scheme, localization is performed in a hierarchical way, and the whole localization process focused on the physical layer, data link layer and application layer. We increase the pipeline parameters which matched the acoustic channel, added in MAC protocol to increase the authenticity of the large-scale underwater sensor networks, and made analysis of different location algorithm. We conduct extensive simulations, and our results show that MAC layer protocol and the localization algorithm all would affect the result of localization which can balance the trade-off between localization accuracy, localization coverage, and communication cost.

  6. A Dynamic Bioinspired Neural Network Based Real-Time Path Planning Method for Autonomous Underwater Vehicles.

    Science.gov (United States)

    Ni, Jianjun; Wu, Liuying; Shi, Pengfei; Yang, Simon X

    2017-01-01

    Real-time path planning for autonomous underwater vehicle (AUV) is a very difficult and challenging task. Bioinspired neural network (BINN) has been used to deal with this problem for its many distinct advantages: that is, no learning process is needed and realization is also easy. However, there are some shortcomings when BINN is applied to AUV path planning in a three-dimensional (3D) unknown environment, including complex computing problem when the environment is very large and repeated path problem when the size of obstacles is bigger than the detection range of sensors. To deal with these problems, an improved dynamic BINN is proposed in this paper. In this proposed method, the AUV is regarded as the core of the BINN and the size of the BINN is based on the detection range of sensors. Then the BINN will move with the AUV and the computing could be reduced. A virtual target is proposed in the path planning method to ensure that the AUV can move to the real target effectively and avoid big-size obstacles automatically. Furthermore, a target attractor concept is introduced to improve the computing efficiency of neural activities. Finally, some experiments are conducted under various 3D underwater environments. The experimental results show that the proposed BINN based method can deal with the real-time path planning problem for AUV efficiently.

  7. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Sudip Misra

    2010-04-01

    Full Text Available The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes.

  8. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  9. Time-Efficient High-Rate Data Flooding in One-Dimensional Acoustic Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jae Kyun Kwon

    2015-10-01

    Full Text Available Because underwater communication environments have poor characteristics, such as severe attenuation, large propagation delays and narrow bandwidths, data is normally transmitted at low rates through acoustic waves. On the other hand, as high traffic has recently been required in diverse areas, high rate transmission has become necessary. In this paper, transmission/reception timing schemes that maximize the time axis use efficiency to improve the resource efficiency for high rate transmission are proposed. The excellence of the proposed scheme is identified by examining the power distributions by node, rate bounds, power levels depending on the rates and number of nodes, and network split gains through mathematical analysis and numerical results. In addition, the simulation results show that the proposed scheme outperforms the existing packet train method.

  10. Optimal Estimation of Glider’s Underwater Trajectory with Depth-Dependent Correction Using the Navy Coastal Ocean Model with Application to Antisubmarine Warfare

    Science.gov (United States)

    2014-09-01

    step study. 2010 IEEE International Conf. on Robotics and Autonomation, Anchorage, Alaska, IEEE Xplore , 4770‒4777, doi:10.1109/ ROBOT.2010.5509240...Autonomation, Karlsruhe, Germany, IEEE Xplore , 5565‒5570, doi:10.1109/ ICRA.2013.6631376. Webb, D. C., P. J. Simonetti, C. P. Jones, 2001: SLOCUM: An...unmanned underwater vehicles for very shallow water mine countermeasures. Proc. OCEANS 2003, San Diego, California, IEEE , 1417‒1423. doi:10.1109

  11. Mobile Sinks Assisted Geographic and Opportunistic Routing Based Interference Avoidance for Underwater Wireless Sensor Network.

    Science.gov (United States)

    Ahmed, Farwa; Wadud, Zahid; Javaid, Nadeem; Alrajeh, Nabil; Alabed, Mohamad Souheil; Qasim, Umar

    2018-04-02

    The distinctive features of acoustic communication channel-like high propagation delay, multi-path fading, quick attenuation of acoustic signal, etc. limit the utilization of underwater wireless sensor networks (UWSNs). The immutable selection of forwarder node leads to dramatic death of node resulting in imbalanced energy depletion and void hole creation. To reduce the probability of void occurrence and imbalance energy dissipation, in this paper, we propose mobility assisted geo-opportunistic routing paradigm based on interference avoidance for UWSNs. The network volume is divided into logical small cubes to reduce the interference and to make more informed routing decisions for efficient energy consumption. Additionally, an optimal number of forwarder nodes is elected from each cube based on its proximity with respect to the destination to avoid void occurrence. Moreover, the data packets are recovered from void regions with the help of mobile sinks which also reduce the data traffic on intermediate nodes. Extensive simulations are performed to verify that our proposed work maximizes the network lifetime and packet delivery ratio.

  12. Containment control of networked autonomous underwater vehicles: A predictor-based neural DSC design.

    Science.gov (United States)

    Peng, Zhouhua; Wang, Dan; Wang, Wei; Liu, Lu

    2015-11-01

    This paper investigates the containment control problem of networked autonomous underwater vehicles in the presence of model uncertainty and unknown ocean disturbances. A predictor-based neural dynamic surface control design method is presented to develop the distributed adaptive containment controllers, under which the trajectories of follower vehicles nearly converge to the dynamic convex hull spanned by multiple reference trajectories over a directed network. Prediction errors, rather than tracking errors, are used to update the neural adaptation laws, which are independent of the tracking error dynamics, resulting in two time-scales to govern the entire system. The stability property of the closed-loop network is established via Lyapunov analysis, and transient property is quantified in terms of L2 norms of the derivatives of neural weights, which are shown to be smaller than the classical neural dynamic surface control approach. Comparative studies are given to show the substantial improvements of the proposed new method. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  13. An Energy Balanced and Lifetime Extended Routing Protocol for Underwater Sensor Networks.

    Science.gov (United States)

    Wang, Hao; Wang, Shilian; Zhang, Eryang; Lu, Luxi

    2018-05-17

    Energy limitation is an adverse problem in designing routing protocols for underwater sensor networks (UWSNs). To prolong the network lifetime with limited battery power, an energy balanced and efficient routing protocol, called energy balanced and lifetime extended routing protocol (EBLE), is proposed in this paper. The proposed EBLE not only balances traffic loads according to the residual energy, but also optimizes data transmissions by selecting low-cost paths. Two phases are operated in the EBLE data transmission process: (1) candidate forwarding set selection phase and (2) data transmission phase. In candidate forwarding set selection phase, nodes update candidate forwarding nodes by broadcasting the position and residual energy level information. The cost value of available nodes is calculated and stored in each sensor node. Then in data transmission phase, high residual energy and relatively low-cost paths are selected based on the cost function and residual energy level information. We also introduce detailed analysis of optimal energy consumption in UWSNs. Numerical simulation results on a variety of node distributions and data load distributions prove that EBLE outperforms other routing protocols (BTM, BEAR and direct transmission) in terms of network lifetime and energy efficiency.

  14. A Glider-Assisted Link Disruption Restoration Mechanism in Underwater Acoustic Sensor Networks.

    Science.gov (United States)

    Jin, Zhigang; Wang, Ning; Su, Yishan; Yang, Qiuling

    2018-02-07

    Underwater acoustic sensor networks (UASNs) have become a hot research topic. In UASNs, nodes can be affected by ocean currents and external forces, which could result in sudden link disruption. Therefore, designing a flexible and efficient link disruption restoration mechanism to ensure the network connectivity is a challenge. In the paper, we propose a glider-assisted restoration mechanism which includes link disruption recognition and related link restoring mechanism. In the link disruption recognition mechanism, the cluster heads collect the link disruption information and then schedule gliders acting as relay nodes to restore the disrupted link. Considering the glider's sawtooth motion, we design a relay location optimization algorithm with a consideration of both the glider's trajectory and acoustic channel attenuation model. The utility function is established by minimizing the channel attenuation and the optimal location of glider is solved by a multiplier method. The glider-assisted restoration mechanism can greatly improve the packet delivery rate and reduce the communication energy consumption and it is more general for the restoration of different link disruption scenarios. The simulation results show that glider-assisted restoration mechanism can improve the delivery rate of data packets by 15-33% compared with cooperative opportunistic routing (OVAR), the hop-by-hop vector-based forwarding (HH-VBF) and the vector based forward (VBF) methods, and reduce communication energy consumption by 20-58% for a typical network's setting.

  15. Mobile Sinks Assisted Geographic and Opportunistic Routing Based Interference Avoidance for Underwater Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Farwa Ahmed

    2018-04-01

    Full Text Available The distinctive features of acoustic communication channel-like high propagation delay, multi-path fading, quick attenuation of acoustic signal, etc. limit the utilization of underwater wireless sensor networks (UWSNs. The immutable selection of forwarder node leads to dramatic death of node resulting in imbalanced energy depletion and void hole creation. To reduce the probability of void occurrence and imbalance energy dissipation, in this paper, we propose mobility assisted geo-opportunistic routing paradigm based on interference avoidance for UWSNs. The network volume is divided into logical small cubes to reduce the interference and to make more informed routing decisions for efficient energy consumption. Additionally, an optimal number of forwarder nodes is elected from each cube based on its proximity with respect to the destination to avoid void occurrence. Moreover, the data packets are recovered from void regions with the help of mobile sinks which also reduce the data traffic on intermediate nodes. Extensive simulations are performed to verify that our proposed work maximizes the network lifetime and packet delivery ratio.

  16. Neural Network-Based Self-Tuning PID Control for Underwater Vehicles.

    Science.gov (United States)

    Hernández-Alvarado, Rodrigo; García-Valdovinos, Luis Govinda; Salgado-Jiménez, Tomás; Gómez-Espinosa, Alfonso; Fonseca-Navarro, Fernando

    2016-09-05

    For decades, PID (Proportional + Integral + Derivative)-like controllers have been successfully used in academia and industry for many kinds of plants. This is thanks to its simplicity and suitable performance in linear or linearized plants, and under certain conditions, in nonlinear ones. A number of PID controller gains tuning approaches have been proposed in the literature in the last decades; most of them off-line techniques. However, in those cases wherein plants are subject to continuous parametric changes or external disturbances, online gains tuning is a desirable choice. This is the case of modular underwater ROVs (Remotely Operated Vehicles) where parameters (weight, buoyancy, added mass, among others) change according to the tool it is fitted with. In practice, some amount of time is dedicated to tune the PID gains of a ROV. Once the best set of gains has been achieved the ROV is ready to work. However, when the vehicle changes its tool or it is subject to ocean currents, its performance deteriorates since the fixed set of gains is no longer valid for the new conditions. Thus, an online PID gains tuning algorithm should be implemented to overcome this problem. In this paper, an auto-tune PID-like controller based on Neural Networks (NN) is proposed. The NN plays the role of automatically estimating the suitable set of PID gains that achieves stability of the system. The NN adjusts online the controller gains that attain the smaller position tracking error. Simulation results are given considering an underactuated 6 DOF (degrees of freedom) underwater ROV. Real time experiments on an underactuated mini ROV are conducted to show the effectiveness of the proposed scheme.

  17. Neural Network-Based Self-Tuning PID Control for Underwater Vehicles

    Directory of Open Access Journals (Sweden)

    Rodrigo Hernández-Alvarado

    2016-09-01

    Full Text Available For decades, PID (Proportional + Integral + Derivative-like controllers have been successfully used in academia and industry for many kinds of plants. This is thanks to its simplicity and suitable performance in linear or linearized plants, and under certain conditions, in nonlinear ones. A number of PID controller gains tuning approaches have been proposed in the literature in the last decades; most of them off-line techniques. However, in those cases wherein plants are subject to continuous parametric changes or external disturbances, online gains tuning is a desirable choice. This is the case of modular underwater ROVs (Remotely Operated Vehicles where parameters (weight, buoyancy, added mass, among others change according to the tool it is fitted with. In practice, some amount of time is dedicated to tune the PID gains of a ROV. Once the best set of gains has been achieved the ROV is ready to work. However, when the vehicle changes its tool or it is subject to ocean currents, its performance deteriorates since the fixed set of gains is no longer valid for the new conditions. Thus, an online PID gains tuning algorithm should be implemented to overcome this problem. In this paper, an auto-tune PID-like controller based on Neural Networks (NN is proposed. The NN plays the role of automatically estimating the suitable set of PID gains that achieves stability of the system. The NN adjusts online the controller gains that attain the smaller position tracking error. Simulation results are given considering an underactuated 6 DOF (degrees of freedom underwater ROV. Real time experiments on an underactuated mini ROV are conducted to show the effectiveness of the proposed scheme.

  18. Routing Protocols for Underwater Wireless Sensor Networks: Taxonomy, Research Challenges, Routing Strategies and Future Directions.

    Science.gov (United States)

    Khan, Anwar; Ali, Ihsan; Ghani, Abdullah; Khan, Nawsher; Alsaqer, Mohammed; Rahman, Atiq Ur; Mahmood, Hasan

    2018-05-18

    Recent research in underwater wireless sensor networks (UWSNs) has gained the attention of researchers in academia and industry for a number of applications. They include disaster and earthquake prediction, water quality and environment monitoring, leakage and mine detection, military surveillance and underwater navigation. However, the aquatic medium is associated with a number of limitations and challenges: long multipath delay, high interference and noise, harsh environment, low bandwidth and limited battery life of the sensor nodes. These challenges demand research techniques and strategies to be overcome in an efficient and effective fashion. The design of routing protocols for UWSNs is one of the promising solutions to cope with these challenges. This paper presents a survey of the routing protocols for UWSNs. For the ease of description, the addressed routing protocols are classified into two groups: localization-based and localization-free protocols. These groups are further subdivided according to the problems they address or the major parameters they consider during routing. Unlike the existing surveys, this survey considers only the latest and state-of-the-art routing protocols. In addition, every protocol is described in terms of its routing strategy and the problem it addresses and solves. The merit(s) of each protocol is (are) highlighted along with the cost. A description of the protocols in this fashion has a number of advantages for researchers, as compared to the existing surveys. Firstly, the description of the routing strategy of each protocol makes its routing operation easily understandable. Secondly, the demerit(s) of a protocol provides (provide) insight into overcoming its flaw(s) in future investigation. This, in turn, leads to the foundation of new protocols that are more intelligent, robust and efficient with respect to the desired parameters. Thirdly, a protocol can be selected for the appropriate application based on its described

  19. NETWORK-CENTRIC WARFARE AND NETWORK ENABLED CAPABILITY IMPLICATIONS OVER THE C4ISR TYPE INFORMATION NETWORKS IN THE ROMANIAN ARMED FORCES

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2015-06-01

    Full Text Available The last two decades mark out the humankind evolution toward the Information Age, a new stage of societal development where the modern society is affected, among other factors, by the explosive technological changes. Within the context, technology represents the main changing driver. To be more specific, small innovations appeared in the information technology and communications are considered to be responsible global transformations in the economy, politics or culture structure. This assertion also extends its validity over the military phenomenon, which is just another human behavior. The use on large scale of the information technology and communications led to a cybernetic battlefield and the change of the waging war philosophy, with the arising of new concepts that better describe the new reality: Network Centric Warfare, and Network Enabled Capabilities.

  20. A Localization-Free Interference and Energy Holes Minimization Routing for Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Khan, Anwar; Ahmedy, Ismail; Anisi, Mohammad Hossein; Javaid, Nadeem; Ali, Ihsan; Khan, Nawsher; Alsaqer, Mohammed; Mahmood, Hasan

    2018-01-09

    Interference and energy holes formation in underwater wireless sensor networks (UWSNs) threaten the reliable delivery of data packets from a source to a destination. Interference also causes inefficient utilization of the limited battery power of the sensor nodes in that more power is consumed in the retransmission of the lost packets. Energy holes are dead nodes close to the surface of water, and their early death interrupts data delivery even when the network has live nodes. This paper proposes a localization-free interference and energy holes minimization (LF-IEHM) routing protocol for UWSNs. The proposed algorithm overcomes interference during data packet forwarding by defining a unique packet holding time for every sensor node. The energy holes formation is mitigated by a variable transmission range of the sensor nodes. As compared to the conventional routing protocols, the proposed protocol does not require the localization information of the sensor nodes, which is cumbersome and difficult to obtain, as nodes change their positions with water currents. Simulation results show superior performance of the proposed scheme in terms of packets received at the final destination and end-to-end delay.

  1. Asymmetric Propagation Delay-Aware TDMA MAC Protocol for Mobile Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    A-Ra Cho

    2018-06-01

    Full Text Available The propagation delay in mobile underwater acoustic sensor network (MUASN is asymmetric because of its low sound propagation speed, and this asymmetry grows with the increase in packet travel time, which damages the collision avoidance mechanism of the spatial reuse medium access control (MAC protocols for MUASN. We propose an asymmetric propagation delay-aware time division multiple access (APD-TDMA for a MUASN in which periodic data packet transmission is required for a sink node (SN. Collisions at the SN are avoided by deferring data packet transmission after reception of a beacon packet from the SN, and data packets are arrived at the SN in a packet-train manner. The time-offset, which is the time for a node to wait before the transmission of a data packet after reception of a beacon packet, is determined by estimating the propagation delay over two consecutive cycles such that the idle interval at the SN is minimized, and this time-offset is announced by the beacon packet. Simulation results demonstrate that the APD-TDMA improves the channel access delay and the channel utilization by approximately 20% and 30%, respectively, compared with those of the block time bounded TDMA under the given network conditions.

  2. A Localization-Free Interference and Energy Holes Minimization Routing for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Anwar Khan

    2018-01-01

    Full Text Available Interference and energy holes formation in underwater wireless sensor networks (UWSNs threaten the reliable delivery of data packets from a source to a destination. Interference also causes inefficient utilization of the limited battery power of the sensor nodes in that more power is consumed in the retransmission of the lost packets. Energy holes are dead nodes close to the surface of water, and their early death interrupts data delivery even when the network has live nodes. This paper proposes a localization-free interference and energy holes minimization (LF-IEHM routing protocol for UWSNs. The proposed algorithm overcomes interference during data packet forwarding by defining a unique packet holding time for every sensor node. The energy holes formation is mitigated by a variable transmission range of the sensor nodes. As compared to the conventional routing protocols, the proposed protocol does not require the localization information of the sensor nodes, which is cumbersome and difficult to obtain, as nodes change their positions with water currents. Simulation results show superior performance of the proposed scheme in terms of packets received at the final destination and end-to-end delay.

  3. A Glider-Assisted Link Disruption Restoration Mechanism in Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhigang Jin

    2018-02-01

    Full Text Available Underwater acoustic sensor networks (UASNs have become a hot research topic. In UASNs, nodes can be affected by ocean currents and external forces, which could result in sudden link disruption. Therefore, designing a flexible and efficient link disruption restoration mechanism to ensure the network connectivity is a challenge. In the paper, we propose a glider-assisted restoration mechanism which includes link disruption recognition and related link restoring mechanism. In the link disruption recognition mechanism, the cluster heads collect the link disruption information and then schedule gliders acting as relay nodes to restore the disrupted link. Considering the glider’s sawtooth motion, we design a relay location optimization algorithm with a consideration of both the glider’s trajectory and acoustic channel attenuation model. The utility function is established by minimizing the channel attenuation and the optimal location of glider is solved by a multiplier method. The glider-assisted restoration mechanism can greatly improve the packet delivery rate and reduce the communication energy consumption and it is more general for the restoration of different link disruption scenarios. The simulation results show that glider-assisted restoration mechanism can improve the delivery rate of data packets by 15–33% compared with cooperative opportunistic routing (OVAR, the hop-by-hop vector-based forwarding (HH-VBF and the vector based forward (VBF methods, and reduce communication energy consumption by 20–58% for a typical network’s setting.

  4. An Improved Forwarding of Diverse Events with Mobile Sinks in Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Raza, Waseem; Arshad, Farzana; Ahmed, Imran; Abdul, Wadood; Ghouzali, Sanaa; Niaz, Iftikhar Azim; Javaid, Nadeem

    2016-11-04

    In this paper, a novel routing strategy to cater the energy consumption and delay sensitivity issues in deep underwater wireless sensor networks is proposed. This strategy is named as ESDR: Event Segregation based Delay sensitive Routing. In this strategy sensed events are segregated on the basis of their criticality and, are forwarded to their respective destinations based on forwarding functions. These functions depend on different routing metrics like: Signal Quality Index, Localization free Signal to Noise Ratio, Energy Cost Function and Depth Dependent Function. The problem of incomparable values of previously defined forwarding functions causes uneven delays in forwarding process. Hence forwarding functions are redefined to ensure their comparable values in different depth regions. Packet forwarding strategy is based on the event segregation approach which forwards one third of the generated events (delay sensitive) to surface sinks and two third events (normal events) are forwarded to mobile sinks. Motion of mobile sinks is influenced by the relative distribution of normal nodes. We have also incorporated two different mobility patterns named as; adaptive mobility and uniform mobility for mobile sinks. The later one is implemented for collecting the packets generated by the normal nodes. These improvements ensure optimum holding time, uniform delay and in-time reporting of delay sensitive events. This scheme is compared with the existing ones and outperforms the existing schemes in terms of network lifetime, delay and throughput.

  5. A Support Vector Learning-Based Particle Filter Scheme for Target Localization in Communication-Constrained Underwater Acoustic Sensor Networks.

    Science.gov (United States)

    Li, Xinbin; Zhang, Chenglin; Yan, Lei; Han, Song; Guan, Xinping

    2017-12-21

    Target localization, which aims to estimate the location of an unknown target, is one of the key issues in applications of underwater acoustic sensor networks (UASNs). However, the constrained property of an underwater environment, such as restricted communication capacity of sensor nodes and sensing noises, makes target localization a challenging problem. This paper relies on fractional sensor nodes to formulate a support vector learning-based particle filter algorithm for the localization problem in communication-constrained underwater acoustic sensor networks. A node-selection strategy is exploited to pick fractional sensor nodes with short-distance pattern to participate in the sensing process at each time frame. Subsequently, we propose a least-square support vector regression (LSSVR)-based observation function, through which an iterative regression strategy is used to deal with the distorted data caused by sensing noises, to improve the observation accuracy. At the same time, we integrate the observation to formulate the likelihood function, which effectively update the weights of particles. Thus, the particle effectiveness is enhanced to avoid "particle degeneracy" problem and improve localization accuracy. In order to validate the performance of the proposed localization algorithm, two different noise scenarios are investigated. The simulation results show that the proposed localization algorithm can efficiently improve the localization accuracy. In addition, the node-selection strategy can effectively select the subset of sensor nodes to improve the communication efficiency of the sensor network.

  6. Data Access Based on a Guide Map of the Underwater Wireless Sensor Network.

    Science.gov (United States)

    Wei, Zhengxian; Song, Min; Yin, Guisheng; Song, Houbing; Wang, Hongbin; Ma, Xuefei; Cheng, Albert M K

    2017-10-17

    Underwater wireless sensor networks (UWSNs) represent an area of increasing research interest, as data storage, discovery, and query of UWSNs are always challenging issues. In this paper, a data access based on a guide map (DAGM) method is proposed for UWSNs. In DAGM, the metadata describes the abstracts of data content and the storage location. The center ring is composed of nodes according to the shortest average data query path in the network in order to store the metadata, and the data guide map organizes, diffuses and synchronizes the metadata in the center ring, providing the most time-saving and energy-efficient data query service for the user. For this method, firstly the data is stored in the UWSN. The storage node is determined, the data is transmitted from the sensor node (data generation source) to the storage node, and the metadata is generated for it. Then, the metadata is sent to the center ring node that is the nearest to the storage node and the data guide map organizes the metadata, diffusing and synchronizing it to the other center ring nodes. Finally, when there is query data in any user node, the data guide map will select a center ring node nearest to the user to process the query sentence, and based on the shortest transmission delay and lowest energy consumption, data transmission routing is generated according to the storage location abstract in the metadata. Hence, specific application data transmission from the storage node to the user is completed. The simulation results demonstrate that DAGM has advantages with respect to data access time and network energy consumption.

  7. A Distributed and Energy-Efficient Algorithm for Event K-Coverage in Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Peng Jiang

    2017-01-01

    Full Text Available For event dynamic K-coverage algorithms, each management node selects its assistant node by using a greedy algorithm without considering the residual energy and situations in which a node is selected by several events. This approach affects network energy consumption and balance. Therefore, this study proposes a distributed and energy-efficient event K-coverage algorithm (DEEKA. After the network achieves 1-coverage, the nodes that detect the same event compete for the event management node with the number of candidate nodes and the average residual energy, as well as the distance to the event. Second, each management node estimates the probability of its neighbor nodes’ being selected by the event it manages with the distance level, the residual energy level, and the number of dynamic coverage event of these nodes. Third, each management node establishes an optimization model that uses expectation energy consumption and the residual energy variance of its neighbor nodes and detects the performance of the events it manages as targets. Finally, each management node uses a constrained non-dominated sorting genetic algorithm (NSGA-II to obtain the Pareto set of the model and the best strategy via technique for order preference by similarity to an ideal solution (TOPSIS. The algorithm first considers the effect of harsh underwater environments on information collection and transmission. It also considers the residual energy of a node and a situation in which the node is selected by several other events. Simulation results show that, unlike the on-demand variable sensing K-coverage algorithm, DEEKA balances and reduces network energy consumption, thereby prolonging the network’s best service quality and lifetime.

  8. A Routing Protocol Based on Received Signal Strength for Underwater Wireless Sensor Networks (UWSNs

    Directory of Open Access Journals (Sweden)

    Meiju Li

    2017-11-01

    Full Text Available Underwater wireless sensor networks (UWSNs are featured by long propagation delay, limited energy, narrow bandwidth, high BER (Bit Error Rate and variable topology structure. These features make it very difficult to design a short delay and high energy-efficiency routing protocol for UWSNs. In this paper, a routing protocol independent of location information is proposed based on received signal strength (RSS, which is called RRSS. In RRSS, a sensor node firstly establishes a vector from the node to a sink node; the length of the vector indicates the RSS of the beacon signal (RSSB from the sink node. A node selects the next-hop along the vector according to RSSB and the RSS of a hello packet (RSSH. The node nearer to the vector has higher priority to be a candidate next-hop. To avoid data packets being delivered to the neighbor nodes in a void area, a void-avoiding algorithm is introduced. In addition, residual energy is considered when selecting the next-hop. Meanwhile, we establish mathematic models to analyze the robustness and energy efficiency of RRSS. Lastly, we conduct extensive simulations, and the simulation results show RRSS can save energy consumption and decrease end-to-end delay.

  9. Statistical Modeling of Large-Scale Signal Path Loss in Underwater Acoustic Networks

    Directory of Open Access Journals (Sweden)

    Manuel Perez Malumbres

    2013-02-01

    Full Text Available In an underwater acoustic channel, the propagation conditions are known to vary in time, causing the deviation of the received signal strength from the nominal value predicted by a deterministic propagation model. To facilitate a large-scale system design in such conditions (e.g., power allocation, we have developed a statistical propagation model in which the transmission loss is treated as a random variable. By applying repetitive computation to the acoustic field, using ray tracing for a set of varying environmental conditions (surface height, wave activity, small node displacements around nominal locations, etc., an ensemble of transmission losses is compiled and later used to infer the statistical model parameters. A reasonable agreement is found with log-normal distribution, whose mean obeys a log-distance increases, and whose variance appears to be constant for a certain range of inter-node distances in a given deployment location. The statistical model is deemed useful for higher-level system planning, where simulation is needed to assess the performance of candidate network protocols under various resource allocation policies, i.e., to determine the transmit power and bandwidth allocation necessary to achieve a desired level of performance (connectivity, throughput, reliability, etc..

  10. Maximization of the Supportable Number of Sensors in QoS-Aware Cluster-Based Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Thi-Tham Nguyen

    2014-03-01

    Full Text Available This paper proposes a practical low-complexity MAC (medium access control scheme for quality of service (QoS-aware and cluster-based underwater acoustic sensor networks (UASN, in which the provision of differentiated QoS is required. In such a network, underwater sensors (U-sensor in a cluster are divided into several classes, each of which has a different QoS requirement. The major problem considered in this paper is the maximization of the number of nodes that a cluster can accommodate while still providing the required QoS for each class in terms of the PDR (packet delivery ratio. In order to address the problem, we first estimate the packet delivery probability (PDP and use it to formulate an optimization problem to determine the optimal value of the maximum packet retransmissions for each QoS class. The custom greedy and interior-point algorithms are used to find the optimal solutions, which are verified by extensive simulations. The simulation results show that, by solving the proposed optimization problem, the supportable number of underwater sensor nodes can be maximized while satisfying the QoS requirements for each class.

  11. DOW-PR DOlphin and Whale Pods Routing Protocol for Underwater Wireless Sensor Networks (UWSNs).

    Science.gov (United States)

    Wadud, Zahid; Ullah, Khadem; Hussain, Sajjad; Yang, Xiaodong; Qazi, Abdul Baseer

    2018-05-12

    Underwater Wireless Sensor Networks (UWSNs) have intrinsic challenges that include long propagation delays, high mobility of sensor nodes due to water currents, Doppler spread, delay variance, multipath, attenuation and geometric spreading. The existing Weighting Depth and Forwarding Area Division Depth Based Routing (WDFAD-DBR) protocol considers the weighting depth of the two hops in order to select the next Potential Forwarding Node (PFN). To improve the performance of WDFAD-DBR, we propose DOlphin and Whale Pod Routing protocol (DOW-PR). In this scheme, we divide the transmission range into a number of transmission power levels and at the same time select the next PFNs from forwarding and suppressed zones. In contrast to WDFAD-DBR, our scheme not only considers the packet upward advancement, but also takes into account the number of suppressed nodes and number of PFNs at the first and second hops. Consequently, reasonable energy reduction is observed while receiving and transmitting packets. Moreover, our scheme also considers the hops count of the PFNs from the sink. In the absence of PFNs, the proposed scheme will select the node from the suppressed region for broadcasting and thus ensures minimum loss of data. Besides this, we also propose another routing scheme (whale pod) in which multiple sinks are placed at water surface, but one sink is embedded inside the water and is physically connected with the surface sink through high bandwidth connection. Simulation results show that the proposed scheme has high Packet Delivery Ratio (PDR), low energy tax, reduced Accumulated Propagation Distance (APD) and increased the network lifetime.

  12. A GPS-free passive acoustic localization scheme for underwater wireless sensor networks

    KAUST Repository

    Mirza, Mohammed; Shakir, Muhammad; Alouini, Mohamed-Slim

    2011-01-01

    Seaweb is an acoustic communication technology that enables communication between sensor nodes. Seaweb interconnects the underwater nodes through digital signal processing (DSP)-based modem by using acoustic links between the neighbouring sensors

  13. Governing Warfare

    DEFF Research Database (Denmark)

    Harste, Gorm

      It would seem as though warfare has gotten out of control, not only in Iraq and Afghanistan, but also in Central Africa. The paper outlines the strategic history of politically controlled warfare since the early Enlightenment. The argument is that control is implausible. The idea of control has...

  14. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    Science.gov (United States)

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-11-04

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  15. A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huifang Chen

    2013-11-01

    Full Text Available Due to the characteristics of underwater acoustic channel, media access control (MAC protocols designed for underwater acoustic sensor networks (UWASNs are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA CDMA MAC (POCA-CDMA-MAC, is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA or receiver-oriented code assignment (ROCA. Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  16. SBMAC: Smart Blocking MAC Mechanism for Variable UW-ASN (Underwater Acoustic Sensor Network Environment

    Directory of Open Access Journals (Sweden)

    Soo-Hyun Park

    2010-01-01

    Full Text Available In this paper, several MAC scheduling methods applicable to an underwater environment are proposed. Besides, a new marine communication system model was proposed to improve the reliability of the proposed SBMAC method. The scheme minimizes transmission of control frames except for data transmission and various transmission methods and ACK methods can be used together. Simulation models are set indices and analysis of the underwater environment is established to conduct reliable simulations. Consequently, the performance improvement of the proposed method is verified with respect to delay time, data transmission rate, memory utilization, energy efficiency, etc.

  17. Cascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jae-Won Lee

    2014-10-01

    Full Text Available The long propagation delay in an underwater acoustic channel makes designing an underwater media access control (MAC protocol more challenging. In particular, handshaking-based MAC protocols widely used in terrestrial radio channels have been known to be inappropriate in underwater acoustic channels, because of the inordinately large latency involved in exchanging control packets. Furthermore, in the case of multi-hop relaying in a hop-by-hop handshaking manner, the end-to-end delay significantly increases. In this paper, we propose a new MAC protocol named cascading multi-hop reservation and transmission (CMRT. In CMRT, intermediate nodes between a source and a destination may start handshaking in advance for the next-hop relaying before handshaking for the previous node is completed. By this concurrent relaying, control packet exchange and data delivery cascade down to the destination. In addition, to improve channel utilization, CMRT adopts a packet-train method where multiple data packets are sent together by handshaking once. Thus, CMRT reduces the time taken for control packet exchange and accordingly increases the throughput. The performance of CMRT is evaluated and compared with that of two conventional MAC protocols (multiple-access collision avoidance for underwater (MACA-U and MACA-U with packet trains (MACA-UPT. The results show that CMRT outperforms other MAC protocols in terms of both throughput and end-to-end delay.

  18. GSR-TDMA: A Geometric Spatial Reuse-Time Division Multiple Access MAC Protocol for Multihop Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Changho Yun

    2016-01-01

    Full Text Available The nonnegligible propagation delay of acoustic signals causes spatiotemporal uncertainty that occasionally enables simultaneous, collision-free packet transmission among underwater nodes (UNs. These transmissions can be handled by efficiently managing the channel access of the UNs in the data-link layer. To this end, Geometric Spatial Reuse-TDMA (GSR-TDMA, a new TDMA-based MAC protocol, is designed for use in centralized, multihop underwater acoustic sensor networks (UASNs, and in this case all UNs are periodically scheduled after determining a geometric map according to the information on their location. The scheduling strategy increases the number of UNs that send packets coincidentally via two subscheduling configurations (i.e., interhop and intrahop scheduling. Extensive simulations are used to investigate the reception success rate (RSR and the multihop delay (MHD of GSR-TDMA, and the results are compared to those of previous approaches, including C-MAC and HSR-TDMA. GSR-TDMA outperforms C-MAC; the RSR of GSR-TDMA is 15% higher than that of C-MAC, and the MHD of GSR-TDMA is 30% lower than that of C-MAC at the most. In addition, GSR-TDMA provides even better performance improvements over HSR-TDMA; the RSR of GSR-TDMA is 50% higher than that of HSR-TDMA, and the MHD of GSR-TDMA is an order of 102 lower than that of HSR-TDMA at the most.

  19. A Localization Method for Underwater Wireless Sensor Networks Based on Mobility Prediction and Particle Swarm Optimization Algorithms

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-02-01

    Full Text Available Due to their special environment, Underwater Wireless Sensor Networks (UWSNs are usually deployed over a large sea area and the nodes are usually floating. This results in a lower beacon node distribution density, a longer time for localization, and more energy consumption. Currently most of the localization algorithms in this field do not pay enough consideration on the mobility of the nodes. In this paper, by analyzing the mobility patterns of water near the seashore, a localization method for UWSNs based on a Mobility Prediction and a Particle Swarm Optimization algorithm (MP-PSO is proposed. In this method, the range-based PSO algorithm is used to locate the beacon nodes, and their velocities can be calculated. The velocity of an unknown node is calculated by using the spatial correlation of underwater object’s mobility, and then their locations can be predicted. The range-based PSO algorithm may cause considerable energy consumption and its computation complexity is a little bit high, nevertheless the number of beacon nodes is relatively smaller, so the calculation for the large number of unknown nodes is succinct, and this method can obviously decrease the energy consumption and time cost of localizing these mobile nodes. The simulation results indicate that this method has higher localization accuracy and better localization coverage rate compared with some other widely used localization methods in this field.

  20. A Localization Method for Underwater Wireless Sensor Networks Based on Mobility Prediction and Particle Swarm Optimization Algorithms.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Jiang, Shengming; Chen, Wei

    2016-02-06

    Due to their special environment, Underwater Wireless Sensor Networks (UWSNs) are usually deployed over a large sea area and the nodes are usually floating. This results in a lower beacon node distribution density, a longer time for localization, and more energy consumption. Currently most of the localization algorithms in this field do not pay enough consideration on the mobility of the nodes. In this paper, by analyzing the mobility patterns of water near the seashore, a localization method for UWSNs based on a Mobility Prediction and a Particle Swarm Optimization algorithm (MP-PSO) is proposed. In this method, the range-based PSO algorithm is used to locate the beacon nodes, and their velocities can be calculated. The velocity of an unknown node is calculated by using the spatial correlation of underwater object's mobility, and then their locations can be predicted. The range-based PSO algorithm may cause considerable energy consumption and its computation complexity is a little bit high, nevertheless the number of beacon nodes is relatively smaller, so the calculation for the large number of unknown nodes is succinct, and this method can obviously decrease the energy consumption and time cost of localizing these mobile nodes. The simulation results indicate that this method has higher localization accuracy and better localization coverage rate compared with some other widely used localization methods in this field.

  1. Underwater robots

    CERN Document Server

    Antonelli, Gianluca

    2014-01-01

    This book, now at the third edition, addresses the main control aspects in underwater manipulation tasks. The mathematical model with significant impact on the control strategy is discussed. The problem of controlling a 6-degrees-of-freedoms autonomous underwater vehicle is deeply investigated and a survey of fault detection/tolerant strategies for unmanned underwater vehicles is provided. Inverse kinematics, dynamic and interaction control for underwater vehicle-manipulator systems are then discussed. The code used to generate most of the numerical simulations is made available and briefly discussed.       

  2. Network-Centric Warfare: Implications for Applying the Principles of War

    National Research Council Canada - National Science Library

    Caneva, Joseph

    1999-01-01

    Noting the competitive advantage that a computer network system completely integrated into a firm's structure and operations has provided to businesses, individuals have begun to argue that adoption...

  3. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  4. Fish and chips: implementation of a neural network model into computer chips to maximize swimming efficiency in autonomous underwater vehicles.

    Science.gov (United States)

    Blake, R W; Ng, H; Chan, K H S; Li, J

    2008-09-01

    Recent developments in the design and propulsion of biomimetic autonomous underwater vehicles (AUVs) have focused on boxfish as models (e.g. Deng and Avadhanula 2005 Biomimetic micro underwater vehicle with oscillating fin propulsion: system design and force measurement Proc. 2005 IEEE Int. Conf. Robot. Auto. (Barcelona, Spain) pp 3312-7). Whilst such vehicles have many potential advantages in operating in complex environments (e.g. high manoeuvrability and stability), limited battery life and payload capacity are likely functional disadvantages. Boxfish employ undulatory median and paired fins during routine swimming which are characterized by high hydromechanical Froude efficiencies (approximately 0.9) at low forward speeds. Current boxfish-inspired vehicles are propelled by a low aspect ratio, 'plate-like' caudal fin (ostraciiform tail) which can be shown to operate at a relatively low maximum Froude efficiency (approximately 0.5) and is mainly employed as a rudder for steering and in rapid swimming bouts (e.g. escape responses). Given this and the fact that bioinspired engineering designs are not obligated to wholly duplicate a biological model, computer chips were developed using a multilayer perception neural network model of undulatory fin propulsion in the knifefish Xenomystus nigri that would potentially allow an AUV to achieve high optimum values of propulsive efficiency at any given forward velocity, giving a minimum energy drain on the battery. We envisage that externally monitored information on flow velocity (sensory system) would be conveyed to the chips residing in the vehicle's control unit, which in turn would signal the locomotor unit to adopt kinematics (e.g. fin frequency, amplitude) associated with optimal propulsion efficiency. Power savings could protract vehicle operational life and/or provide more power to other functions (e.g. communications).

  5. Underwater Ranging

    OpenAIRE

    S. P. Gaba

    1984-01-01

    The paper deals with underwater laser ranging system, its principle of operation and maximum depth capability. The sources of external noise and methods to improve signal-to-noise ratio are also discussed.

  6. OFDM for underwater acoustic communications

    CERN Document Server

    Zhou, Shengli

    2014-01-01

    A blend of introductory material and advanced signal processing and communication techniques, of critical importance to underwater system and network development This book, which is the first to describe the processing techniques central to underwater OFDM, is arranged into four distinct sections: First, it describes the characteristics of underwater acoustic channels, and stresses the difference from wireless radio channels. Then it goes over the basics of OFDM and channel coding. The second part starts with an overview of the OFDM receiver, and develops various modules for the receiver des

  7. A scalable global positioning system-free localization scheme for underwater wireless sensor networks

    KAUST Repository

    Mohammed, A.M.; Muhammad, Z.S.; Mohamed, S.-A.

    2013-01-01

    Seaweb is an acoustic communication technology that enables communication between sensor nodes. Seaweb technology utilizes the commercially available telesonar modems that has developed link and network layer firmware to provide a robust undersea

  8. Mission Planning and Decision Support for Underwater Glider Networks: A Sampling on-Demand Approach

    Science.gov (United States)

    Ferri, Gabriele; Cococcioni, Marco; Alvarez, Alberto

    2015-01-01

    This paper describes an optimal sampling approach to support glider fleet operators and marine scientists during the complex task of planning the missions of fleets of underwater gliders. Optimal sampling, which has gained considerable attention in the last decade, consists in planning the paths of gliders to minimize a specific criterion pertinent to the phenomenon under investigation. Different criteria (e.g., A, G, or E optimality), used in geosciences to obtain an optimum design, lead to different sampling strategies. In particular, the A criterion produces paths for the gliders that minimize the overall level of uncertainty over the area of interest. However, there are commonly operative situations in which the marine scientists may prefer not to minimize the overall uncertainty of a certain area, but instead they may be interested in achieving an acceptable uncertainty sufficient for the scientific or operational needs of the mission. We propose and discuss here an approach named sampling on-demand that explicitly addresses this need. In our approach the user provides an objective map, setting both the amount and the geographic distribution of the uncertainty to be achieved after assimilating the information gathered by the fleet. A novel optimality criterion, called Aη, is proposed and the resulting minimization problem is solved by using a Simulated Annealing based optimizer that takes into account the constraints imposed by the glider navigation features, the desired geometry of the paths and the problems of reachability caused by ocean currents. This planning strategy has been implemented in a Matlab toolbox called SoDDS (Sampling on-Demand and Decision Support). The tool is able to automatically download the ocean fields data from MyOcean repository and also provides graphical user interfaces to ease the input process of mission parameters and targets. The results obtained by running SoDDS on three different scenarios are provided and show that So

  9. Mission Planning and Decision Support for Underwater Glider Networks: A Sampling on-Demand Approach.

    Science.gov (United States)

    Ferri, Gabriele; Cococcioni, Marco; Alvarez, Alberto

    2015-12-26

    This paper describes an optimal sampling approach to support glider fleet operators and marine scientists during the complex task of planning the missions of fleets of underwater gliders. Optimal sampling, which has gained considerable attention in the last decade, consists in planning the paths of gliders to minimize a specific criterion pertinent to the phenomenon under investigation. Different criteria (e.g., A, G, or E optimality), used in geosciences to obtain an optimum design, lead to different sampling strategies. In particular, the A criterion produces paths for the gliders that minimize the overall level of uncertainty over the area of interest. However, there are commonly operative situations in which the marine scientists may prefer not to minimize the overall uncertainty of a certain area, but instead they may be interested in achieving an acceptable uncertainty sufficient for the scientific or operational needs of the mission. We propose and discuss here an approach named sampling on-demand that explicitly addresses this need. In our approach the user provides an objective map, setting both the amount and the geographic distribution of the uncertainty to be achieved after assimilating the information gathered by the fleet. A novel optimality criterion, called A η , is proposed and the resulting minimization problem is solved by using a Simulated Annealing based optimizer that takes into account the constraints imposed by the glider navigation features, the desired geometry of the paths and the problems of reachability caused by ocean currents. This planning strategy has been implemented in a Matlab toolbox called SoDDS (Sampling on-Demand and Decision Support). The tool is able to automatically download the ocean fields data from MyOcean repository and also provides graphical user interfaces to ease the input process of mission parameters and targets. The results obtained by running SoDDS on three different scenarios are provided and show that So

  10. Mission Planning and Decision Support for Underwater Glider Networks: A Sampling on-Demand Approach

    Directory of Open Access Journals (Sweden)

    Gabriele Ferri

    2015-12-01

    Full Text Available This paper describes an optimal sampling approach to support glider fleet operators and marine scientists during the complex task of planning the missions of fleets of underwater gliders. Optimal sampling, which has gained considerable attention in the last decade, consists in planning the paths of gliders to minimize a specific criterion pertinent to the phenomenon under investigation. Different criteria (e.g., A, G, or E optimality, used in geosciences to obtain an optimum design, lead to different sampling strategies. In particular, the A criterion produces paths for the gliders that minimize the overall level of uncertainty over the area of interest. However, there are commonly operative situations in which the marine scientists may prefer not to minimize the overall uncertainty of a certain area, but instead they may be interested in achieving an acceptable uncertainty sufficient for the scientific or operational needs of the mission. We propose and discuss here an approach named sampling on-demand that explicitly addresses this need. In our approach the user provides an objective map, setting both the amount and the geographic distribution of the uncertainty to be achieved after assimilating the information gathered by the fleet. A novel optimality criterion, called A η , is proposed and the resulting minimization problem is solved by using a Simulated Annealing based optimizer that takes into account the constraints imposed by the glider navigation features, the desired geometry of the paths and the problems of reachability caused by ocean currents. This planning strategy has been implemented in a Matlab toolbox called SoDDS (Sampling on-Demand and Decision Support. The tool is able to automatically download the ocean fields data from MyOcean repository and also provides graphical user interfaces to ease the input process of mission parameters and targets. The results obtained by running SoDDS on three different scenarios are provided

  11. Design and Performance Evaluation of Underwater Data Dissemination Strategies using Interference Avoidance and Network Coding

    DEFF Research Database (Denmark)

    Palacios, Raul; Heide, Janus; Fitzek, Frank

    2012-01-01

    constraints and achieve efficient data transmission under water. Network Coding can exploit the broadcast channel to send different information to several receivers simultaneously. With Interference Avoidance the long propagation delay can be used to communicate in full-duplex mode. Alone and combined...... these concepts could increase channel utilisation as well as improve energy efficiency of the network nodes. The main goal is to investigate the potential benefits of new strategies for data dissemination over a string topology scenario. Comprehensive simulations prove the feasibility of Interference Avoidance...

  12. Echoes from the deep - Communication scheduling, localization and time-synchronization in underwater acoustic sensor networks.

    NARCIS (Netherlands)

    van Kleunen, W.A.P.

    2014-01-01

    Wireless Sensor Networks (WSNs) caused a shift in the way things are monitored. While traditional monitoring was coarse-grained and offline, using WSNs allows fine-grained and real-time monitoring. While radio-based WSNs are growing out of the stage of research to commercialization and widespread

  13. Information-Driven Blind Doppler Shift Estimation and Compensation Methods for Underwater Wireless Sensor Networks

    Science.gov (United States)

    2015-08-24

    District of Columbia Computer Science and Informati Briana Lowe Wellman Washington, DC 20008 -1122 14-Apr-2015 ABSTRACT Number of Papers published in peer...YANNICK ROLAND KAMDEM, SASAN HAGHANI, PAUL COTAE,. Detecting Falls Among Elderly Patients in Nursing Homes by Using Wireless Sensor Networks...and Applied Sciences at the University of the District of Columbia, May 1st , 2013. • 2013 Chair of the ASEE Mid-Atlantic Conference at UDC

  14. A Depth-Adjustment Deployment Algorithm Based on Two-Dimensional Convex Hull and Spanning Tree for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Peng Jiang

    2016-07-01

    Full Text Available Most of the existing node depth-adjustment deployment algorithms for underwater wireless sensor networks (UWSNs just consider how to optimize network coverage and connectivity rate. However, these literatures don’t discuss full network connectivity, while optimization of network energy efficiency and network reliability are vital topics for UWSN deployment. Therefore, in this study, a depth-adjustment deployment algorithm based on two-dimensional (2D convex hull and spanning tree (NDACS for UWSNs is proposed. First, the proposed algorithm uses the geometric characteristics of a 2D convex hull and empty circle to find the optimal location of a sleep node and activate it, minimizes the network coverage overlaps of the 2D plane, and then increases the coverage rate until the first layer coverage threshold is reached. Second, the sink node acts as a root node of all active nodes on the 2D convex hull and then forms a small spanning tree gradually. Finally, the depth-adjustment strategy based on time marker is used to achieve the three-dimensional overall network deployment. Compared with existing depth-adjustment deployment algorithms, the simulation results show that the NDACS algorithm can maintain full network connectivity with high network coverage rate, as well as improved network average node degree, thus increasing network reliability.

  15. Marketing Network Centric Warfare

    National Research Council Canada - National Science Library

    McCarthy, Shannon

    2001-01-01

    ... the other services. In order to be effective, NCW must transition from a Navy concept to a joint product. NCW advocates can effect this transition by using basic business principles to market NCW...

  16. On the Effects of Frequency Scaling over Capacity Scaling in Underwater Networks

    DEFF Research Database (Denmark)

    Shin, Won-Yong; Roetter, Daniel Enrique Lucani; Médard, Muriel

    2013-01-01

    that there exists either a bandwidth or power limitation, or both, according to the operating regimes (i.e., path-loss attenuation regimes), thus yielding the upper bound that follows three fundamentally different information transfer arguments. In addition, an achievability result based on the multi-hop (MH......) transmission is presented for dense networks. MH is shown to guarantee the order optimality under certain operating regimes. More specifically, it turns out that scaling the carrier frequency faster than or as is instrumental towards achieving the order optimality of the MH protocol....

  17. On Reliable and Efficient Data Gathering Based Routing in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Tayyaba Liaqat

    2016-08-01

    Full Text Available This paper presents cooperative routing scheme to improve data reliability. The proposed protocol achieves its objective, however, at the cost of surplus energy consumption. Thus sink mobility is introduced to minimize the energy consumption cost of nodes as it directly collects data from the network nodes at minimized communication distance. We also present delay and energy optimized versions of our proposed RE-AEDG to further enhance its performance. Simulation results prove the effectiveness of our proposed RE-AEDG in terms of the selected performance matrics.

  18. On Reliable and Efficient Data Gathering Based Routing in Underwater Wireless Sensor Networks.

    Science.gov (United States)

    Liaqat, Tayyaba; Akbar, Mariam; Javaid, Nadeem; Qasim, Umar; Khan, Zahoor Ali; Javaid, Qaisar; Alghamdi, Turki Ali; Niaz, Iftikhar Azim

    2016-08-30

    This paper presents cooperative routing scheme to improve data reliability. The proposed protocol achieves its objective, however, at the cost of surplus energy consumption. Thus sink mobility is introduced to minimize the energy consumption cost of nodes as it directly collects data from the network nodes at minimized communication distance. We also present delay and energy optimized versions of our proposed RE-AEDG to further enhance its performance. Simulation results prove the effectiveness of our proposed RE-AEDG in terms of the selected performance matrics.

  19. Distributed computing environment for Mine Warfare Command

    OpenAIRE

    Pritchard, Lane L.

    1993-01-01

    Approved for public release; distribution is unlimited. The Mine Warfare Command in Charleston, South Carolina has been converting its information systems architecture from a centralized mainframe based system to a decentralized network of personal computers over the past several years. This thesis analyzes the progress Of the evolution as of May of 1992. The building blocks of a distributed architecture are discussed in relation to the choices the Mine Warfare Command has made to date. Ar...

  20. FINAL TECHNICAL REPORT: Underwater Active Acoustic Monitoring Network For Marine And Hydrokinetic Energy Projects

    Energy Technology Data Exchange (ETDEWEB)

    Stein, Peter J. [Scientific Solutions, Inc, Nashua, NH (United States); Edson, Patrick L. [Scientific Solutions, Inc, Nashua, NH (United States)

    2013-12-20

    This project saw the completion of the design and development of a second generation, high frequency (90-120 kHz) Subsurface-Threat Detection Sonar Network (SDSN). The system was deployed, operated, and tested in Cobscook Bay, Maine near the site the Ocean Renewable Power Company TidGen™ power unit. This effort resulted in a very successful demonstration of the SDSN detection, tracking, localization, and classification capabilities in a high current, MHK environment as measured by results from the detection and tracking trials in Cobscook Bay. The new high frequency node, designed to operate outside the hearing range of a subset of marine mammals, was shown to detect and track objects of marine mammal-like target strength to ranges of approximately 500 meters. This performance range results in the SDSN system tracking objects for a significant duration - on the order of minutes - even in a tidal flow of 5-7 knots, potentially allowing time for MHK system or operator decision-making if marine mammals are present. Having demonstrated detection and tracking of synthetic targets with target strengths similar to some marine mammals, the primary hurdle to eventual automated monitoring is a dataset of actual marine mammal kinematic behavior and modifying the tracking algorithms and parameters which are currently tuned to human diver kinematics and classification.

  1. Drone warfare

    Science.gov (United States)

    Gusterson, Hugh

    2017-11-01

    Crude drones existed as early as World War I, but the technology matured in the Yugoslav Wars of the 1990s and the current wars around the Middle East. The U.S. first used a weaponized drone in late 2001, in Afghanistan. Drones may cause more or less civilian casualties depending on the targeting protocols employed by their operators. There is an inherent ambiguity in determining who is an insurgent from several thousand feet, but civilian casualties are likely to be higher if targeters emphasize "signature strikes" over "personality strikes," if they engage in "double-tap strikes," if they rely too much on local informants, and if they rely too heavily on cellphone identification in the absence of corroboration from other intelligence sources. The legality of drone warfare is fairly clear in established battle zones such as Afghanistan, but is more problematic in terms of both international and domestic law when it comes to drone strikes in countries such as Yemen, Pakistan and Somalia with which the U.S. is not at war. Looking to the future, the U.S. would be well advised to sponsor negotiations for an international drone convention that might establish clear international rules for the use of drones, ban autonomous smart drones, and establish adjudicatory procedures to handle allegations of war crimes.

  2. Establishing Cyber Warfare Doctrine

    Directory of Open Access Journals (Sweden)

    Andrew M. Colarik

    2012-01-01

    Full Text Available Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national cyber warfare doctrine (CWD. An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.

  3. Delay Tolerance in Underwater Wireless Communications: A Routing Perspective

    Directory of Open Access Journals (Sweden)

    Safdar Hussain Bouk

    2016-01-01

    Full Text Available Similar to terrestrial networks, underwater wireless networks (UWNs also aid several critical tasks including coastal surveillance, underwater pollution detection, and other maritime applications. Currently, once underwater sensor nodes are deployed at different levels of the sea, it is nearly impossible or very expensive to reconfigure the hardware, for example, battery. Taking this issue into account, considerable amount of research has been carried out to ensure minimum energy costs and reliable communication between underwater nodes and base stations. As a result, several different network protocols were proposed for UWN, including MAC, PHY, transport, and routing. Recently, a new paradigm was introduced claiming that the intermittent nature of acoustic channel and signal resulted in designing delay tolerant routing schemes for the UWN, known as an underwater delay tolerant network. In this paper, we provide a comprehensive survey of underwater routing protocols with emphasis on the limitations, challenges, and future open issues in the context of delay tolerant network routing.

  4. Should the Concept of Network-Centric Warfare Form a Central Pillar of the Australian Army’s Transformation, as Articulated in the Hardened and Networked Army Concept?

    Science.gov (United States)

    2007-05-08

    Clausewitz Kantian philosophic framework for war, which contends that due to the inherent nature of war, it cannot be predicted or controlled by man. The...the key themes identified within Clausewitz On War has identified that NCW could be considered the anti-thesis of Clausewitz Kantian study of warfare...industries and centers of population remote from the surface forces. While not discussing the ethical implication of legitimizing the attack of civilian

  5. Flying Electronic Warfare Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Provides NP-3D aircraft host platforms for Effectiveness of Navy Electronic Warfare Systems (ENEWS) Program antiship missile (ASM) seeker simulators used...

  6. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    National Research Council Canada - National Science Library

    Tisserand, III, John B

    2003-01-01

    ...), which hypothesizes that a robustly networked force improves information sharing, collaboration, quality of information, and shared situational awareness resulting in significantly increased mission effectiveness...

  7. Information Warfare and Ethics

    Directory of Open Access Journals (Sweden)

    M.J. Warren

    2001-05-01

    Full Text Available This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

  8. Difficult Decisions: Chemical Warfare.

    Science.gov (United States)

    Slesnick, Irwin L.; Miller, John A.

    1988-01-01

    Gives the background history and chemistry of modern day chemical warfare from World War I to the present. Provides discussion questions to stimulate deeper thinking on the issue. Contains a discussion activity called "Can New Chemical Weapons Lead to Humane Warfare?" (CW)

  9. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  10. Expeditionary Warfare- Force Protection

    National Research Council Canada - National Science Library

    Higgins, Eric

    2004-01-01

    In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study...

  11. Biological warfare agents

    Directory of Open Access Journals (Sweden)

    Duraipandian Thavaselvam

    2010-01-01

    Full Text Available The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies.

  12. Biological warfare agents

    Science.gov (United States)

    Thavaselvam, Duraipandian; Vijayaraghavan, Rajagopalan

    2010-01-01

    The recent bioterrorist attacks using anthrax spores have emphasized the need to detect and decontaminate critical facilities in the shortest possible time. There has been a remarkable progress in the detection, protection and decontamination of biological warfare agents as many instrumentation platforms and detection methodologies are developed and commissioned. Even then the threat of biological warfare agents and their use in bioterrorist attacks still remain a leading cause of global concern. Furthermore in the past decade there have been threats due to the emerging new diseases and also the re-emergence of old diseases and development of antimicrobial resistance and spread to new geographical regions. The preparedness against these agents need complete knowledge about the disease, better research and training facilities, diagnostic facilities and improved public health system. This review on the biological warfare agents will provide information on the biological warfare agents, their mode of transmission and spread and also the detection systems available to detect them. In addition the current information on the availability of commercially available and developing technologies against biological warfare agents has also been discussed. The risk that arise due to the use of these agents in warfare or bioterrorism related scenario can be mitigated with the availability of improved detection technologies. PMID:21829313

  13. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    Section 1 of this paper provides an overview of cyber warfare as an element of information warfare, starting with the general background of the current strategic environment the United States is operating...

  14. Chemical warfare agents.

    Science.gov (United States)

    Kuca, Kamil; Pohanka, Miroslav

    2010-01-01

    Chemical warfare agents are compounds of different chemical structures. Simple molecules such as chlorine as well as complex structures such as ricin belong to this group. Nerve agents, vesicants, incapacitating agents, blood agents, lung-damaging agents, riot-control agents and several toxins are among chemical warfare agents. Although the use of these compounds is strictly prohibited, the possible misuse by terrorist groups is a reality nowadays. Owing to this fact, knowledge of the basic properties of these substances is of a high importance. This chapter briefly introduces the separate groups of chemical warfare agents together with their members and the potential therapy that should be applied in case someone is intoxicated by these agents.

  15. The influence of acoustic emissions for underwater data transmission on the behaviour of harbour porpoises (Phocoena phocoena) in a floating pen

    NARCIS (Netherlands)

    Kastelein, R.A.; Verboom, W.C.; Muijsers, M.; Jennings, N.V.; Heul, S. van der

    2005-01-01

    To prevent grounding of ships and collisions between ships in shallow coastal waters, an underwater data collection and communication network is currently under development: Acoustic Communication network for Monitoring of underwater Environment in coastal areas (ACME). Marine mammals might be

  16. Chemical warfare agents

    Directory of Open Access Journals (Sweden)

    Vijayaraghavan R

    2010-01-01

    Full Text Available Among the Weapons of Mass Destruction, chemical warfare (CW is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided.

  17. Chemical warfare agents

    Science.gov (United States)

    Ganesan, K.; Raza, S. K.; Vijayaraghavan, R.

    2010-01-01

    Among the Weapons of Mass Destruction, chemical warfare (CW) is probably one of the most brutal created by mankind in comparison with biological and nuclear warfare. Chemical weapons are inexpensive and are relatively easy to produce, even by small terrorist groups, to create mass casualties with small quantities. The characteristics of various CW agents, general information relevant to current physical as well as medical protection methods, detection equipment available and decontamination techniques are discussed in this review article. A brief note on Chemical Weapons Convention is also provided. PMID:21829312

  18. Multi-platform operations in the Underwater Warfare Testbed (UWT)

    NARCIS (Netherlands)

    Keus, D; Benders, F.P.A.; Fitski, H.J.; Grootendorst, H.J.

    2009-01-01

    More than a decade ago, the long-term NATO scientific study “Maritime Operations in 2015” (MO 2015) identified the so-called multi-platform and co-operative multi-static Low Frequency Active Sonar (LFAS) concept, involving co-operative sonar data exchange between surface ships and submarines.

  19. Simulation of Operations in the Underwater Warfare Testbed (UWT)

    NARCIS (Netherlands)

    Keus, D.; Benders, F.P.A.; Fitski, H.J.; Grootendorst, H.J.

    2009-01-01

    Surface vessels and submarines must be able to defend themselves against a torpedo attack. Several studies have shown the benefits of multi-platform and multi-static operations. To facilitate torpedo defence system studies and the development of future tactics, TNO Defence, Security and Safety

  20. Underwater welding of steel

    International Nuclear Information System (INIS)

    Ibarra, S.; Olson, D.L.

    1992-01-01

    A fundamental basis to understand the behavior of wet underwater welding of steel is introduced. Both the pyrometallurgical and physical metallurgy concepts are discussed. Modifications of welding consumables and practice are suggested. This chapter promotes further contributions of meatllurgical research to improve and promote wet underwater welding. (orig.)

  1. Underwater Scene Composition

    Science.gov (United States)

    Kim, Nanyoung

    2009-01-01

    In this article, the author describes an underwater scene composition for elementary-education majors. This project deals with watercolor with crayon or oil-pastel resist (medium); the beauty of nature represented by fish in the underwater scene (theme); texture and pattern (design elements); drawing simple forms (drawing skill); and composition…

  2. Underwater Acoustic Tracer System

    Science.gov (United States)

    2009-03-13

    for controlling and utilizing supercavitating projectile dynamics to produce a distinctive radiated noise signal. (2) Description of the Prior Art...metallic objects which travel relatively closely to a magnetic pickup. For larger, high speed, underwater projectiles, supercavitating underwater vehicles...have been proposed for use. The conditions for supercavitation are known in the art. Supercavitation allows for higher speeds to be sustainable

  3. Theory of information warfare: basic framework, methodology and conceptual apparatus

    Directory of Open Access Journals (Sweden)

    Олександр Васильович Курбан

    2015-11-01

    Full Text Available It is conducted a comprehensive theoretical study and determine the basic provisions of the modern theory of information warfare in on-line social networks. Three basic blocks, which systematized the theoretical and methodological basis of the topic, are established. There are information and psychological war, social off-line and on-line network. According to the three blocks, theoretical concepts are defined and methodological substantiation of information processes within the information warfare in the social on-line networks is formed

  4. The Physics of Warfare

    Science.gov (United States)

    Giordano, Gerardo

    2015-01-01

    Recently, I was tasked with the creation and execution of a new themed general education physics class called The Physics of Warfare. In the past, I had used the theme of a class, such as the physics of sports medicine, as a way to create homework and in-class activities, generate discussions, and provide an application to demonstrate that physics…

  5. Design of underwater work systems

    International Nuclear Information System (INIS)

    Lovelace, R.B.

    1980-01-01

    In the near future, underwater vehicles will replace divers as the principal means for inspection and maintenance work. These vehicles will provide a maneuverable work platform for an underwater viewing system and manipulator/tool package. Some of the problems faced by the underwater designer, and some areas to consider in the design of an integrated underwater work system, are considered

  6. Cooperative Search and Rescue with Artificial Fishes Based on Fish-Swarm Algorithm for Underwater Wireless Sensor Networks

    Science.gov (United States)

    Zhao, Wei; Tang, Zhenmin; Yang, Yuwang; Wang, Lei; Lan, Shaohua

    2014-01-01

    This paper presents a searching control approach for cooperating mobile sensor networks. We use a density function to represent the frequency of distress signals issued by victims. The mobile nodes' moving in mission space is similar to the behaviors of fish-swarm in water. So, we take the mobile node as artificial fish node and define its operations by a probabilistic model over a limited range. A fish-swarm based algorithm is designed requiring local information at each fish node and maximizing the joint detection probabilities of distress signals. Optimization of formation is also considered for the searching control approach and is optimized by fish-swarm algorithm. Simulation results include two schemes: preset route and random walks, and it is showed that the control scheme has adaptive and effective properties. PMID:24741341

  7. Cooperative Search and Rescue with Artificial Fishes Based on Fish-Swarm Algorithm for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wei Zhao

    2014-01-01

    Full Text Available This paper presents a searching control approach for cooperating mobile sensor networks. We use a density function to represent the frequency of distress signals issued by victims. The mobile nodes’ moving in mission space is similar to the behaviors of fish-swarm in water. So, we take the mobile node as artificial fish node and define its operations by a probabilistic model over a limited range. A fish-swarm based algorithm is designed requiring local information at each fish node and maximizing the joint detection probabilities of distress signals. Optimization of formation is also considered for the searching control approach and is optimized by fish-swarm algorithm. Simulation results include two schemes: preset route and random walks, and it is showed that the control scheme has adaptive and effective properties.

  8. Fast neutron sensor for detection of explosives and chemical warfare agents

    International Nuclear Information System (INIS)

    Valkovic, Vladivoj; Sudac, Davorin; Matika, Dario

    2010-01-01

    Once the presence of the anomaly on the bottom of the shallow coastal sea water has been confirmed it is necessary to establish if it contains explosive or chemical warfare charge. We propose that this be performed by using neutron sensor installed within an underwater vessel. When positioned above the object, or to its side, the system can inspect the object for the presence of the threat materials by using alpha particle tagged neutrons from the sealed tube d+t neutron generator.

  9. Fast neutron sensor for detection of explosives and chemical warfare agents

    Energy Technology Data Exchange (ETDEWEB)

    Valkovic, Vladivoj [A.C.T.d.o.o., Prilesje 4, 10000 Zagreb (Croatia)], E-mail: valkovic@irb.hr; Sudac, Davorin [Institute Ruder Boskovic, Bijenicka c.54, 10000 Zagreb (Croatia); Matika, Dario [Institute for Researches and Development of Defense Systems, Ilica 256b, 10000 Zagreb (Croatia)

    2010-04-15

    Once the presence of the anomaly on the bottom of the shallow coastal sea water has been confirmed it is necessary to establish if it contains explosive or chemical warfare charge. We propose that this be performed by using neutron sensor installed within an underwater vessel. When positioned above the object, or to its side, the system can inspect the object for the presence of the threat materials by using alpha particle tagged neutrons from the sealed tube d+t neutron generator.

  10. Information Warfare and International Law

    National Research Council Canada - National Science Library

    Greenberg, Lawrence T; Goodman, Seymour E; Soo Hoo, Kevin J

    1998-01-01

    .... Some legal constraints will certainly apply to information warfare, either because the constraints explicitly regulate particular actions, or because more general principles of international law...

  11. Electronic Warfare Signature Measurement Facility

    Data.gov (United States)

    Federal Laboratory Consortium — The Electronic Warfare Signature Measurement Facility contains specialized mobile spectral, radiometric, and imaging measurement systems to characterize ultraviolet,...

  12. Underwater 3D filming

    Directory of Open Access Journals (Sweden)

    Roberto Rinaldi

    2014-12-01

    Full Text Available After an experimental phase of many years, 3D filming is now effective and successful. Improvements are still possible, but the film industry achieved memorable success on 3D movie’s box offices due to the overall quality of its products. Special environments such as space (“Gravity” and the underwater realm look perfect to be reproduced in 3D. “Filming in space” was possible in “Gravity” using special effects and computer graphic. The underwater realm is still difficult to be handled. Underwater filming in 3D was not that easy and effective as filming in 2D, since not long ago. After almost 3 years of research, a French, Austrian and Italian team realized a perfect tool to film underwater, in 3D, without any constrains. This allows filmmakers to bring the audience deep inside an environment where they most probably will never have the chance to be.

  13. Underwater wireless communication system

    International Nuclear Information System (INIS)

    Goh, J H; Shaw, A; Al-Shamma'a, A I

    2009-01-01

    Underwater communication has a range of applications including remotely operated vehicle (ROV) and autonomous underwater vehicle (AUV) communication and docking in the offshore industry. Current underwater transmission techniques is primarily utilise sound waves for large distance at lower frequencies and the velocity of sound in water is approximately 1500m/s the resultant communications have problems with multi-path propagation and low bandwidth problems. The use of electromagnetic (EM) techniques underwater has largely been overlooked because of the attenuation due to the conductivity of seawater. However, for short range applications, the higher frequencies and much higher velocity can prove advantageous. This paper will outline a project which will utilise recent investigations that demonstrate EM wave propagation up to the MHz frequency range is possible in seawater.

  14. Smelling and Tasting Underwater.

    Science.gov (United States)

    Atema, Jelle

    1980-01-01

    Discusses differences between smell and taste, comparing these senses in organisms in aquatic and terrestrial environments. Describes the chemical environment underwater and in air, differences in chemoreceptors to receive stimuli, and the organs, brain, and behavior involved in chemoreception. (CS)

  15. Autonomous Underwater Gliders

    OpenAIRE

    Wood,; Stephen,

    2009-01-01

    Autonomous Underwater Vehicles are only now being marketed as robust commercial vehicles for many industries, and of these vehicles underwater gliders are becoming the new tool for oceanographers. Satellites have provided scientists and marine specialists with measurements of the sea surface such as temperature since the late 1970s, and data via subsurface oceanographic moorings since the 1950's. As stated by David Smeed of the National Oceanography Centre, Southampton, England, that "gliders...

  16. Underwater Gliders: A Review

    OpenAIRE

    Javaid Muhammad Yasar; Ovinis Mark; Nagarajan T; Hashim Fakhruldin B M

    2014-01-01

    Underwater gliders are a type of underwater vehicle that transverse the oceans by shifting its buoyancy, during which its wings develop a component of the downward motion in the horizontal plane, thus producing a forward force. They are primarily used in oceanography sensing and data collection and play an important role in ocean research and development. Although there have been considerable developments in these gliders since the development of the first glider concept in 1989, to date, no ...

  17. Antifragile Electronic Warfare

    OpenAIRE

    Lichtman, Marc

    2014-01-01

    This letter introduces the concept of antifragile electronic warfare (EW), which we define as the ability to allow a communications link to improve performance due to the presence of a jammer. This concept should not be confused with jamming countermeasures (a.k.a. anti-jamming or electronic protection). Rather, antifragile EW can be thought of as the next step beyond simply avoiding or mitigating jamming. After introducing the concept we narrow down the subset of jammers this concept can be ...

  18. Psychological effects of nuclear warfare

    International Nuclear Information System (INIS)

    Mickley, G.A.

    1987-01-01

    This report is divided into five parts. (1) Discussion of the psychological milieu before a nuclear confrontation. (2) Acute psychological reactions to nuclear warfare (some of which may reflect, in part, direct radiogenic alteration of nervous system functions). (3) Chronic psychological effects of a nuclear confrontation. (4) Issues concerning treatment of these psychological changes. (5) Prevention of adverse psychological reactions to nuclear warfare

  19. Low-contrast underwater living fish recognition using PCANet

    Science.gov (United States)

    Sun, Xin; Yang, Jianping; Wang, Changgang; Dong, Junyu; Wang, Xinhua

    2018-04-01

    Quantitative and statistical analysis of ocean creatures is critical to ecological and environmental studies. And living fish recognition is one of the most essential requirements for fishery industry. However, light attenuation and scattering phenomenon are present in the underwater environment, which makes underwater images low-contrast and blurry. This paper tries to design a robust framework for accurate fish recognition. The framework introduces a two stage PCA Network to extract abstract features from fish images. On a real-world fish recognition dataset, we use a linear SVM classifier and set penalty coefficients to conquer data unbalanced issue. Feature visualization results show that our method can avoid the feature distortion in boundary regions of underwater image. Experiments results show that the PCA Network can extract discriminate features and achieve promising recognition accuracy. The framework improves the recognition accuracy of underwater living fishes and can be easily applied to marine fishery industry.

  20. Resources for Underwater Robotics Education

    Science.gov (United States)

    Wallace, Michael L.; Freitas, William M.

    2016-01-01

    4-H clubs can build and program underwater robots from raw materials. An annotated resource list for engaging youth in building underwater remotely operated vehicles (ROVs) is provided. This article is a companion piece to the Research in Brief article "Building Teen Futures with Underwater Robotics" in this issue of the "Journal of…

  1. Cyber warfare and electronic warfare integration in the operational environment of the future: cyber electronic warfare

    Science.gov (United States)

    Askin, Osman; Irmak, Riza; Avsever, Mustafa

    2015-05-01

    For the states with advanced technology, effective use of electronic warfare and cyber warfare will be the main determining factor of winning a war in the future's operational environment. The developed states will be able to finalize the struggles they have entered with a minimum of human casualties and minimum cost thanks to high-tech. Considering the increasing number of world economic problems, the development of human rights and humanitarian law it is easy to understand the importance of minimum cost and minimum loss of human. In this paper, cyber warfare and electronic warfare concepts are examined in conjunction with the historical development and the relationship between them is explained. Finally, assessments were carried out about the use of cyber electronic warfare in the coming years.

  2. Hybrid Maritime Warfare

    DEFF Research Database (Denmark)

    Schaub Jr, Gary John; Murphy, Martin; Hoffman, Frank

    2017-01-01

    Russia’s use of hybrid warfare techniques has raised concerns about the security of the Baltic States. Gary Schaub, Jr, Martin Murphy and Frank G Hoffman recommend a series of measures to augment NATO’s Readiness Action Plan in the Baltic region, including increasing the breadth and depth of naval...... exercises, and improving maritime domain awareness through cooperative programmes. They also suggest unilateral and cooperative measures to develop a sound strategic communications strategy to counter Moscow’s information operations, reduce dependence on Russian energy supplies and build the resilience...

  3. Underwater 3D filming

    OpenAIRE

    Rinaldi, Roberto

    2014-01-01

    After an experimental phase of many years, 3D filming is now effective and successful. Improvements are still possible, but the film industry achieved memorable success on 3D movie’s box offices due to the overall quality of its products. Special environments such as space (“Gravity” ) and the underwater realm look perfect to be reproduced in 3D. “Filming in space” was possible in “Gravity” using special effects and computer graphic. The underwater realm is still difficult to be handled. Unde...

  4. Deep Learning Methods for Underwater Target Feature Extraction and Recognition

    Directory of Open Access Journals (Sweden)

    Gang Hu

    2018-01-01

    Full Text Available The classification and recognition technology of underwater acoustic signal were always an important research content in the field of underwater acoustic signal processing. Currently, wavelet transform, Hilbert-Huang transform, and Mel frequency cepstral coefficients are used as a method of underwater acoustic signal feature extraction. In this paper, a method for feature extraction and identification of underwater noise data based on CNN and ELM is proposed. An automatic feature extraction method of underwater acoustic signals is proposed using depth convolution network. An underwater target recognition classifier is based on extreme learning machine. Although convolution neural networks can execute both feature extraction and classification, their function mainly relies on a full connection layer, which is trained by gradient descent-based; the generalization ability is limited and suboptimal, so an extreme learning machine (ELM was used in classification stage. Firstly, CNN learns deep and robust features, followed by the removing of the fully connected layers. Then ELM fed with the CNN features is used as the classifier to conduct an excellent classification. Experiments on the actual data set of civil ships obtained 93.04% recognition rate; compared to the traditional Mel frequency cepstral coefficients and Hilbert-Huang feature, recognition rate greatly improved.

  5. Wireless Underwater Monitoring Systems Based on Energy Harvestings

    Directory of Open Access Journals (Sweden)

    Sea-Hee HWANGBO

    2013-01-01

    Full Text Available One of the important research fields for aquatic exploitation and conservation is underwater wireless sensor network. Since limited energy source for underwater nodes and devices is a main open problem, in this paper, we propose wireless underwater monitoring systems powered by energy harvester which resolves the energy constraint. The target system generates renewable energy from energy harvester and shares the energy with underwater sensor nodes. For the realization of the system, key components to be investigated are discriminated as follows: acoustic modem, actuator, smart battery charge controller, energy harvester and wireless power transfer module. By developing acoustic modem, actuator and smart battery charge controller and utilizing off-the-shelf energy harvester and wireless power transfer module, we design and implement a prototype of the system. Also, we verify the feasibility of concept of target system by conducting indoor and outdoor experiments.

  6. Cyber Warfare/Cyber Terrorism

    National Research Council Canada - National Science Library

    O'Hara, Timothy

    2004-01-01

    .... Section 1 concludes with a review of offensive and defensive cyber warfare concepts. Section 2 presents a general overview of cyber terrorism, including definitions of cyber terrorism and cyber terrorism support...

  7. The ethics of information warfare

    CERN Document Server

    Floridi, Luciano

    2014-01-01

    This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare.The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the developme...

  8. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1986-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios; biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (orig./HP) [de

  9. Nuclear radiation in warfare

    International Nuclear Information System (INIS)

    Rotblat, J.

    1981-01-01

    The subject is covered in chapters, entitled: introduction; digest of nuclear weaponry (characteristics of nuclear weapons; effects of nuclear weapons other than ionizing radiation (fire-ball, fall-out, thermal radiation, blast wave, electromagnetic pulse); the nuclear arms race; war scenarios); biological effects of radiations on man (radiation doses; natural sources of radiation; acute effects of radiation; long-term somatic effects; genetic effects; factors affecting the biological response to radiation; internal exposure; synergistic effects; protection against radiation effects); radiations from nuclear explosions (initial radiation; fall-out; effects of fall-out on animal and plant life; contamination of water and food supplies by fall-out); radiation casualties in a nuclear war; effectiveness of civil defence; other warlike uses of radiation (attacks on civilian nuclear power installations; radiological warfare; terrorist activities); conclusion. (U.K.)

  10. Reflections on nuclear warfare

    International Nuclear Information System (INIS)

    Evans, J.P.

    1983-01-01

    The author looks back on his more than 70 years of familiarity with Americans involved in warfare, noting their loyal support for our country's objectives. Drawing on the Einstein equation, his own visits to Hiroshima and Nagasaki, and current literature, he, as a physician, belatedly concurs with those who look on the use of nuclear weapons as irrational and untenable. Their employment under present circumstances would create a ''final epidemic'' to be avoided only by prevention. He suggests that medical perceptions must be considered by our national leaders in assessing the many factors that he hopes will lead to rational answers to this urgent, highly complex, and vital enigma. He cites physicians' efforts to help in finding answers and asks that his colleagues consider the issues with attention to the gravity of the situation and act according to their best judgment

  11. More Effective Warfare: Warfare Waged Psychologically

    Science.gov (United States)

    2012-06-01

    Marine barracks in Beirut. Over the years, their tactics have included car bombs, kidnappings, murders, and the hijacking of civilian airliners ...welfare centers cater to tens of thousands of families and their information network is unrivaled by any other terrorist organization.39 In 1992

  12. Intelligence Strategy for Fourth Generation Warfare

    National Research Council Canada - National Science Library

    Jamison, Edward P

    2006-01-01

    ...." They have named this new era of war "fourth generation warfare." Currently the Department of Defense's intelligence strategy is designed to defeat conventional adversaries vise a fourth generation warfare opponent...

  13. Colour reconstruction of underwater images

    OpenAIRE

    Hoth, Julian; Kowalczyk, Wojciech

    2017-01-01

    Objects look very different in the underwater environment compared to their appearance in sunlight. Images with correct colouring simplify the detection of underwater objects and may allow the use of visual SLAM algorithms developed for land-based robots underwater. Hence, image processing is required. Current algorithms focus on the colour reconstruction of scenery at diving depth where different colours can still be distinguished. At greater depth this is not the case. In this study it is i...

  14. Underwater Welding Techniques

    OpenAIRE

    Esam F. Alajmi; Ahmad A. Alqenaei

    2017-01-01

    Welding demand in offshore and marine applications is increased with the increasing in oil and gas activities as well as increasing in the marine transportation and industrial applications. Applications of underwater welding well be increased in Kuwait in the coming years due to the strategic directive of the country toward starting the offshore oil and gas exploration and production, and the increase in marine transportation projects. Therefore, there is a need to understand the concept of u...

  15. Underwater Gliders: A Review

    Directory of Open Access Journals (Sweden)

    Javaid Muhammad Yasar

    2014-07-01

    Full Text Available Underwater gliders are a type of underwater vehicle that transverse the oceans by shifting its buoyancy, during which its wings develop a component of the downward motion in the horizontal plane, thus producing a forward force. They are primarily used in oceanography sensing and data collection and play an important role in ocean research and development. Although there have been considerable developments in these gliders since the development of the first glider concept in 1989, to date, no review of these gliders have been done. This paper reviews existing underwater gliders, with emphasis on their respective working principles, range and payload capacity. All information on gliders available in the public domain or published in literature from the year 2000-2013 was reviewed. The majority of these gliders have an operational depth of 1000 m and a payload of less than 25 kg. The exception is a blend-body shape glider, which has a payload of approximately 800 kg and an operational depth around about 300 m. However, the commercialization of these gliders has been limited with only three know examples that have been successfully commercialized.

  16. Human Systems Integration Assessment of Network Centric Command and Control

    National Research Council Canada - National Science Library

    Quashnock, Dee; Kelly, Richard T; Dunaway, John; Smillie, Robert J

    2004-01-01

    .... FORCEnet is the operational construct and architectural framework for Naval Network Centric Warfare in the information age that integrates warriors, sensors, networks, command and control, platforms...

  17. Polarization Calculation and Underwater Target Detection Inspired by Biological Visual Imaging

    Directory of Open Access Journals (Sweden)

    Jie Shen

    2014-04-01

    Full Text Available In challenging underwater environments, the polarization parameter maps calculated by the Stokes model are characterized by the high noise and error, harassing the underwater target detection tasks. In order to solve this problem, this paper proposes a novel bionic polarization calculation and underwater target detection method by modeling the visual system of mantis shrimps. This system includes many operators including a polarization-opposition calculation, a factor optimization and a visual neural network model. A calibration learning method is proposed to search the optimal value of the factors in the linear subtraction model. Finally, a six-channel visual neural network model is proposed to detect the underwater targets. Experimental results proved that the maps produced by the polarization-opposition parameter is more accurate and have lower noise than that produced by the Stokes parameter, achieving better performance in underwater target detection tasks.

  18. The ethics of drone warfare

    Directory of Open Access Journals (Sweden)

    Fatić Aleksandar

    2017-01-01

    Full Text Available The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular community or profession is a useful conceptual strategy to explore the compatibility of drone warfare with traditional military ethics; this strategy shows mixed results at best.

  19. The doctor and nuclear warfare

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    At the 34th World Medical Assembly in Lisbon in 1981 the World Medical Association adopted a motion proposed by the American Medical Association that national medical associations should develop programs to educate the civilian population on the medical consequences of nuclear war. This article discusses the attitude the medical professions should have, should nuclear warfare in some form confront them in the future. The conclusion is drawn that defence against nuclear warfare is only a part of civil defence against any disaster, including the natural disasters such as flood and fire and the man-made disasters of transport accidents, even of problems at nuclear plants designed to supply energy

  20. Image enhancement software for underwater recovery operations: User's manual

    Science.gov (United States)

    Partridge, William J.; Therrien, Charles W.

    1989-06-01

    This report describes software for performing image enhancement on live or recorded video images. The software was developed for operational use during underwater recovery operations at the Naval Undersea Warfare Engineering Station. The image processing is performed on an IBM-PC/AT compatible computer equipped with hardware to digitize and display video images. The software provides the capability to provide contrast enhancement and other similar functions in real time through hardware lookup tables, to automatically perform histogram equalization, to capture one or more frames and average them or apply one of several different processing algorithms to a captured frame. The report is in the form of a user manual for the software and includes guided tutorial and reference sections. A Digital Image Processing Primer in the appendix serves to explain the principle concepts that are used in the image processing.

  1. Underwater sound and vibrations due to oil & gas activities

    NARCIS (Netherlands)

    Beek, P.J.G. van; Binnerts, B.; Nennie, E.D.; Benda-Beckmann, A.M. von

    2014-01-01

    In the oil & gas industry there is a trend towards more subsea activities. To improve gas recovery from existing and new fields at greater depths, the produced gas will be compressed, processed and transported via subsea templates and underwater networks (pipelines, flexible risers, etc.). Besides

  2. Underwater sound due to a subsea high speed turbo compressor

    NARCIS (Netherlands)

    Binnerts, B.; Benda-Beckmann, A.M. von; Beek, P.J.G. van

    2014-01-01

    In the oil & gas industry there is a trend towards more subsea activities. To improve gas recovery from existing and new fields at greater depths, the produced gas will be compressed, processed and transported via subsea templates and underwater networks (pipelines, flexible risers, etc.). Besides

  3. Underwater running device

    International Nuclear Information System (INIS)

    Kogure, Sumio; Matsuo, Takashiro; Yoshida, Yoji

    1996-01-01

    An underwater running device for an underwater inspection device for detecting inner surfaces of a reactor or a water vessel has an outer frame and an inner frame, and both of them are connected slidably by an air cylinder and connected rotatably by a shaft. The outer frame has four outer frame legs, and each of the outer frame legs is equipped with a sucker at the top end. The inner frame has four inner frame legs each equipped with a sucker at the top end. The outer frame legs and the inner frame legs are each connected with the outer frame and the inner frame by the air cylinder. The outer and the inner frame legs can be elevated or lowered (or extended or contracted) by the air cylinder. The sucker is connected with a jet pump-type negative pressure generator. The device can run and move by repeating attraction and releasing of the outer frame legs and the inner frame legs alternately while maintaining the posture of the inspection device stably. (I.N.)

  4. Biological warfare, bioterrorism, and biocrime

    NARCIS (Netherlands)

    Jansen, H. J.; Breeveld, F. J.; Stijnis, C.; Grobusch, M. P.

    2014-01-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria

  5. European Curricula, Xenophobia and Warfare.

    Science.gov (United States)

    Coulby, David

    1997-01-01

    Examines school and university curricula in Europe and the extent of their influence on xenophobia. Considers the pluralistic nature of the European population. Discusses the role of curriculum selection and language policy in state efforts to promote nationalism. Assesses the role of curricular systems in the actual encouragement of warfare,…

  6. The Anatomy of Counterinsurgency Warfare

    DEFF Research Database (Denmark)

    Mouritsen, Lars; Pedersen, Kenneth; Thruelsen, Peter Dahl

    Since the beginning of the new millennium, the West has been increasingly involved in a tiresome and rather particular type of conflict: insurgency warfare. The bloody and shocking terrorist attacks on New York and Washington in September 2001 marked the beginning of a new era, and the introducti...

  7. Strategic Analysis of Irregular Warfare

    Science.gov (United States)

    2010-03-01

    the same mathematical equations used by Lanchester .10 Irregular Warfare Theory and Doctrine It is time to develop new analytical methods and models...basis on which to build, similar to what Lanchester provided almost 100 years ago. Figure 9 portrays both Lanchester’s approach and an irregular 17

  8. Roots of Russian Irregular Warfare

    Science.gov (United States)

    2016-12-01

    PAGE INTENTIONALLY LEFT BLANK xiii ACKNOWLEDGMENTS Crissy, your encouragement throughout my career and especially during this project has been...all of the Russian disinformation techniques in Ukraine came directly “from Soviet toolkits .” Maria Snegovaya, “Putin’s Information Warfare In

  9. Technology Transition for Hybrid Warfare

    Science.gov (United States)

    2010-02-16

    and Iraq. At the same time, the science and technology base must provide the disruptive technologies to defeat future conventional enemies. This... disruptive technologies will be needed to retain long-term technological superiority in conventional warfare. Incremental improvement is the most...technology to be missed. Disruptive technologies are the second type of technological change and involve revolutionary concepts involving large technological

  10. The Covert Use of the Global Special Operations Network and the Militarization of Covert Action in Political Warfare and the Gray Zone

    Science.gov (United States)

    2017-06-09

    methods to deliver the message. MISO uses everything from digital media and social networks, to billboards and airdropped fliers, to word -of- mouth and...overt and covert diplomacy is also beginning. As the digital, social media age continues, the USG is unable to compete with non-state actors...were CIA assassination squads. There may be some truth to that as “in the words of Douglas Valentine, a CIA operations chief in the Northern

  11. L2-LBMT: A Layered Load Balance Routing Protocol for underwater multimedia data transmission

    Science.gov (United States)

    Lv, Ze; Tang, Ruichun; Tao, Ye; Sun, Xin; Xu, Xiaowei

    2017-12-01

    Providing highly efficient underwater transmission of mass multimedia data is challenging due to the particularities of the underwater environment. Although there are many schemes proposed to optimize the underwater acoustic network communication protocols, from physical layer, data link layer, network layer to transport layer, the existing routing protocols for underwater wireless sensor network (UWSN) still cannot well deal with the problems in transmitting multimedia data because of the difficulties involved in high energy consumption, low transmission reliability or high transmission delay. It prevents us from applying underwater multimedia data to real-time monitoring of marine environment in practical application, especially in emergency search, rescue operation and military field. Therefore, the inefficient transmission of marine multimedia data has become a serious problem that needs to be solved urgently. In this paper, A Layered Load Balance Routing Protocol (L2-LBMT) is proposed for underwater multimedia data transmission. In L2-LBMT, we use layered and load-balance Ad Hoc Network to transmit data, and adopt segmented data reliable transfer (SDRT) protocol to improve the data transport reliability. And a 3-node variant of tornado (3-VT) code is also combined with the Ad Hoc Network to transmit little emergency data more quickly. The simulation results show that the proposed protocol can balance energy consumption of each node, effectively prolong the network lifetime and reduce transmission delay of marine multimedia data.

  12. Underwater plasma arc cutting

    International Nuclear Information System (INIS)

    Leautier, R.; Pilot, G.

    1991-01-01

    This report describes the work done to develop underwater plasma arc cutting techniques, to characterise aerosols from cutting operations on radioactive and non-radioactive work-pieces, and to develop suitable ventilation and filtration techniques. The work has been carried out in the framework of a contract between CEA-CEN Cadarache and the Commission of European Communities. Furthermore, this work has been carried out in close cooperation with CEA-CEN Saclay mainly for secondary emissions and radioactive analysis. The contract started in May 1986 and was completed in December 1988 by a supplementary agreement. This report has been compiled from several progress reports submitted during the work period, contains the main findings of the work and encloses the results of comparative tests on plasma arc cutting

  13. Safety aspects for underwater vehicles

    Digital Repository Service at National Institute of Oceanography (India)

    Madhan, R.; Navelkar, G.S.; Desa, E.S.; Afzulpurkar, S.; Prabhudesai, S.P.; Dabholkar, N.; Mascarenhas, A.A.M.Q.; Maurya, P.

    instrumentation is intelligent small Autonomous Underwater Vehicles (AUV’s), autonomous profilers, gliders [1], etc. The ultimate aim in all autonomous platforms research and development is to reach the stage of unescorted missions with minimum failures...

  14. Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare

    Science.gov (United States)

    2014-06-01

    Internet service provider IW irregular warfare MCO major combat operations MySQL open-source relational database management system NATO North...today, often with no regard for legal or ethical constraints. A better course of action would be to conduct operations in cyberspace within the precepts...built in feature of MySQL that 97 John Markoff, “Before the Gunfire, Cyberattacks,” York Times, August 13, 2008, sec. Technology, 1, http

  15. Hybrid Warfare: the 21st Century Russian Way of Warfare

    Science.gov (United States)

    2017-05-25

    to wage information operations— from television, to the Internet, to unconventional forces on the ground spreading the message word -of- mouth ...adversarial vulnerabilities. Many of the peculiarities of hybrid warfare described herein are inextricably linked to Russia’s social , political, and...the US election. Then they utilized various means of media to distribute that information with the goal to discredit the US political process and

  16. 2008 13th Expeditionary Warfare Conference

    Science.gov (United States)

    2008-10-23

    platforms – Emphasize a mixed fleet approach that spans the “iron triangle” – Integrate MRAP into the fleet mix – Transition to a fleet of tactical...Urban Warfare Mountain Warfare Desert Warfare Jungle Riverine Special Skills Recon LOG CSS ENG MT HS Ord Maint EOD Pers Retrival ...Detection (Specialized Platform FLGPR)Stand-off (60M) Scaleable Neutralization (Area coverage) ABV Delivery Ground Cueing Stand-off (800M) Scaleable

  17. The influence of underwater data transmission sounds on the displacement behaviour of captive harbour seals (Phoca vitulina)

    NARCIS (Netherlands)

    Kastelein, R.A.; Heul, S. van der; Verboom, W.C.; Triesscheijn, R.J.V.; Jennings, N.V.

    2006-01-01

    To prevent grounding of ships and collisions between ships in shallow coastal waters, an underwater data collection and communication network (ACME) using underwater sounds to encode and transmit data is currently under development. Marine mammals might be affected by ACME sounds since they may use

  18. Information Warfare in the Cyber Domain

    National Research Council Canada - National Science Library

    Takemoto, Glenn

    2001-01-01

    ...). This paper lays a foundation by defining the terminology associated with Information Warfare in the Cyber Domain, reviews the threat and illustrates the vulnerabilities of our information systems...

  19. MEANS AND METHODS OF CYBER WARFARE

    Directory of Open Access Journals (Sweden)

    Dan-Iulian VOITAȘEC

    2016-06-01

    Full Text Available According to the Declaration of Saint Petersburg of 1868 “the only legitimate object which States should endeavor to accomplish during war is to weaken the military forces of the enemy”. Thus, International Humanitarian Law prohibits or limits the use of certain means and methods of warfare. The rapid development of technology has led to the emergence of a new dimension of warfare. The cyber aspect of armed conflict has led to the development of new means and methods of warfare. The purpose of this paper is to study how the norms of international humanitarian law apply to the means and methods of cyber warfare.

  20. Cyber warfare building the scientific foundation

    CERN Document Server

    Jajodia, Sushil; Subrahmanian, VS; Swarup, Vipin; Wang, Cliff

    2015-01-01

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially gove

  1. Shadow Wars: An Analysis of Counterinsurgency Warfare

    National Research Council Canada - National Science Library

    Dogan, Osman

    2005-01-01

    ... of the current strategic approaches to counterinsurgency warfare. Toward this end, a systems model approach, which views insurgent organizations as open systems, is adapted to the insurgent environment...

  2. The ethics of drone warfare

    OpenAIRE

    Fatić Aleksandar

    2017-01-01

    The paper investigates the compatibility of the modern technologies of warfare, specifically the use of offensive drones, with traditional military ethics and suggests that the new technologies radically change the value system of the military in ways which make large parts of the traditional military ethics inapplicable. The author suggests that Agamben’s concept of ‘effectivity’ through ‘special actions’ which mark one’s belonging to a particular communit...

  3. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvardson, Kay

    1977-01-01

    Radioactive fallout, one of the major effects of nuclear warfare, will cause acute radiation sickness within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occur, and will cause irradiation from ground deposit, inhaled material and contaminated food. Estimates of collective doses and the approximate number of late casualties from the global contamination are presented for a given total explosion yield. (author)

  4. Effectiveness and reaction networks of H2O2 vapor with NH3 gas for decontamination of the toxic warfare nerve agent, VX on a solid surface.

    Science.gov (United States)

    Gon Ryu, Sam; Wan Lee, Hae

    2015-01-01

    The nerve agent, O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothioate (VX) must be promptly eliminated following its release into the environment because it is extremely toxic, can cause death within a few minutes after exposure, acts through direct skin contact as well as inhalation, and persists in the environment for several weeks after release. A mixture of hydrogen peroxide vapor and ammonia gas was examined as a decontaminant for the removal of VX on solid surfaces at ambient temperature, and the reaction products were analyzed by gas chromatography-mass spectrometry (GC-MS) and nuclear magnetic resonance spectrometry (NMR). All the VX on glass wool filter disks was found to be eliminated after 2 h of exposure to the decontaminant mixtures, and the primary decomposition product was determined to be non-toxic ethyl methylphosphonic acid (EMPA); no toxic S-[2-(diisopropylamino)ethyl] methylphosphonothioic acid (EA-2192), which is usually produced in traditional basic hydrolysis systems, was found to be formed. However, other by-products, such as toxic O-ethyl S-vinyl methylphosphonothioate and (2-diisopropylaminoethyl) vinyl disulfide, were detected up to 150 min of exposure to the decontaminant mixture; these by-products disappeared after 3 h. The two detected vinyl byproducts were identified first in this study with the decontamination system of liquid VX on solid surfaces using a mixture of hydrogen peroxide vapor and ammonia gas. The detailed decontamination reaction networks of VX on solid surfaces produced by the mixture of hydrogen peroxide vapor and ammonia gas were suggested based on the reaction products. These findings suggest that the mixture of hydrogen peroxide vapor and ammonia gas investigated in this study is an efficient decontaminant mixture for the removal of VX on solid surfaces at ambient temperature despite the formation of a toxic by-product in the reaction process.

  5. Silent Localization of Underwater Sensors Using Magnetometers

    Directory of Open Access Journals (Sweden)

    Jonas Callmer

    2010-01-01

    Full Text Available Sensor localization is a central problem for sensor networks. If the sensor positions are uncertain, the target tracking ability of the sensor network is reduced. Sensor localization in underwater environments is traditionally addressed using acoustic range measurements involving known anchor or surface nodes. We explore the usage of triaxial magnetometers and a friendly vessel with known magnetic dipole to silently localize the sensors. The ferromagnetic field created by the dipole is measured by the magnetometers and is used to localize the sensors. The trajectory of the vessel and the sensor positions are estimated simultaneously using an Extended Kalman Filter (EKF. Simulations show that the sensors can be accurately positioned using magnetometers.

  6. Optimum LED wavelength for underwater optical wireless communication at turbid water

    Science.gov (United States)

    Rosenkrantz, Etai; Arnon, Shlomi

    2014-10-01

    Underwater optical wireless communication is an emerging technology, which can provide high data rate. High data rate communication is required for applications such as underwater imaging, networks of sensors and swarms of underwater vehicles. These applications pursue an affordable light source, which can be obtained by light emitting diodes (LED). LEDs offer solutions characterized by low cost, high efficiency, reliability and compactness based on off-the-shelf components such as blue and green light emitting diodes. In this paper we present our recent theoretical and experimental results in this field.

  7. Underwater radiation measuring device

    International Nuclear Information System (INIS)

    Seki, Noriyuki; Suzuki, Yasuo

    1998-01-01

    The present invention provides a device for measuring, under water, radiation from spent fuels (long members to be detected) of nuclear power plants and reprocessing facilities. Namely, a detecting insertion tube (insertion tube) is disposed so as to be in parallel with axial direction of the long member to be detected stored underwater. A γ-ray detector is inserted to the inside of the insertion tube. A driving mechanism is disposed for moving the γ-ray detector in axial direction inside of the insertion tube. The driving mechanism preferably has a system that it moves the γ-ray detector by winding a detection signal cable around a driving drum. The driving mechanism is formed by inserting and securing a driving tube having screws formed on the side surface and inserting it into the insertion tube. It may have a system of moving the γ-ray detector together with the driving tube while engaging the teeth of a driving transfer mechanism with the screws of the driving tube. (I.S.)

  8. An underwater shear compactor

    International Nuclear Information System (INIS)

    Biver, E.; Sims, J.

    1997-01-01

    This paper, originally presented at the WM'96 Conference in Tucson Arizona, describes a concept of a specialised decommissioning tool designed to operate underwater and to reduce the volume of radioactive components by shearing and compacting. The shear compactor was originally conceived to manage the size reduction of a variety of decommissioned stainless steel tubes stored within a reactor fuel cooling pond and which were consuming a substantial volume of the pond. The main objective of this tool was to cut the long tubes into shorter lengths and to compact them into a flat rectangular form which could be stacked on the pond floor, thus saving valuable space. The development programme, undertaken on this project, investigated a wide range of factors which could contribute to an extended cutting blade performance, ie: materials of construction, cutting blade shape and cutting loads required, shock effects, etc. The second phase was to review other aspects of the design, such as radiological protection, cutting blade replacement, maintenance, pond installation and resultant wall loads, water hydraulics, collection of products of shearing/compacting operations, corrosion of the equipment, control system, operational safety and the ability of the equipment to operate in dry environments. The paper summarises the extended work programme involved with this shear compactor tool. (author)

  9. Underwater cutting techniques developments

    International Nuclear Information System (INIS)

    Bach, F.-W.

    1990-01-01

    The primary circuit structures of different nuclear powerplants are constructed out of stainless steels, ferritic steels, plated ferritic steels and alloys of aluminium. According to the level of the specific radiation of these structures, it is necessary for dismantling to work with remote controlled cutting techniques. The most successful way to protect the working crew against exposure of radiation is to operate underwater in different depths. The following thermal cutting processes are more or less developed to work under water: For ferritic steels only - flame cutting; For ferritic steels, stainless steels, cladded steels and aluminium alloys - oxy-arc-cutting, arc-waterjet-cutting with a consumable electrode, arc-saw-cutting, plasma-arc-cutting and plasma-arc-saw. The flame cutting is a burning process, all the other processes are melt-cutting processes. This paper explains the different techniques, giving a short introduction of the theory, a discussion of the possibilities with the advantages and disadvantages of these processes giving a view into the further research work in this interesting field. (author)

  10. Development of underwater laser cutting technology

    International Nuclear Information System (INIS)

    Sato, Seiichi; Inaba, Takanori; Inose, Koutarou; Matsumoto, Naoyuki; Sakakibara, Yuji

    2015-01-01

    In is desirable to use remote underwater device for the decommissioning work of highly radioactive components such as the nuclear internals from a view point of reducing the ranitidine exposure to the worker. Underwater laser cutting technology has advantages. First advantage in underwater laser cutting technology is that low reaction force during cutting, namely, remote operability is superior. Second point is that underwater laser cutting generates a little amount of secondary waste, because cutting kerf size is very small. Third point is that underwater laser cutting has low risk of the process delay, because device trouble is hard to happen. While underwater laser cutting has many advantages, the careful consideration in the safe treatment of the offgas which underwater laser cutting generates is necessary. This paper describes outline of underwater laser cutting technology developed by IHI Corporation (IHI) and that this technology is effective in various dismantling works in water. (author)

  11. Hybrid Warfare: Preparing for Future Conflict

    Science.gov (United States)

    2015-02-17

    ciceromagazine.com/?s=getting+behind+hybrid+warfare. Brown , Col Leslie F. “Twenty-First Century Warfare Will be Hybrid.” Carlisle Barracks, PA...Lebanon and Gaza.” Rand Corporation Occasional Paper. Santa Monica, CA: Rand Corporation, 2010. Jones, Gareth and Darya Korsunskaya. “U.S., EU

  12. Reactivity of Dual-Use Decontaminants with Chemical Warfare Agents

    Science.gov (United States)

    2016-07-01

    REACTIVITY OF DUAL-USE DECONTAMINANTS WITH CHEMICAL WARFARE AGENTS ECBC-TR-1384... Decontaminants with Chemical Warfare Agents 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Willis, Matthew P...extraction) of chemical warfare agents from materials. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent Liquid-phase

  13. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-11-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  14. The Information Warfare Life Cycle Model

    Directory of Open Access Journals (Sweden)

    Brett van Niekerk

    2011-03-01

    Full Text Available Information warfare (IW is a dynamic and developing concept, which constitutes a number of disciplines. This paper aims to develop a life cycle model for information warfare that is applicable to all of the constituent disciplines. The model aims to be scalable and applicable to civilian and military incidents where information warfare tactics are employed. Existing information warfare models are discussed, and a new model is developed from the common aspects of these existing models. The proposed model is then applied to a variety of incidents to test its applicability and scalability. The proposed model is shown to be applicable to multiple disciplines of information warfare and is scalable, thus meeting the objectives of the model.

  15. Underwater Gliders by Dr. Kevin Smith [video

    OpenAIRE

    Naval Postgraduate School Physics

    2015-01-01

    NPS Physics NPS Physics Research Projects Underwater glider research is currently underway in the physics department at the naval postgraduate in Monterey Ca. Dr. Kevin Smith is a specialist in underwater acoustics and sonar systems. He and his team are currently focused on autonomous underwater gliders and developing systems capable of detecting parameters in the ocean and listening for various sources of sound.

  16. Hybrid Underwater Vehicle: ARV Design and Development

    Directory of Open Access Journals (Sweden)

    Zhigang DENG

    2014-02-01

    Full Text Available The development of SMU-I, a new autonomous & remotely-operated vehicle (ARV is described. Since it has both the characteristics of autonomous underwater vehicle (AUV and remote operated underwater vehicle (ROV, it is able to achieve precision fix station operation and manual timely intervention. In the paper the initial design of basic components, such as vehicle, propulsion, batteries etc. and the control design of motion are introduced and analyzed. ROV’s conventional cable is replaced by a fiber optic cable, which makes it available for high-bandwidth real-time video, data telemetry and high-quality teleoperation. Furthermore, with the aid of the manual real-time remote operation and ranging sonar, it also resolves the AUV’s conflicting issue, which can absolutely adapt the actual complex sea environment and satisfy the unknown mission need. The whole battery system is designed as two-battery banks, whose voltages and temperatures are monitored through CAN (controller area network bus to avoid battery fire and explosion. A fuzzy-PID controller is designed for its motion control, including depth control and direction control. The controller synthesizes the advantage of fuzzy control and PID control, utilizes the fuzzy rules to on-line tune the parameters of PID controller, and achieves a better control effect. Experiment results demonstrate to show the effectiveness of the test-bed.

  17. Design of Autonomous Underwater Vehicle

    Directory of Open Access Journals (Sweden)

    Tadahiro Hyakudome

    2011-03-01

    Full Text Available There are concerns about the impact that global warming will have on our environment, and which will inevitably result in expanding deserts and rising water levels. While a lot of underwater vehicles are utilized, AUVs (Autonomous Underwater Vehicle were considered and chosen, as the most suitable tool for conduction survey concerning these global environmental problems. AUVs can comprehensive survey because the vehicle does not have to be connected to the support vessel by tether cable. When such underwater vehicles are made, it is necessary to consider about the following things. 1 Seawater and Water Pressure Environment, 2 Sink, 3 There are no Gas or Battery Charge Stations, 4 Global Positioning System cannot use, 5 Radio waves cannot use. In the paper, outline of above and how deal about it are explained.

  18. UNDERWATER COATINGS FOR CONTAMINATION CONTROL

    International Nuclear Information System (INIS)

    Julia L. Tripp; Kip Archibald; Ann Marie Phillips; Joseph Campbell

    2004-01-01

    The Idaho National Laboratory (INL) deactivated several aging nuclear fuel storage basins. Planners for this effort were greatly concerned that radioactive contamination present on the basin walls could become airborne as the sides of the basins became exposed during deactivation and allowed to dry after water removal. One way to control this airborne contamination was to fix the contamination in place while the pool walls were still submerged. There are many underwater coatings available on the market for marine, naval and other applications. A series of tests were run to determine whether the candidate underwater fixatives were easily applied and adhered well to the substrates (pool wall materials) found in INL fuel pools. Lab-scale experiments were conducted by applying fourteen different commercial underwater coatings to four substrate materials representative of the storage basin construction materials, and evaluating their performance. The coupons included bare concrete, epoxy painted concrete, epoxy painted carbon steel, and stainless steel. The evaluation criteria included ease of application, adherence to the four surfaces of interest, no change on water clarity or chemistry, non-hazardous in final applied form and be proven in underwater applications. A proprietary two-part, underwater epoxy owned by S. G. Pinney and Associates was selected from the underwater coatings tested for application to all four pools. Divers scrubbed loose contamination off the basin walls and floors using a ship hull scrubber and vacuumed up the sludge. The divers then applied the coating using a special powered roller with two separate heated hoses that allowed the epoxy to mix at the roller surface was used to eliminate pot time concerns. The walls were successfully coated and water was removed from the pools with no detectable airborne contamination releases

  19. Operational experience in underwater photogrammetry

    Science.gov (United States)

    Leatherdale, John D.; John Turner, D.

    Underwater photogrammetry has become established as a cost-effective technique for inspection and maintenance of platforms and pipelines for the offshore oil industry. A commercial service based in Scotland operates in the North Sea, USA, Brazil, West Africa and Australia. 70 mm cameras and flash units are built for the purpose and analytical plotters and computer graphics systems are used for photogrammetric measurement and analysis of damage, corrosion, weld failures and redesign of underwater structures. Users are seeking simple, low-cost systems for photogrammetric analysis which their engineers can use themselves.

  20. Underwater laser imaging system (UWLIS)

    Energy Technology Data Exchange (ETDEWEB)

    DeLong, M. [Lawrence Livermore National Lab., CA (United States)

    1994-11-15

    Practical limitations with underwater imaging systems area reached when the noise in the back scattered radiation generated in the water between the imaging system and the target obscures the spatial contrast and resolution necessary for target discovery and identification. The advent of high power lasers operating in the blue-green portion of the visible spectrum (oceanic transmission window) has led to improved experimental illumination systems for underwater imaging. Range-gated and synchronously scanned devices take advantage of the unique temporal and spatial coherence properties of laser radiation, respectively, to overcome the deleterious effects of common volume back scatter.

  1. Radioecological aspects of nuclear warfare

    International Nuclear Information System (INIS)

    Edvarson, K.

    1975-01-01

    The radioactive fallout from nuclear explosions is one of the major effects of nuclear warfare. Those levels causing acute radiation sickness are to be expected only within the close-in or intermediate areas downwind from surface bursts. Global fallout from high yield explosions will be fairly evenly distributed in the hemisphere where the explosions occurred and cause irradiation from ground deposit, inhaled material and contaminated food. The collective doses and the order of magnitude of late casualties from this global contamination are estimated for a given total explosion yield. (auth)

  2. A Dialectic for Network Centric Warfare

    Science.gov (United States)

    2005-06-01

    scientific realism through Salmon (1966), Popper (1934) and Kuhn (1962) to the epistemological anarchism of Feyerabend (1975). In this paper, we use an...Factors Society. Feyerabend , P. (1975), Against Method, Verso, London. Fischer, K., Muller, J.P. and Pischel, M. (1996). Cooperative

  3. Complexity Theory and Network Centric Warfare

    Science.gov (United States)

    2003-09-01

    in Surface Growth. Cambridge University Press. Cambridge, UK. 10 MANDELBROT B (1997). Fractals and Scaling in Finance . Springer-Verlag. 11 TURNER A...to Econophysics; Correlations and Complexity in Finance . Cambridge University Press. Cambridge, UK. ADDITIONAL REFERENCE 14 PEITGEN H-O, JURGENS H...realms of the unknown. Defence thinkers everywhere are searching forward for the science and alchemy that will deliver operational success. CCRP

  4. Implications of Outsourcing on Network Centric Warfare

    National Research Council Canada - National Science Library

    Brown, Michael

    2002-01-01

    The Department of Defense (DoD) has taken about 80 percent of the government cutbacks since the end of the Cold Wan As a means to fashion cost savings and gain efficiencies, DoD is seeking to streamline much of its infrastructure...

  5. The Control Packet Collision Avoidance Algorithm for the Underwater Multichannel MAC Protocols via Time-Frequency Masking

    Directory of Open Access Journals (Sweden)

    Yang Yu

    2016-01-01

    Full Text Available Establishing high-speed and reliable underwater acoustic networks among multiunmanned underwater vehicles (UUVs is basic to realize cooperative and intelligent control among different UUVs. Nevertheless, different from terrestrial network, the propagation speed of the underwater acoustic network is 1500 m/s, which makes the design of the underwater acoustic network MAC protocols a big challenge. In accordance with multichannel MAC protocols, data packets and control packets are transferred through different channels, which lowers the adverse effect of acoustic network and gradually becomes the popular issues of underwater acoustic networks MAC protocol research. In this paper, we proposed a control packet collision avoidance algorithm utilizing time-frequency masking to deal with the control packets collision in the control channel. This algorithm is based on the scarcity of the noncoherent underwater acoustic communication signals, which regards collision avoiding as separation of the mixtures of communication signals from different nodes. We first measure the W-Disjoint Orthogonality of the MFSK signals and the simulation result demonstrates that there exists time-frequency mask which can separate the source signals from the mixture of the communication signals. Then we present a pairwise hydrophones separation system based on deep networks and the location information of the nodes. Consequently, the time-frequency mask can be estimated.

  6. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  7. A new electronic control system for unmanned underwater vehicles

    OpenAIRE

    Molina Molina, J.C.; Guerrero González, A.; Gilabert, J.

    2015-01-01

    In this paper a new electronic control system for unmanned underwater vehicles is presented. This control system is characterized by a distribution in control over two network of type CANBus and Ethernet. This new electronic control system integrates functionalities of AUVs, as the automatic execution of preprogrammed trajectories. The control system also integrates an acoustic positioning system based on USBL. The information of relative positioning is sent through specific...

  8. Underwater noise due to precipitation

    DEFF Research Database (Denmark)

    Crum, Lawrence A.; Pumphrey, Hugh C.; Prosperetti, Andrea

    1989-01-01

    In 1959, G. Franz published a thorough investigation of the underwater sound produced by liquid drop impacts [G. Franz, J. Acoust. Soc. Am. 31, 1080 (1959)]. He discovered that, under certain conditions, a gas bubble was entrained by the impacting droplet, and the subsequent oscillation of this b...

  9. Underwater nuclear power plant structure

    International Nuclear Information System (INIS)

    Severs, S.; Toll, H.V.

    1982-01-01

    A structure for an underwater nuclear power generating plant comprising a triangular platform formed of tubular leg and truss members upon which are attached one or more large spherical pressure vessels and one or more small cylindrical auxiliary pressure vessels. (author)

  10. Underwater Robots Surface in Utah

    Science.gov (United States)

    Hurd, Randy C.; Hacking, Kip S.; Damarjian, Jennifer L.; Wright, Geoffrey A.; Truscott, Tadd

    2015-01-01

    Underwater robots (or ROVs: Remotely Operated Vehicles as they are typically called in industry) have recently become a very popular instructional STEM activity. Nationally, ROVs have been used in science and technology classrooms for several years in cities such as Seattle, San Diego, Virginia Beach, and other coastal areas. In the past two…

  11. Underwater Electromagnetic Sensor Networks—Part I: Link Characterization

    Directory of Open Access Journals (Sweden)

    Gara Quintana-Díaz

    2017-01-01

    Full Text Available Underwater Wireless Sensor Networks (UWSNs using electromagnetic (EM technology in marine shallow waters are examined, not just for environmental monitoring but for further interesting applications. Particularly, the use of EM waves is reconsidered in shallow waters due to the benefits offered in this context, where acoustic and optical technologies have serious disadvantages. Sea water scenario is a harsh environment for radiocommunications, and there is no standard model for the underwater EM channel. The high conductivity of sea water, the effect of seabed and the surface make the behaviour of the channel hard to predict. This justifies the need of link characterization as the first step to approach the development of EM underwater sensor networks. To obtain a reliable link model, measurements and simulations are required. The measuring setup for this purpose is explained and described, as well as the procedures used. Several antennas have been designed and tested in low frequency bands. Agreement between attenuation measurements and simulations at different distances was analysed and made possible the validation of simulation setups and the design of different communications layers of the system. This leads to the second step of this work, where data and routing protocols for the sensor network are examined.

  12. A Comprehensive Study on the Internet of Underwater Things: Applications, Challenges, and Channel Models

    Directory of Open Access Journals (Sweden)

    Chien-Chi Kao

    2017-06-01

    Full Text Available The Internet of Underwater Things (IoUT is a novel class of Internet of Things (IoT, and is defined as the network of smart interconnected underwater objects. IoUT is expected to enable various practical applications, such as environmental monitoring, underwater exploration, and disaster prevention. With these applications, IoUT is regarded as one of the potential technologies toward developing smart cities. To support the concept of IoUT, Underwater Wireless Sensor Networks (UWSNs have emerged as a promising network system. UWSNs are different from the traditional Territorial Wireless Sensor Networks (TWSNs, and have several unique properties, such as long propagation delay, narrow bandwidth, and low reliability. These unique properties would be great challenges for IoUT. In this paper, we provide a comprehensive study of IoUT, and the main contributions of this paper are threefold: (1 we introduce and classify the practical underwater applications that can highlight the importance of IoUT; (2 we point out the differences between UWSNs and traditional TWSNs, and these differences are the main challenges for IoUT; and (3 we investigate and evaluate the channel models, which are the technical core for designing reliable communication protocols on IoUT.

  13. A Comprehensive Study on the Internet of Underwater Things: Applications, Challenges, and Channel Models.

    Science.gov (United States)

    Kao, Chien-Chi; Lin, Yi-Shan; Wu, Geng-De; Huang, Chun-Ju

    2017-06-22

    The Internet of Underwater Things (IoUT) is a novel class of Internet of Things (IoT), and is defined as the network of smart interconnected underwater objects. IoUT is expected to enable various practical applications, such as environmental monitoring, underwater exploration, and disaster prevention. With these applications, IoUT is regarded as one of the potential technologies toward developing smart cities. To support the concept of IoUT, Underwater Wireless Sensor Networks (UWSNs) have emerged as a promising network system. UWSNs are different from the traditional Territorial Wireless Sensor Networks (TWSNs), and have several unique properties, such as long propagation delay, narrow bandwidth, and low reliability. These unique properties would be great challenges for IoUT. In this paper, we provide a comprehensive study of IoUT, and the main contributions of this paper are threefold: (1) we introduce and classify the practical underwater applications that can highlight the importance of IoUT; (2) we point out the differences between UWSNs and traditional TWSNs, and these differences are the main challenges for IoUT; and (3) we investigate and evaluate the channel models, which are the technical core for designing reliable communication protocols on IoUT.

  14. Moltke as a Model for Information Warfare

    National Research Council Canada - National Science Library

    Gallagher, Daniel P

    1998-01-01

    ... with late 20th century Information Warfare (IW). Clausewitz, with his emphasis on concentrating forces for a decisive battle, or Sun Tzu, with his focus on an indirect approach and subduing the enemy without battle, might appear to be more...

  15. Gas Warfare in World War I.

    Science.gov (United States)

    Flintham, A. J.

    1978-01-01

    The effectiveness of gas warfare during World War I was increased by the lack of a basic understanding of the behavior of gases on the part of the soldiers. This was a result of deficiencies in science education. (BB)

  16. Prehistoric ceremonial warfare: beginning of institutionalized violence

    Czech Academy of Sciences Publication Activity Database

    Turek, Jan

    2017-01-01

    Roč. 13, č. 3 (2017), s. 535-548 ISSN 1555-8622 Institutional support: RVO:67985912 Keywords : human aggression * ceremonial warfare * archery symbolism * Neolithic * Chalcolithic * Europe Subject RIV: AC - Archeology, Anthropology, Ethnology OBOR OECD: Archaeology

  17. On Cyber Warfare Command and Control Systems

    National Research Council Canada - National Science Library

    Howes, Norman R; Mezzino, Michael; Sarkesain, John

    2004-01-01

    .... Cyber warfare then becomes a one-sided battle where the attacker makes all the strikes and the target of the attack responds so slowly that the attacker usually gets away without being identified...

  18. Enzymatic Decontamination of Chemical Warfare Agents

    National Research Council Canada - National Science Library

    Raushel, Frank

    2000-01-01

    The primary objective of this research program is the development of a versatile enzyme-based system that is fully optimized for the decontamination, destruction, and detection of know chemical warfare agents...

  19. Mountain Warfare: The Need for Specialist Training

    National Research Council Canada - National Science Library

    Malik, Muhammad

    2003-01-01

    This study focuses on the need for specialist training for mountain warfare. It analyzes the special characteristics of mountain and high altitude terrain which affect conduct of military operations...

  20. Insurgent Uprising: An Unconventional Warfare Wargame

    Science.gov (United States)

    2017-12-01

    Cleveland, Charles T. Connett, and Will Irwin. “Unconventional Warfare in the Gray Zone.” Joint Forces Quarterly 80, no. 1 (2016). Work, Robert O...CODE 13. ABSTRACT (maximum 200 words) Today, and in the future, unconventional solutions will present U.S. policymakers with options for dealing...training objectives and will complement existing training exercises. 14. SUBJECT TERMS unconventional warfare, foreign internal defense, direct

  1. Route survey periodicity for mine warfare

    OpenAIRE

    Coke, Hartwell F.

    2009-01-01

    Approved for public release, distribution unlimited One of the Navy's most long standing challenges has been conquering the mine warfare threat. As mines and mine warfare techniques evolve and become more sophisticated, so does the United States' ability to counter the threat. The United States newest technique for countering a potential mined harbor, or route, is a process known as "change detection." This concept uses previous side scan sonar images of the area prior to a mining event an...

  2. Measurement and Modeling of Narrowband Channels for Ultrasonic Underwater Communications

    Directory of Open Access Journals (Sweden)

    Francisco J. Cañete

    2016-02-01

    Full Text Available Underwater acoustic sensor networks are a promising technology that allow real-time data collection in seas and oceans for a wide variety of applications. Smaller size and weight sensors can be achieved with working frequencies shifted from audio to the ultrasonic band. At these frequencies, the fading phenomena has a significant presence in the channel behavior, and the design of a reliable communication link between the network sensors will require a precise characterization of it. Fading in underwater channels has been previously measured and modeled in the audio band. However, there have been few attempts to study it at ultrasonic frequencies. In this paper, a campaign of measurements of ultrasonic underwater acoustic channels in Mediterranean shallow waters conducted by the authors is presented. These measurements are used to determine the parameters of the so-called κ-μ shadowed distribution, a fading model with a direct connection to the underlying physical mechanisms. The model is then used to evaluate the capacity of the measured channels with a closed-form expression.

  3. On the Probability of Predicting and Mapping Traditional Warfare Measurements to the Cyber Warfare Domain

    CSIR Research Space (South Africa)

    Grobler, M

    2014-07-01

    Full Text Available Cyber warfare is a contentious topic, with no agreement on whether this is a real possibility or an unrealistic extension of the physical battlefield. This article will not debate the validity and legality of the concept of cyber warfare...

  4. Cooperative OFDM underwater acoustic communications

    CERN Document Server

    Cheng, Xilin; Cheng, Xiang

    2016-01-01

    Following underwater acoustic channel modeling, this book investigates the relationship between coherence time and transmission distances. It considers the power allocation issues of two typical transmission scenarios, namely short-range transmission and medium-long range transmission. For the former scenario, an adaptive system is developed based on instantaneous channel state information. The primary focus is on cooperative dual-hop orthogonal frequency division multiplexing (OFDM). This book includes the decomposed fountain codes designed to enable reliable communications with higher energy efficiency. It covers the Doppler Effect, which improves packet transmission reliability for effective low-complexity mirror-mapping-based intercarrier interference cancellation schemes capable of suppressing the intercarrier interference power level. Designed for professionals and researchers in the field of underwater acoustic communications, this book is also suitable for advanced-level students in electrical enginee...

  5. International Conference on Underwater Environment

    CERN Document Server

    Jaulin, Luc; Creuze, Vincent; Debese, Nathalie; Quidu, Isabelle; Clement, Benoît; Billon-Coat, Annick

    2016-01-01

    This volume constitutes the results of the International Conference on Underwater Environment, MOQESM’14, held at “Le Quartz” Conference Center in Brest, France, on October 14-15, 2014, within the framework of the 9th Sea Tech Week, International Marine Science and Technology Event. The objective of MOQESM'14 was to bring together researchers from both academia and industry, interested in marine robotics and hydrography with application to the coastal environment mapping and underwater infrastructures surveys. The common thread of the conference is the combination of technical control, perception, and localization, typically used in robotics, with the methods of mapping and bathymetry. The papers presented in this book focus on two main topics. Firstly, coastal and infrastructure mapping is addressed, focusing not only on hydrographic systems, but also on positioning systems, bathymetry, and remote sensing. The proposed methods rely on acoustic sensors such as side scan sonars, multibeam echo sounders, ...

  6. Cutting method and device underwater

    International Nuclear Information System (INIS)

    Takano, Genta; Kamei, Hiromasa; Beppu, Seiji

    1998-01-01

    A place of material to be cut is surrounded by an openable/closable box. The material to be cut is cut underwater, and materials generated in this case are removed from the cut portion by a pressurized water jet. The removed materials are sucked and recovered together with water in the box. Among the materials caused by the cutting underwater, solid materials not floating on water are caused to stay in the midway of a sucking and recovering channel. A large sucking force might be required for the entire region of the sucking and recovering channel when sucking and recovering large sized solid materials not floating on water, but even large sized materials can be recovered easily according to the present invention since they are recovered after being sucked and stayed in the midway of the sucking and recovering channel. (N.H.)

  7. Taiwan's underwater cultural heritage documentation management

    Science.gov (United States)

    Tung, Y.-Y.

    2015-09-01

    Taiwan is an important trading and maritime channels for many countries since ancient time. Numerous relics lie underwater due to weather, wars, and other factors. In the year of 2006, Bureau of Cultural Heritage (BOCH) entrusted the Underwater Archaeological Team of Academia Sinica to execute the underwater archaeological investigation projects. Currently, we verified 78 underwater targets, with 78 site of those had been recognized as shipwrecks sites. Up to date, there is a collection of 638 underwater objects from different underwater archaeological sites. Those artefacts are distributed to different institutions and museums. As very diverse management methods/systems are applied for every individual institution, underwater cultural heritage data such as survey, excavation report, research, etc. are poorly organized and disseminated for use. For better communication regarding to Taiwan's underwater cultural heritage in every level, a universal format of documentation should be established. By comparing the existing checklist used in Taiwan with guidelines that are followed in other countries, a more intact and appropriate underwater cultural heritage condition documentation system can be established and adapted in Taiwan.

  8. The Impact of Irregular Warfare on the US Army

    National Research Council Canada - National Science Library

    McDonald, III, Roger L

    2006-01-01

    Although the U.S. Army has yet to clearly define irregular warfare, it is imperative that the Army take near-term action to enhance the ability of Soldiers and units to operate effectively in an irregular warfare environment...

  9. Dilemmas of Warfare in Densely Populated Civilian Areas

    OpenAIRE

    Moshe Tamir

    2012-01-01

    This essay attempts to present operational perspectives on conducting warfare in densely populated areas. It also distinguishes between three types of combat within this general category, with the goal of shedding light on this complex type of warfare.

  10. Underwater Coatings for Contamination Control

    International Nuclear Information System (INIS)

    Julia L. Tripp; Kip Archibald; Ann-Marie Phillips; Joseph Campbell

    2004-01-01

    The Idaho National Engineering and Environmental Laboratory (INEEL) is deactivating several fuel storage basins. Airborne contamination is a concern when the sides of the basins are exposed and allowed to dry during water removal. One way of controlling this airborne contamination is to fix the contamination in place while the pool walls are still submerged. There are many underwater coatings available on the market that are used in marine, naval and other applications. A series of tests were run to determine whether the candidate underwater fixatives are easily applied and adhere well to the substrates (pool wall materials) found in INEEL fuel pools. The four pools considered included (1) Test Area North (TAN-607) with epoxy painted concrete walls; (2) Idaho Nuclear Technology and Engineering Center (INTEC) (CPP-603) with bare concrete walls; (3) Materials Test Reactor (MTR) Canal with stainless steel lined concrete walls; and (4) Power Burst Facility (PBF-620) with stainless steel lined concrete walls on the bottom and epoxy painted carbon steel lined walls on the upper portions. Therefore, the four materials chosen for testing included bare concrete, epoxy painted concrete, epoxy painted carbon steel, and stainless steel. The typical water temperature of the pools varies from 55 F to 80 F dependent on the pool and the season. These tests were done at room temperature. The following criteria were used during this evaluation. The underwater coating must: (1) Be easy to apply; (2) Adhere well to the four surfaces of interest; (3) Not change or have a negative impact on water chemistry or clarity; (4) Not be hazardous in final applied form; and (5) Be proven in other underwater applications. In addition, it is desirable for the coating to have a high pigment or high cross-link density to prevent radiation from penetrating. This paper will detail the testing completed and the test results. A proprietary two-part, underwater epoxy owned by S. G. Pinney and Associates

  11. 'Surveyor': An Underwater System for Threat Material Detection

    International Nuclear Information System (INIS)

    Valkovic, Vladivoj; Sudac, Davorin; Nad, Karlo; Obhodas, Jasmina; Matika, Dario; Kollar, Robert

    2010-01-01

    The bottoms of the coastal seas, and oceans as well, are contaminated by many man-made objects including a variety of ammunition. This contamination is world wide spread with some areas being highly polluted presenting a serious threat to local population and to visitors as well. All littoral nations are investing lots of effort into the remediation of their coastal areas. Once the presence of the anomaly on the bottom of the shallow coastal sea water is confirmed (by visual identification and by using one or several sensors, namely magnetometer, sonar and optical cameras) it is necessary to establish if it contains explosive/chemical warfare charge. In our work we propose this to be performed by using neutron sensor installed within an underwater vessel - 'Surveyor'. When positioned above the object, or to its side, the system inspects the object for the presence of the threat material by using alpha particle tagged neutrons from the sealed tube d+t neutron generator. (author)

  12. Bridging the Gap in Port Security; Network Centric Theory Applied to Public/Private Collaboration

    National Research Council Canada - National Science Library

    Wright, Candice L

    2007-01-01

    ...." Admiral Thad Allen, 2007 The application of Network Centric Warfare theory enables all port stakeholders to better prepare for a disaster through increased information sharing and collaboration...

  13. Fort Laurdale Branch, Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1998-01-01

    ...) facility located on the Eastern Seaboard. Here, NSWC and other research and development activities conduct full-scale trials of air, surface, and underwater weapon systems under a variety of oceanographic conditions...

  14. Investigation of the Propagation Characteristics of Underwater Shock Waves in Underwater Drilling Blasting

    Directory of Open Access Journals (Sweden)

    Xin Liu

    2018-01-01

    Full Text Available During the first-stage project of the main channel of Ningbo-Zhoushan Port’s Shipu Harbor, underwater shock waves were monitored. By analyzing a typical measured pressure time history curve, the characteristics of underwater shock waves in an engineering context were obtained. We obtained a traditional exponential attenuation formula for underwater shock waves based on the measured data, simplified the model of underwater drilling blasting based on engineering practice, deduced a revised formula for underwater shock wave peak overpressure on the basis of dimensional analysis, established a linear fitting model, and obtained the undetermined coefficients of the revised formula using a linear regression analysis. In addition, the accuracies of the two formulas used to predict underwater shock wave peak overpressure and the significance order of influence and influence mechanism of factors included in the revised formula on the underwater shock wave peak overpressure were discussed.

  15. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  16. On the Accuracy Potential in Underwater/Multimedia Photogrammetry.

    Science.gov (United States)

    Maas, Hans-Gerd

    2015-07-24

    Underwater applications of photogrammetric measurement techniques usually need to deal with multimedia photogrammetry aspects, which are characterized by the necessity of handling optical rays that are refracted at interfaces between optical media with different refractive indices according to Snell's Law. This so-called multimedia geometry has to be incorporated into geometric models in order to achieve correct measurement results. The paper shows a flexible yet strict geometric model for the handling of refraction effects on the optical path, which can be implemented as a module into photogrammetric standard tools such as spatial resection, spatial intersection, bundle adjustment or epipolar line computation. The module is especially well suited for applications, where an object in water is observed by cameras in air through one or more planar glass interfaces, as it allows for some simplifications here. In the second part of the paper, several aspects, which are relevant for an assessment of the accuracy potential in underwater/multimedia photogrammetry, are discussed. These aspects include network geometry and interface planarity issues as well as effects caused by refractive index variations and dispersion and diffusion under water. All these factors contribute to a rather significant degradation of the geometric accuracy potential in underwater/multimedia photogrammetry. In practical experiments, a degradation of the quality of results by a factor two could be determined under relatively favorable conditions.

  17. Channel coding for underwater acoustic single-carrier CDMA communication system

    Science.gov (United States)

    Liu, Lanjun; Zhang, Yonglei; Zhang, Pengcheng; Zhou, Lin; Niu, Jiong

    2017-01-01

    CDMA is an effective multiple access protocol for underwater acoustic networks, and channel coding can effectively reduce the bit error rate (BER) of the underwater acoustic communication system. For the requirements of underwater acoustic mobile networks based on CDMA, an underwater acoustic single-carrier CDMA communication system (UWA/SCCDMA) based on the direct-sequence spread spectrum is proposed, and its channel coding scheme is studied based on convolution, RA, Turbo and LDPC coding respectively. The implementation steps of the Viterbi algorithm of convolutional coding, BP and minimum sum algorithms of RA coding, Log-MAP and SOVA algorithms of Turbo coding, and sum-product algorithm of LDPC coding are given. An UWA/SCCDMA simulation system based on Matlab is designed. Simulation results show that the UWA/SCCDMA based on RA, Turbo and LDPC coding have good performance such that the communication BER is all less than 10-6 in the underwater acoustic channel with low signal to noise ratio (SNR) from -12 dB to -10dB, which is about 2 orders of magnitude lower than that of the convolutional coding. The system based on Turbo coding with Log-MAP algorithm has the best performance.

  18. Investigation of Requirements and Capabilities of Next Generation Mine Warfare Unmanned Underwater Vehicles

    Science.gov (United States)

    2017-12-01

    horn” contacts something hard, which bends it, activating a chemical reaction to set off the explosive (NAP 2000). • Influence activation is the most...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA SYSTEMS ENGINEERING CAPSTONE PROJECT REPORT Approved for public release...performance. Model-based systems engineering (MBSE) tools, including functional flow block diagrams and functional hierarchies, are used to

  19. ROV Based Underwater Blurred Image Restoration

    Institute of Scientific and Technical Information of China (English)

    LIU Zhishen; DING Tianfu; WANG Gang

    2003-01-01

    In this paper, we present a method of ROV based image processing to restore underwater blurry images from the theory of light and image transmission in the sea. Computer is used to simulate the maximum detection range of the ROV under different water body conditions. The receiving irradiance of the video camera at different detection ranges is also calculated. The ROV's detection performance under different water body conditions is given by simulation. We restore the underwater blurry images using the Wiener filter based on the simulation. The Wiener filter is shown to be a simple useful method for underwater image restoration in the ROV underwater experiments. We also present examples of restored images of an underwater standard target taken by the video camera in these experiments.

  20. Quantum imaging for underwater arctic navigation

    Science.gov (United States)

    Lanzagorta, Marco

    2017-05-01

    The precise navigation of underwater vehicles is a difficult task due to the challenges imposed by the variable oceanic environment. It is particularly difficult if the underwater vehicle is trying to navigate under the Arctic ice shelf. Indeed, in this scenario traditional navigation devices such as GPS, compasses and gyrocompasses are unavailable or unreliable. In addition, the shape and thickness of the ice shelf is variable throughout the year. Current Arctic underwater navigation systems include sonar arrays to detect the proximity to the ice. However, these systems are undesirable in a wartime environment, as the sound gives away the position of the underwater vehicle. In this paper we briefly describe the theoretical design of a quantum imaging system that could allow the safe and stealthy navigation of underwater Arctic vehicles.

  1. ISIL's Hybrid Warfare in Syria & Iraq

    DEFF Research Database (Denmark)

    Sørensen, Heine

    2016-01-01

    of and ability to synchronize various instruments of power with a view to achieving their end-state. With regards to the second part of the problem statement, the analysis demonstrates how ISIL employed horizontal escalation and ambiguity initially, but later on turned to vertical escalation, within the military......The case study specifically seeks to answer the following problem statement: Does ISIL qualify as an actor using hybrid warfare and if so what characterizes their particular use of this type of warfare? Based on an analysis of ISIL’s warfare from August 2012 to August 2016 the chapter argues......, that it is possible to answer the first part of the problem statement in an affirmative way. Hence, ISIL is not only theoretically prone to hybridity by organizational setup, and by the people comprising the organization, but has in fact continuously acted according to a hybrid logic in its prioritization...

  2. Survey on Urban Warfare Augmented Reality

    Directory of Open Access Journals (Sweden)

    Xiong You

    2018-01-01

    Full Text Available Urban warfare has become one of the main forms of modern combat in the twenty-first century. The main reason why urban warfare results in hundreds of casualties is that the situational information of the combatant is insufficient. Accessing information via an Augmented Reality system can elevate combatants’ situational awareness to effectively improve the efficiency of decision-making and reduce the injuries. This paper begins with the concept of Urban Warfare Augmented Reality (UWAR and illuminates the objectives of developing UWAR, i.e., transparent battlefield, intuitional perception and natural interaction. Real-time outdoor registration, information presentation and natural interaction are presented as key technologies of a practical UWAR system. Then, the history and current research state of these technologies are summarized and their future developments are highlighted from three perspectives, i.e., (1 Better integration with Geographic Information System and Virtual Geographic Environment; (2 More intelligent software; (3 More powerful hardware.

  3. LAKE BAIKAL: Underwater neutrino detector

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    A new underwater detector soon to be deployed in Lake Baikal in Siberia, the world's deepest lake with depths down to 1.7 kilometres, could help probe the deepest mysteries of physics. One of the big unsolved problems of astrophysics is the origin of very energetic cosmic rays. However there are many ideas on how particles could be accelerated by exotic concentrations of matter and provide the majority of the Galaxy's high energy particles. Clarification would come from new detectors picking up the energetic photons and neutrinos from these sources

  4. Mongol Warfare in the Pre-Dissolution Period »

    Directory of Open Access Journals (Sweden)

    Timothy May

    2015-01-01

    Full Text Available Although the Mongols used many of the tactics and strategies that steppe nomads had used for centuries, the Mongols refined steppe warfare so that this style of warfare reached its apogee during the Mongol Empire. Furthermore, the Mongols developed a style of warfare that made them possibly the greatest military force in history. This work examines several facets of the pre-dissolution period (1200–1260. With the dissolution of the Mongol Empire, Mongol warfare once again changed. In some areas it remained complex while in others it regressed to traditional forces of steppe warfare, still potent but not as effective as the pre-dissolution period.

  5. Guiding Warfare to Reach Sustainable Peace

    DEFF Research Database (Denmark)

    Vestenskov, David; Drewes, Line

    The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition of develo......The conference report Guiding Warfare to Reach Sustainable Peace constitutes the primary outcome of the conference It is based on excerpts from the conference presenters and workshop discussions. Furthermore, the report contains policy recommendations and key findings, with the ambition...... of developing best practices in the education and implementation of IHL in capacity building of security forces....

  6. Models, Analysis, and Recommendations Pertaining to the Retention of Naval Special Warfare s Mid-Level Officers

    Science.gov (United States)

    2013-12-01

    The Analytic Hierarch/Network Process,” in Rev. R. Acad. Cien. Serie A. Mat (RACSAM), submitted by Francisco Javier Giron (Real Academia de Ciencias ...Academia de Ciencias : Spain. Scott, Nathan. Naval Special Warfare Officer Retention Survey. Monterey, CA: NPS Press, September 2013. Whittenberger

  7. Proteus II: Design and Evaluation of an Integrated Power-Efficient Underwater Sensor Node

    NARCIS (Netherlands)

    van Kleunen, W.A.P.; Moseley, N.A.; Havinga, Paul J.M.; Meratnia, Nirvana

    2015-01-01

    We describe the design and evaluation of an integrated low-cost underwater sensor node designed for reconfigurability, allowing continuous operation on a relatively small rechargeable battery for one month. The node uses a host CPU for the network protocols and processing sensor data and a separate

  8. Biological warfare, bioterrorism, and biocrime.

    Science.gov (United States)

    Jansen, H J; Breeveld, F J; Stijnis, C; Grobusch, M P

    2014-06-01

    Biological weapons achieve their intended target effects through the infectivity of disease-causing infectious agents. The ability to use biological agents in warfare is prohibited by the Biological and Toxin Weapon Convention. Bioterrorism is defined as the deliberate release of viruses, bacteria or other agents used to cause illness or death in people, but also in animals or plants. It is aimed at creating casualties, terror, societal disruption, or economic loss, inspired by ideological, religious or political beliefs. The success of bioterroristic attempts is defined by the measure of societal disruption and panic, and not necessarily by the sheer number of casualties. Thus, making only a few individuals ill by the use of crude methods may be sufficient, as long as it creates the impact that is aimed for. The assessment of bioterrorism threats and motives have been described before. Biocrime implies the use of a biological agent to kill or make ill a single individual or small group of individuals, motivated by revenge or the desire for monetary gain by extortion, rather than by political, ideological, religious or other beliefs. The likelihood of a successful bioterrorist attack is not very large, given the technical difficulties and constraints. However, even if the number of casualties is likely to be limited, the impact of a bioterrorist attack can still be high. Measures aimed at enhancing diagnostic and therapeutic capabilities and capacities alongside training and education will improve the ability of society to combat 'regular' infectious diseases outbreaks, as well as mitigating the effects of bioterrorist attacks. © 2014 The Authors Clinical Microbiology and Infection © 2014 European Society of Clinical Microbiology and Infectious Diseases.

  9. A new technique for robot vision in autonomous underwater vehicles using the color shift in underwater imaging

    Science.gov (United States)

    2017-06-01

    FOR ROBOT VISION IN AUTONOMOUS UNDERWATER VEHICLES USING THE COLOR SHIFT IN UNDERWATER IMAGING by Jake A. Jones June 2017 Thesis Advisor...techniques to determine the distances from each pixel to the camera. 14. SUBJECT TERMS unmanned undersea vehicles (UUVs), autonomous ... AUTONOMOUS UNDERWATER VEHICLES USING THE COLOR SHIFT IN UNDERWATER IMAGING Jake A. Jones Lieutenant Commander, United States Navy B.S

  10. Dynamics and Control of Underwater Gliders I: Steady Motions

    OpenAIRE

    Mahmoudian, N.; Geisbert, J.; Woolsey, C.

    2007-01-01

    This paper describes analysis of steady motions for underwater gliders, a type of highly efficient underwater vehicle which uses gravity for propulsion. Underwater gliders are winged underwater vehicles which locomote by modulating their buoyancy and their attitude. Several such vehicles have been developed and have proven their worth as efficient long-distance, long-duration ocean sampling platforms. To date, the primary emphasis in underwater glider development has been on locomotive effici...

  11. Underwater hydraulic shock shovel control system

    Science.gov (United States)

    Liu, He-Ping; Luo, A.-Ni; Xiao, Hai-Yan

    2008-06-01

    The control system determines the effectiveness of an underwater hydraulic shock shovel. This paper begins by analyzing the working principles of these shovels and explains the importance of their control systems. A new type of control system’s mathematical model was built and analyzed according to those principles. Since the initial control system’s response time could not fulfill the design requirements, a PID controller was added to the control system. System response time was still slower than required, so a neural network was added to nonlinearly regulate the proportional element, integral element and derivative element coefficients of the PID controller. After these improvements to the control system, system parameters fulfilled the design requirements. The working performance of electrically-controlled parts such as the rapidly moving high speed switch valve is largely determined by the control system. Normal control methods generally can’t satisfy a shovel’s requirements, so advanced and normal control methods were combined to improve the control system, bringing good results.

  12. Toward Operational Art in Special Warfare

    Science.gov (United States)

    2016-02-23

    combatant commanders develop special warfare cam- paign options for their theaters that can be integral parts of the national approach. Getting buy -in at...the resistance spawning franchise operations at home or abroad? – Is the resistance attracting funding or other forms of assistance (indigenous

  13. Warfare and the Teaching of History.

    Science.gov (United States)

    Salevouris, Michael J.

    1989-01-01

    Maintains that history teachers must challenge simplistic romantic notions about war. Proposes two approaches to teaching about war: the use of personal war narratives; and examining the relationship between warfare and society. Discusses literature related to these approaches. Contends that only through realistic assessments of war can peace be…

  14. The technical Dimensions of Nuclear Warfare

    International Nuclear Information System (INIS)

    Broda, E.

    1977-01-01

    This text, written by Engelbert Broda in 1977 is about the dimensions of nuclear warfare. Broda describes the devastating effects of the nuclear bombs dropped in 1945 in Hiroshima and Nagasaki and compares these effects with the explosive power of Hydrogen weapons. He also expresses his concerns about another nuclear ware and analyses possible worsening situations like change in the military doctrine. (nowak)

  15. Book Review COMPOSITE WARFARE: THE CONDUCT OF ...

    African Journals Online (AJOL)

    COMPOSITE WARFARE: THE CONDUCT OF. SUCCESSFUL GROUND FORCE. OPERATIONS IN AFRICA. Eeben Barlow. Abel Esterhuyse, PhD. Stellenbosch University. Pinetown: 30 Degrees South Publishers. 2015, 576 pages. ISBN 9781928211761. Africa is still one of the most conflict-ridden places on earth – from ...

  16. Biomonitoring of exposure to chemical warfare agents

    NARCIS (Netherlands)

    Noort, D.; Schans, M.J. van der; Benschop, H.P.

    2006-01-01

    An overview is presented of the major methods that are presently available for biomonitoring of exposure to chemical warfare agents, i.e., nerve agents and sulfur mustard. These methods can be applied for a variety of purposes such as diagnosis and dosimetry of exposure of casualties, verification

  17. New Developments in Chinese Strategic Psychological Warfare

    Science.gov (United States)

    2005-01-01

    Taoism , which coupled hardness with softness in warfare, was not the only influence on the theory of psychological operations in ancient China. Other...portraying Islamic martyrs who appear to speak to soldiers from the clouds.38 In contemporary wars, such as the Gulf War, the first targets attacked have

  18. 4th Pacific Rim Underwater Acoustics Conference

    CERN Document Server

    Xu, Wen; Cheng, Qianliu; Zhao, Hangfang

    2016-01-01

    These proceedings are a collection of 16 selected scientific papers and reviews by distinguished international experts that were presented at the 4th Pacific Rim Underwater Acoustics Conference (PRUAC), held in Hangzhou, China in October 2013. The topics discussed at the conference include internal wave observation and prediction; environmental uncertainty and coupling to sound propagation; environmental noise and ocean dynamics; dynamic modeling in acoustic fields; acoustic tomography and ocean parameter estimation; time reversal and matched field processing; underwater acoustic localization and communication as well as measurement instrumentations and platforms. These proceedings provide insights into the latest developments in underwater acoustics, promoting the exchange of ideas for the benefit of future research.

  19. Passive aquatic listener (PAL): An adoptive underwater acoustic recording system for the marine environment

    International Nuclear Information System (INIS)

    Anagnostou, Marios N.; Nystuen, Jeffrey A.; Anagnostou, Emmanouil N.; Papadopoulos, Anastasios; Lykousis, Vassilios

    2011-01-01

    The ambient sound field in the ocean is a combination of natural and manmade sounds. Consequently, the interpretation of the ambient sound field can be used to quantify these processes. In the frequency range from 1 to 50 kHz, the general character of ocean ambient sound is a slowly changing background that is closely associated with local wind speed, interspersed with shorter time scale events such as rain storms, ships and animal calls. At lower frequencies the underwater ambient sound budget includes geologically generated sound activities including underwater volcanic eruptions, seismic and seepage faults that generate bubbles, etc. that can also potentially be classified and quantified. Acoustic data are collected on hydrophones. Hydrophones are simple, robust sensors that can be deployed on most ocean instrumentation systems including surface or sub-surface moorings, bottom mounted systems, drifters, ARGO floats or autonomous underwater platforms. A dedicated oceanic underwater recorder called a passive acoustic listener (PAL) has been developed. A principal issue is to accurately distinguish different sound sources so that they can be quantified as part of a sound budget, and then quantified if appropriate. Based on ongoing data collected from the Poseidon II network the retrieval potential of multi-parameters from underwater sound, including meteorological (i.e., precipitation and winds) and in general geophysical, anthropogenetic (i.e., ships, submarines, etc.) and biological (whales, etc.) sources is presented.

  20. Passive aquatic listener (PAL): An adoptive underwater acoustic recording system for the marine environment

    Energy Technology Data Exchange (ETDEWEB)

    Anagnostou, Marios N., E-mail: managnostou@ath.hcmr.g [Hellenic Center for Marine Research, Department of Inland Waters, Anavissos (Greece); Nystuen, Jeffrey A. [Hellenic Center for Marine Research, Department of Inland Waters, Anavissos (Greece); Applied Physics Laboratory, University of Washington, Seattle, WA (United States); Anagnostou, Emmanouil N. [Hellenic Center for Marine Research, Department of Inland Waters, Anavissos (Greece); Department of Civil and Environmental Engineering, University of Connecticut, CT (United States); Papadopoulos, Anastasios [Hellenic Center for Marine Research, Department of Inland Waters, Anavissos (Greece); Lykousis, Vassilios [Hellenic Center for Marine Research, Department of Oceanography, Anavissos (Greece)

    2011-01-21

    The ambient sound field in the ocean is a combination of natural and manmade sounds. Consequently, the interpretation of the ambient sound field can be used to quantify these processes. In the frequency range from 1 to 50 kHz, the general character of ocean ambient sound is a slowly changing background that is closely associated with local wind speed, interspersed with shorter time scale events such as rain storms, ships and animal calls. At lower frequencies the underwater ambient sound budget includes geologically generated sound activities including underwater volcanic eruptions, seismic and seepage faults that generate bubbles, etc. that can also potentially be classified and quantified. Acoustic data are collected on hydrophones. Hydrophones are simple, robust sensors that can be deployed on most ocean instrumentation systems including surface or sub-surface moorings, bottom mounted systems, drifters, ARGO floats or autonomous underwater platforms. A dedicated oceanic underwater recorder called a passive acoustic listener (PAL) has been developed. A principal issue is to accurately distinguish different sound sources so that they can be quantified as part of a sound budget, and then quantified if appropriate. Based on ongoing data collected from the Poseidon II network the retrieval potential of multi-parameters from underwater sound, including meteorological (i.e., precipitation and winds) and in general geophysical, anthropogenetic (i.e., ships, submarines, etc.) and biological (whales, etc.) sources is presented.

  1. A Predictive Model of Surface Warfare Officer Retention: Factors Affecting Turnover

    National Research Council Canada - National Science Library

    Gjurich, Gregory

    1999-01-01

    Junior Surface Warfare Officer retention is in a crisis. The Surface Warfare Officer community anticipates an inability to fill Department Head billets due to the number of junior Surface Warfare Officers leaving military service...

  2. Underwater Object Segmentation Based on Optical Features

    Directory of Open Access Journals (Sweden)

    Zhe Chen

    2018-01-01

    Full Text Available Underwater optical environments are seriously affected by various optical inputs, such as artificial light, sky light, and ambient scattered light. The latter two can block underwater object segmentation tasks, since they inhibit the emergence of objects of interest and distort image information, while artificial light can contribute to segmentation. Artificial light often focuses on the object of interest, and, therefore, we can initially identify the region of target objects if the collimation of artificial light is recognized. Based on this concept, we propose an optical feature extraction, calculation, and decision method to identify the collimated region of artificial light as a candidate object region. Then, the second phase employs a level set method to segment the objects of interest within the candidate region. This two-phase structure largely removes background noise and highlights the outline of underwater objects. We test the performance of the method with diverse underwater datasets, demonstrating that it outperforms previous methods.

  3. Underwater photogrammetry successful in Spain and France

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    Underwater photogrammetry has been used to measure distortions in fuel assembly alignment pins in the upper internals of the Almarez and Dampierre PWRs. Photogrammetry is a three-dimensional precision measurement method using photographic techniques for the on-site measurement phase. On the strength of the operations at the two PWRs, underwater photogrammetry is now considered as a practical and effective technique for dimensional inspection at nuclear plants. (U.K.)

  4. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 2: Command, Control, Communications and Computer Architectures

    National Research Council Canada - National Science Library

    Cogan, Kevin J; De Lucio, Ray

    2003-01-01

    ...), which hypothesizes that a robustly networked force improves information sharing, collaboration, quality of information, and shared situational awareness resulting in significantly increased mission effectiveness...

  5. 3D Laser Scanner for Underwater Manipulation

    Directory of Open Access Journals (Sweden)

    Albert Palomer

    2018-04-01

    Full Text Available Nowadays, research in autonomous underwater manipulation has demonstrated simple applications like picking an object from the sea floor, turning a valve or plugging and unplugging a connector. These are fairly simple tasks compared with those already demonstrated by the mobile robotics community, which include, among others, safe arm motion within areas populated with a priori unknown obstacles or the recognition and location of objects based on their 3D model to grasp them. Kinect-like 3D sensors have contributed significantly to the advance of mobile manipulation providing 3D sensing capabilities in real-time at low cost. Unfortunately, the underwater robotics community is lacking a 3D sensor with similar capabilities to provide rich 3D information of the work space. In this paper, we present a new underwater 3D laser scanner and demonstrate its capabilities for underwater manipulation. In order to use this sensor in conjunction with manipulators, a calibration method to find the relative position between the manipulator and the 3D laser scanner is presented. Then, two different advanced underwater manipulation tasks beyond the state of the art are demonstrated using two different manipulation systems. First, an eight Degrees of Freedom (DoF fixed-base manipulator system is used to demonstrate arm motion within a work space populated with a priori unknown fixed obstacles. Next, an eight DoF free floating Underwater Vehicle-Manipulator System (UVMS is used to autonomously grasp an object from the bottom of a water tank.

  6. 3D Laser Scanner for Underwater Manipulation.

    Science.gov (United States)

    Palomer, Albert; Ridao, Pere; Youakim, Dina; Ribas, David; Forest, Josep; Petillot, Yvan

    2018-04-04

    Nowadays, research in autonomous underwater manipulation has demonstrated simple applications like picking an object from the sea floor, turning a valve or plugging and unplugging a connector. These are fairly simple tasks compared with those already demonstrated by the mobile robotics community, which include, among others, safe arm motion within areas populated with a priori unknown obstacles or the recognition and location of objects based on their 3D model to grasp them. Kinect-like 3D sensors have contributed significantly to the advance of mobile manipulation providing 3D sensing capabilities in real-time at low cost. Unfortunately, the underwater robotics community is lacking a 3D sensor with similar capabilities to provide rich 3D information of the work space. In this paper, we present a new underwater 3D laser scanner and demonstrate its capabilities for underwater manipulation. In order to use this sensor in conjunction with manipulators, a calibration method to find the relative position between the manipulator and the 3D laser scanner is presented. Then, two different advanced underwater manipulation tasks beyond the state of the art are demonstrated using two different manipulation systems. First, an eight Degrees of Freedom (DoF) fixed-base manipulator system is used to demonstrate arm motion within a work space populated with a priori unknown fixed obstacles. Next, an eight DoF free floating Underwater Vehicle-Manipulator System (UVMS) is used to autonomously grasp an object from the bottom of a water tank.

  7. Information operation/information warfare modeling and simulation

    OpenAIRE

    Buettner, Raymond

    2000-01-01

    Information Operations have always been a part of warfare. However, this aspect of warfare is having ever-greater importance as forces rely more and more on information as an enabler. Modern information systems make possible very rapid creation, distribution, and utilization of information. These same systems have vulnerabilities that can be exploited by enemy forces. Information force-on-force is important and complex. New tools and procedures are needed for this warfare arena. As these t...

  8. Underwater welding and repair technologies applied in PWR environment

    International Nuclear Information System (INIS)

    Scandella, Fabrice; Carpreau, Jean-Michel

    2012-01-01

    The authors describe several welding processes and technologies which have been used for underwater applications and which can be applied when repairing components of a PWR type reactor. They address, describe and discuss wet arc welding processes, the peculiarities of underwater welding, and the use of various processes such as 111, 114 and 135 processes, underwater welding with the hybrid plasma MIG-MAG process, underwater welding with the laser wire process, underwater welding with the FSW, FSP or UWFSW processes, underwater welding with variants of the friction welding process (friction surfacing, taper stitch welding, hydro-pillar processing

  9. Military Engineers and Chemical Warfare Troops (Inzhenernye Voiska Khimicheskie Voiska),

    Science.gov (United States)

    MILITARY FORCES(FOREIGN), *MILITARY ORGANIZATIONS, MILITARY ENGINEERING , INFANTRY, AMPHIBIOUS OPERATIONS, MINELAYING, ARMORED VEHICLES, NUCLEAR...RADIATION, DOSIMETERS, CHEMICAL WARFARE, PROTECTIVE CLOTHING, DECONTAMINATION, HEALTH PHYSICS.

  10. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  11. Are Current Psychological Operations Procedures Adequate in Information Warfare?

    National Research Council Canada - National Science Library

    Duff, Murray

    1997-01-01

    .... While some aspects of information warfare are conducted domestically, many are executed on foreign soil and involve extensive interaction with other governments, their population, non-governmental...

  12. Computational models of intergroup competition and warfare.

    Energy Technology Data Exchange (ETDEWEB)

    Letendre, Kenneth (University of New Mexico); Abbott, Robert G.

    2011-11-01

    This document reports on the research of Kenneth Letendre, the recipient of a Sandia Graduate Research Fellowship at the University of New Mexico. Warfare is an extreme form of intergroup competition in which individuals make extreme sacrifices for the benefit of their nation or other group to which they belong. Among animals, limited, non-lethal competition is the norm. It is not fully understood what factors lead to warfare. We studied the global variation in the frequency of civil conflict among countries of the world, and its positive association with variation in the intensity of infectious disease. We demonstrated that the burden of human infectious disease importantly predicts the frequency of civil conflict and tested a causal model for this association based on the parasite-stress theory of sociality. We also investigated the organization of social foraging by colonies of harvester ants in the genus Pogonomyrmex, using both field studies and computer models.

  13. Handbook of toxicology of chemical warfare agents

    CERN Document Server

    2010-01-01

    This groundbreaking book covers every aspect of deadly toxic chemicals used as weapons of mass destruction and employed in conflicts, warfare and terrorism. Including findings from experimental as well as clinical studies, this one-of-a-kind handbook is prepared in a very user- friendly format that can easily be followed by students, teachers and researchers, as well as lay people. Stand-alone chapters on individual chemicals and major topics allow the reader to easily access required information without searching through the entire book. This is the first book that offers in-depth coverage of individual toxicants, target organ toxicity, major incidents, toxic effects in humans, animals and wildlife, biosensors, biomarkers, on-site and laboratory analytical methods, decontamination and detoxification procedures, prophylactic, therapeutic and countermeasures, and the role of homeland security. Presents a comprehensive look at all aspects of chemical warfare toxicology in one reference work. This saves research...

  14. Chemical warfare agents. Classes and targets.

    Science.gov (United States)

    Schwenk, Michael

    2018-09-01

    Synthetic toxic chemicals (toxicants) and biological poisons (toxins) have been developed as chemical warfare agents in the last century. At the time of their initial consideration as chemical weapon, only restricted knowledge existed about their mechanisms of action. There exist two different types of acute toxic action: nonspecific cytotoxic mechanisms with multiple chemo-biological interactions versus specific mechanisms that tend to have just a single or a few target biomolecules. TRPV1- and TRPA-receptors are often involved as chemosensors that induce neurogenic inflammation. The present work briefly surveys classes and toxicologically relevant features of chemical warfare agents and describes mechanisms of toxic action. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. Mapping the Spread of Mounted Warfare

    Directory of Open Access Journals (Sweden)

    Peter Turchin

    2016-12-01

    Full Text Available Military technology is one of the most important factors affecting the evolution of complex societies. In particular, mounted warfare, the use of horse-riders in military operations, revolutionized war as it spread to different parts of Eurasia and Africa during the Ancient and Medieval eras, and to the Americas during the Early Modern period. Here we use a variety of sources to map this spread.

  16. Maritime Trade Warfare Against a Modern Power

    Science.gov (United States)

    2013-05-20

    Malaysian and Singaporean support. Operational Environment The previous sections have assessed that an oil embargo would be effective at influencing...will be addressed. The first approach is to stop the trade at its source. This approach forms the foundation of many contemporary sanctions. Under...antisubmarine warfare capable ships, could be sufficient to defend against forces attempting to break a blockade, and a carrier battle group in the Indian Ocean

  17. Navy Operational Planner - Undersea Warfare Module

    Science.gov (United States)

    2016-09-01

    concepts are considered in NOP–USW that are not in previous research: time phasing of missions, mutually exclusive missions, and asset availability...operational planning efforts. NOP–USW suggests the correct allocation of assets across a wide theater of operation to accomplish missions in the...Master’s thesis 4. TITLE AND SUBTITLE NAVY OPERATIONAL PLANNER – UNDERSEA WARFARE MODULE 5. FUNDING NUMBERS 6. AUTHOR(S) Guy A. Molina 7

  18. Toward Operational Art in Special Warfare: Appendixes

    Science.gov (United States)

    2016-01-01

    language, proficiency in small-unit tactics, and the ability to build and fight alongside indigenous combat formations in a permissive, uncertain, or...counterinsurgency through and with indigenous forces or personnel.”1 The report has four aims: (1) to adapt conventional operational art to the unique...perfect near-real-time situational awareness,” at least at the tactical level of land warfare in complex terrain. But the idea of leveraging information

  19. Human Injury Criteria for Underwater Blasts.

    Directory of Open Access Journals (Sweden)

    Rachel M Lance

    Full Text Available Underwater blasts propagate further and injure more readily than equivalent air blasts. Development of effective personal protection and countermeasures, however, requires knowledge of the currently unknown human tolerance to underwater blast. Current guidelines for prevention of underwater blast injury are not based on any organized injury risk assessment, human data or experimental data. The goal of this study was to derive injury risk assessments for underwater blast using well-characterized human underwater blast exposures in the open literature. The human injury dataset was compiled using 34 case reports on underwater blast exposure to 475 personnel, dating as early as 1916. Using severity ratings, computational reconstructions of the blasts, and survival information from a final set of 262 human exposures, injury risk models were developed for both injury severity and risk of fatality as functions of blast impulse and blast peak overpressure. Based on these human data, we found that the 50% risk of fatality from underwater blast occurred at 302±16 kPa-ms impulse. Conservatively, there is a 20% risk of pulmonary injury at a kilometer from a 20 kg charge. From a clinical point of view, this new injury risk model emphasizes the large distances possible for potential pulmonary and gut injuries in water compared with air. This risk value is the first impulse-based fatality risk calculated from human data. The large-scale inconsistency between the blast exposures in the case reports and the guidelines available in the literature prior to this study further underscored the need for this new guideline derived from the unique dataset of actual injuries in this study.

  20. Micromachined fiber optic Fabry-Perot underwater acoustic probe

    Science.gov (United States)

    Wang, Fuyin; Shao, Zhengzheng; Hu, Zhengliang; Luo, Hong; Xie, Jiehui; Hu, Yongming

    2014-08-01

    One of the most important branches in the development trend of the traditional fiber optic physical sensor is the miniaturization of sensor structure. Miniature fiber optic sensor can realize point measurement, and then to develop sensor networks to achieve quasi-distributed or distributed sensing as well as line measurement to area monitoring, which will greatly extend the application area of fiber optic sensors. The development of MEMS technology brings a light path to address the problems brought by the procedure of sensor miniaturization. Sensors manufactured by MEMS technology possess the advantages of small volume, light weight, easy fabricated and low cost. In this paper, a fiber optic extrinsic Fabry-Perot interferometric underwater acoustic probe utilizing micromachined diaphragm collaborated with fiber optic technology and MEMS technology has been designed and implemented to actualize underwater acoustic sensing. Diaphragm with central embossment, where the embossment is used to anti-hydrostatic pressure which would largely deflect the diaphragm that induce interferometric fringe fading, has been made by double-sided etching of silicon on insulator. By bonding the acoustic-sensitive diaphragm as well as a cleaved fiber end in ferrule with an outer sleeve, an extrinsic Fabry-Perot interferometer has been constructed. The sensor has been interrogated by quadrature-point control method and tested in field-stable acoustic standing wave tube. Results have been shown that the recovered signal detected by the sensor coincided well with the corresponding transmitted signal and the sensitivity response was flat in frequency range from 10 Hz to 2kHz with the value about -154.6 dB re. 1/μPa. It has been manifest that the designed sensor could be used as an underwater acoustic probe.

  1. Underwater Calibration of Dome Port Pressure Housings

    Science.gov (United States)

    Nocerino, E.; Menna, F.; Fassi, F.; Remondino, F.

    2016-03-01

    Underwater photogrammetry using consumer grade photographic equipment can be feasible for different applications, e.g. archaeology, biology, industrial inspections, etc. The use of a camera underwater can be very different from its terrestrial use due to the optical phenomena involved. The presence of the water and camera pressure housing in front of the camera act as additional optical elements. Spherical dome ports are difficult to manufacture and consequently expensive but at the same time they are the most useful for underwater photogrammetry as they keep the main geometric characteristics of the lens unchanged. Nevertheless, the manufacturing and alignment of dome port pressure housing components can be the source of unexpected changes of radial and decentring distortion, source of systematic errors that can influence the final 3D measurements. The paper provides a brief introduction of underwater optical phenomena involved in underwater photography, then presents the main differences between flat and dome ports to finally discuss the effect of manufacturing on 3D measurements in two case studies.

  2. Centralised versus Decentralised Control Reconfiguration for Collaborating Underwater Robots

    DEFF Research Database (Denmark)

    Furno, Lidia; Nielsen, Mikkel Cornelius; Blanke, Mogens

    2015-01-01

    The present paper introduces an approach to fault-tolerant reconfiguration for collaborating underwater robots. Fault-tolerant reconfiguration is obtained using the virtual actuator approach, Steen (2005). The paper investigates properties of a centralised versus a decentralised implementation an...... an underwater drill needs to be transported and positioned by three collaborating robots as part of an underwater autonomous operation....

  3. The Cycle of Warfare - Analysis of an Analytical Model

    DEFF Research Database (Denmark)

    Jensen, Mikkel Storm

    2016-01-01

    by its economic, political and ideological characteristics. With the single assumption of economic rationality in human behaviour, Cycle of Warfare is not only coherent, it is applicable to all entities engaged in competition anywhere in the world at any point in history. The Cycle of Warfare can be used...

  4. Surface Warfare Officers Initial Training For Future Success

    Science.gov (United States)

    2018-03-01

    9 A school is initial rating specific technical training that is given to sailors. 14 Figure 4. Less...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT SURFACE WARFARE OFFICERS— INITIAL TRAINING FOR FUTURE SUCCESS March 2018...professional report 4. TITLE AND SUBTITLE SURFACE WARFARE OFFICERS—INITIAL TRAINING FOR FUTURE SUCCESS 5. FUNDING NUMBERS 6. AUTHOR(S) Arron J

  5. Anti-Air Warfare Research for Naval Forces

    NARCIS (Netherlands)

    Bloemen, A.A.F.; Witberg, R.

    2000-01-01

    AAW is a warfare area with wide-spread spectrum. Command and Control Systems, sensors, effectors and electronic warfare are integrated to a system, they influence each other and must eventually be effective in coordinated action. This complexity asks for Operations Research methods to measure

  6. Chemical profiling of chemical warfare agents for forensic purposes

    NARCIS (Netherlands)

    Noort, D.; Reuver, L.P.J. de; Fidder, A.; Tromp, M.; Verschraagen, M.

    2010-01-01

    A program has been initiated towards the chemical profiling of chemical warfare agents, in order to support forensic investigations towards synthesis routes, production sites and suspect chemical suppliers. Within the first stage of the project various chemical warfare agents (VX, sulfur mustard,

  7. Operational advantages of using Cyber Electronic Warfare (CEW) in the battlefield

    Science.gov (United States)

    Yasar, Nurgul; Yasar, Fatih M.; Topcu, Yucel

    2012-06-01

    While cyberspace is emerging as a new battlefield, conventional Electronic Warfare (EW) methods and applications are likely to change. Cyber Electronic Warfare (CEW) concept which merges cyberspace capabilities with traditional EW methods, is a new and enhanced form of the electronic attack. In this study, cyberspace domain of the battlefield is emphazised and the feasibility of integrating Cyber Warfare (CW) concept into EW measures is researched. The SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis method is used to state the operational advantages of using CEW concept in the battlefield. The operational advantages of CEW are assessed by means of its effects on adversary air defense systems, communication networks and information systems. Outstanding technological and operational difficulties are pointed out as well. As a result, a comparison of CEW concept and conventional EW applications is presented. It is concluded that, utilization of CEW concept is feasible at the battlefield and it may yield important operational advantages. Even though the computers of developed military systems are less complex than normal computers, they are not subjected to cyber threats since they are closed systems. This concept intends to show that these closed systems are also open to the cyber threats. As a result of the SWOT analysis, CEW concept provides Air Forces to be used in cyber operations effectively. On the other hand, since its Collateral Damage Criteria (CDC) is low, the usage of cyber electronic attack systems seems to grow up.

  8. Spectral analysis of underwater explosions in the Dead Sea

    Science.gov (United States)

    Gitterman, Y.; Ben-Avraham, Z.; Ginzburg, A.

    1998-08-01

    The present study utilizes the Israel Seismic Network (ISN) as a spatially distributed multichannel system for the discrimination of low-magnitude events (ML UWEs) and 16 earthquakes in the magnitude range ML = 1.6-2.8, within distances of 10-150 km, recorded by the ISN, were selected for the analysis. The analysis is based on a smoothed (0.5 Hz window) Fourier spectrum of the whole signal (defined by the signal-to-noise criterion), without picking separate wave phases. It was found that the classical discriminant of the seismic energy ratio between the relatively low-frequency (1-6 Hz) and high-frequency (6-11 Hz) bands, averaged over an ISN subnetwork, showed an overlap between UWEs and earthquakes and cannot itself provide reliable identification. We developed and tested a new multistation discriminant based on the low- frequency spectral modulation (LFSM) method. In our case the LFSM is associated with the bubbling effect in underwater explosions. The method demonstrates a distinct azimuth-invariant coherency of spectral shapes in the low-frequency range (1-12 Hz) of short-period seismometer systems. The coherency of the modulated spectra for different ISN stations was measured by semblance statistics commonly used in seismic prospecting for phase correlation in the time domain. The modified statistics provided an almost complete separation between earthquakes and underwater explosions.

  9. A Survey on Intermediation Architectures for Underwater Robotics

    Directory of Open Access Journals (Sweden)

    Xin Li

    2016-02-01

    Full Text Available Currently, there is a plethora of solutions regarding interconnectivity and interoperability for networked robots so that they will fulfill their purposes in a coordinated manner. In addition to that, middleware architectures are becoming increasingly popular due to the advantages that they are capable of guaranteeing (hardware abstraction, information homogenization, easy access for the applications above, etc.. However, there are still scarce contributions regarding the global state of the art in intermediation architectures for underwater robotics. As far as the area of robotics is concerned, this is a major issue that must be tackled in order to get a holistic view of the existing proposals. This challenge is addressed in this paper by studying the most compelling pieces of work for this kind of software development in the current literature. The studied works have been assessed according to their most prominent features and capabilities. Furthermore, by studying the individual pieces of work and classifying them several common weaknesses have been revealed and are highlighted. This provides a starting ground for the development of a middleware architecture for underwater robotics capable of dealing with these issues.

  10. Power Control Optimization of an Underwater Piezoelectric Energy Harvester

    Directory of Open Access Journals (Sweden)

    Iñigo Aramendia

    2018-03-01

    Full Text Available Over the past few years, it has been established that vibration energy harvesters with intentionally designed components can be used for frequency bandwidth enhancement under excitation for sufficiently high vibration amplitudes. Pipelines are often necessary means of transporting important resources such as water, gas, and oil. A self-powered wireless sensor network could be a sustainable alternative for in-pipe monitoring applications. A new control algorithm has been developed and implemented into an underwater energy harvester. Firstly, a computational study of a piezoelectric energy harvester for underwater applications has been studied for using the kinetic energy of water flow at four different Reynolds numbers Re = 3000, 6000, 9000, and 12,000. The device consists of a piezoelectric beam assembled to an oscillating cylinder inside the water of pipes from 2 to 5 inches in diameter. Therefore, unsteady simulations have been performed to study the dynamic forces under different water speeds. Secondly, a new control law strategy based on the computational results has been developed to extract as much energy as possible from the energy harvester. The results show that the harvester can efficiently extract the power from the kinetic energy of the fluid. The maximum power output is 996.25 µW and corresponds to the case with Re = 12,000.

  11. Survivability design for a hybrid underwater vehicle

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Biao; Wu, Chao; Li, Xiang; Zhao, Qingkai; Ge, Tong [State Key Lab of Ocean Engineering, School of Naval Architecture, Ocean and Civil Engineering, Shanghai Jiao Tong University, Shanghai 200240 (China)

    2015-03-10

    A novel hybrid underwater robotic vehicle (HROV) capable of working to the full ocean depth has been developed. The battery powered vehicle operates in two modes: operate as an untethered autonomous vehicle in autonomous underwater vehicle (AUV) mode and operate under remote control connected to the surface vessel by a lightweight, fiber optic tether in remotely operated vehicle (ROV) mode. Considering the hazardous underwater environment at the limiting depth and the hybrid operating modes, survivability has been placed on an equal level with the other design attributes of the HROV since the beginning of the project. This paper reports the survivability design elements for the HROV including basic vehicle design of integrated navigation and integrated communication, emergency recovery strategy, distributed architecture, redundant bus, dual battery package, emergency jettison system and self-repairing control system.

  12. Survivability design for a hybrid underwater vehicle

    International Nuclear Information System (INIS)

    Wang, Biao; Wu, Chao; Li, Xiang; Zhao, Qingkai; Ge, Tong

    2015-01-01

    A novel hybrid underwater robotic vehicle (HROV) capable of working to the full ocean depth has been developed. The battery powered vehicle operates in two modes: operate as an untethered autonomous vehicle in autonomous underwater vehicle (AUV) mode and operate under remote control connected to the surface vessel by a lightweight, fiber optic tether in remotely operated vehicle (ROV) mode. Considering the hazardous underwater environment at the limiting depth and the hybrid operating modes, survivability has been placed on an equal level with the other design attributes of the HROV since the beginning of the project. This paper reports the survivability design elements for the HROV including basic vehicle design of integrated navigation and integrated communication, emergency recovery strategy, distributed architecture, redundant bus, dual battery package, emergency jettison system and self-repairing control system

  13. Application of underwater radon measurements in geology

    Energy Technology Data Exchange (ETDEWEB)

    Varhegyi, A.; Baranyi, I.; Gerzson, I. (Mecsek Ore Mining Enterprise, Pecs (Hungary)); Somogyi, G.; Hakl, J.; Hunyadi, I. (Magyar Tudomanyos Akademia, Debrecen (Hungary). Atommag Kutato Intezete)

    1988-01-01

    Based on the observed phenomenon of geogas migration in microbubble form from deeper regions, the authors have developed a new model for the vertical transport of radon released from deeper sources. The physical properties of the rock relating to the upflow of microbubbles below the groundwater level are considered and the radon transport parameter of rocks is introduced. The vertical distribution of radon concentration in the case of a multi-layered geological model is given and the penetration depth of underwater radon measurements is examined. Aspects of underwater radon detection by the nuclear track detector technique are analyzed. The radon transport model gives a new theoretical basis for several applications of radon measurements in geology. The advantages of underwater radon detection have already been proved in uranium exploration. Further geological applications are proposed in earthquake prediction, in volcanology, in the survey of active faults and thermal waters. (author).

  14. Hybrid Warfare Studies and Russia’s Example in Crimea

    Directory of Open Access Journals (Sweden)

    Mehmet Seyfettin EROL

    2015-12-01

    Full Text Available Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel. September 11th attacks and 2006 Israel-Lebanon war played important roles for the evolution of hybrid warfare theories. However, there has not any consensus among scholars on a exact or unique definition of hybrid warfare. Hybrid warfare became one of the main security issues for the West and especially for NATO after the Russia-Ukraine crisis. Russian military strategies, called “hybrid warfare” by the western countries, resulted in the successful annexation of Crimea and, caused a serious security problem for the West resulting important structural and functional changes for the military system of NATO. Russian activities, which have been based on surprise, ambiguity and deniability, presented a unique example for hybrid warfare studies.

  15. Underwater laser cutting of metallic structures

    International Nuclear Information System (INIS)

    Alfille, J.P.; Schildknecht, J.; Ramaswami, V.S.

    1993-01-01

    In the frame of an european contract, the feasibility of the underwater cutting with a CO 2 laser power is studied. The aim of this work is the dismantling metallic structures of reactors pools. The paper analyzes the general concept of the experimental device, the underwater cutting head, the experimenting vessel, examples of cuttings in dismantling situation with a 500 W CO 2 laser, and examples of cuttings with a 5 kW CO 2 laser. (author). 2 refs., 9 figs., 2 tabs

  16. Integrated Optimization of Long-Range Underwater Signal Detection, Feature Extraction, and Classification for Nuclear Treaty Monitoring

    NARCIS (Netherlands)

    Tuma, M.; Rorbech, V.; Prior, M.; Igel, C.

    2016-01-01

    We designed and jointly optimized an integrated signal processing chain for detection and classification of long-range passive-acoustic underwater signals recorded by the global geophysical monitoring network of the Comprehensive Nuclear-Test-Ban Treaty Organization. Starting at the level of raw

  17. OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS

    Directory of Open Access Journals (Sweden)

    Giuseppe CAFORIO

    2013-01-01

    Full Text Available Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to face during their missions. A picture emerges of feelings and experiences relating to their first impression upon arriving in the theatre, relations with local armed forces, relations with the local population and local authorities, relations with NGOs, relations with other armies, the impact of the rules of engagement (ROEs, training and education, and operational experiences. The paper ends with a discussion of the lessons learned.

  18. Axial Vircator for Electronic Warfare Applications

    Directory of Open Access Journals (Sweden)

    L. Drazan

    2009-12-01

    Full Text Available This paper deals with a high power microwave generator with virtual cathode – vircator in axial release for electronic warfare applications. The classification of directed energy weapons microwave (DEWM is introduced together with basic block diagrams of a particular class of DEWM. In the paper, methods for designing vircator pulsed power supply, axial vircator structure, measurement methods and experimental results are presented. The vircator in electromagnetic ammunition is powered by magneto-cumulative generator and in weapons for defense of objects (WDO, it is powered by Marx generator. The possible applications of a vircator in the DEWM area are discussed.

  19. Electronic warfare receivers and receiving systems

    CERN Document Server

    Poisel, Richard A

    2014-01-01

    Receivers systems are considered the core of electronic warfare (EW) intercept systems. Without them, the fundamental purpose of such systems is null and void. This book considers the major elements that make up receiver systems and the receivers that go in them.This resource provides system design engineers with techniques for design and development of EW receivers for modern modulations (spread spectrum) in addition to receivers for older, common modulation formats. Each major module in these receivers is considered in detail. Design information is included as well as performance tradeoffs o

  20. Network-Centric Maritime Radiation Awareness and Interdiction Experiments

    National Research Council Canada - National Science Library

    Bordetsky, Alex; Dougan, Arden D; Nekoogar, Faranak

    2006-01-01

    .... This joint NPS-LLNL project is based on the NPS Tactical Network Topology (TNT) comprised of long-haul OFDM networks combined with self-forming wireless mesh links to air, surface, ground, and underwater unmanned vehicles...

  1. Human Factors Issues When Operating Underwater Remotely Operated Vehicles and Autonomous Underwater Vehicles

    Science.gov (United States)

    2011-03-01

    etiquette (Parasuraman & Miller, 2004). Through natural and intuitive communication, Johnson et al., (2007) hope that this interface will instill greater...and etiquette in high criticality automated systems. Communications of the ACM, 47(4), 51-55. Parasuraman, R., & Riley, V. (1997). Humans and... protocols for underwater wireless communications. IEEE Communications Magazine, pp. 97-102. Quazi, A. H., & Konrad, W. L. (1982, March 1982). Underwater

  2. IVO develops a new repair technique for underwater sites. Viscous doughlike substance underwater cracks

    Energy Technology Data Exchange (ETDEWEB)

    Klingstedt, G.; Leisio, C. [ed.

    1998-07-01

    A viscous sealant is revolutionizing repair of the stone and concrete masonry of underwater dams, bridges and canals. There is now no need for expensive and time-consuming cofferdams, since a diver can extrude quick-setting mortar into underwater structures needing repair. This technique has worked well in recent years in various parts of Finland even in strongly flowing water. IVO experts are now starting to look more beyond the borders of Finland

  3. Underwater object classification using scattering transform of sonar signals

    Science.gov (United States)

    Saito, Naoki; Weber, David S.

    2017-08-01

    In this paper, we apply the scattering transform (ST)-a nonlinear map based off of a convolutional neural network (CNN)-to classification of underwater objects using sonar signals. The ST formalizes the observation that the filters learned by a CNN have wavelet-like structure. We achieve effective binary classification both on a real dataset of Unexploded Ordinance (UXOs), as well as synthetically generated examples. We also explore the effects on the waveforms with respect to changes in the object domain (e.g., translation, rotation, and acoustic impedance, etc.), and examine the consequences coming from theoretical results for the scattering transform. We show that the scattering transform is capable of excellent classification on both the synthetic and real problems, thanks to having more quasi-invariance properties that are well-suited to translation and rotation of the object.

  4. Underwater noise generated by offshore pile driving

    NARCIS (Netherlands)

    Tsouvalas, A.

    2015-01-01

    Anthropogenic noise emission in the marine environment has always been an environmental issue of serious concern. In particular, the noise generated during the installation of foundation piles is considered to be one of the most significant sources of underwater noise pollution. This is mainly

  5. Underwater image mosaicking and visual odometry

    Science.gov (United States)

    Sadjadi, Firooz; Tangirala, Sekhar; Sorber, Scott

    2017-05-01

    This paper summarizes the results of studies in underwater odometery using a video camera for estimating the velocity of an unmanned underwater vehicle (UUV). Underwater vehicles are usually equipped with sonar and Inertial Measurement Unit (IMU) - an integrated sensor package that combines multiple accelerometers and gyros to produce a three dimensional measurement of both specific force and angular rate with respect to an inertial reference frame for navigation. In this study, we investigate the use of odometry information obtainable from a video camera mounted on a UUV to extract vehicle velocity relative to the ocean floor. A key challenge with this process is the seemingly bland (i.e. featureless) nature of video data obtained underwater which could make conventional approaches to image-based motion estimation difficult. To address this problem, we perform image enhancement, followed by frame to frame image transformation, registration and mosaicking/stitching. With this approach the velocity components associated with the moving sensor (vehicle) are readily obtained from (i) the components of the transform matrix at each frame; (ii) information about the height of the vehicle above the seabed; and (iii) the sensor resolution. Preliminary results are presented.

  6. Efficient Modelling Methodology for Reconfigurable Underwater Robots

    DEFF Research Database (Denmark)

    Nielsen, Mikkel Cornelius; Blanke, Mogens; Schjølberg, Ingrid

    2016-01-01

    This paper considers the challenge of applying reconfigurable robots in an underwater environment. The main result presented is the development of a model for a system comprised of N, possibly heterogeneous, robots dynamically connected to each other and moving with 6 Degrees of Freedom (DOF). Th...

  7. Underwater Adhesives Retrofit Pipelines with Advanced Sensors

    Science.gov (United States)

    2015-01-01

    Houston-based Astro Technology Inc. used a partnership with Johnson Space Center to pioneer an advanced fiber-optic monitoring system for offshore oil pipelines. The company's underwater adhesives allow it to retrofit older deepwater systems in order to measure pressure, temperature, strain, and flow properties, giving energy companies crucial data in real time and significantly decreasing the risk of a catastrophe.

  8. Human Injury Criteria for Underwater Blasts

    Science.gov (United States)

    2014-09-08

    further underscored the need for this new guideline based on injury data. Conference Name: Personal Armour Systems Symposium Conference Date...29.  Cole, R., Underwater Explosion. (Dover Publications, Inc ., New York, N.Y., 1948) 30.  Nakahara, M., Nagayama, K, Mori, Y, Japanese Journal...Abstract of the Undersea and Hyperbaric Medical Society, Inc . Annual Scientific Meeting, (1976).

  9. Impacts of underwater noise on marine vertebrates

    NARCIS (Netherlands)

    Liebschner, Alexander; Seibel, Henrike; Teilmann, Jonas; Wittekind, Dietrich; Parmentier, Eric; Dähne, Michael; Dietz, Rune; Driver, Jörg; Elk, van Cornelis; Everaarts, Eligius; Findeisen, Henning; Kristensen, Jacob; Lehnert, Kristina; Lucke, Klaus; Merck, Thomas; Müller, Sabine; Pawliczka, Iwona; Ronnenberg, Katrin; Rosenberger, Tanja; Ruser, Andreas; Tougaard, Jakob; Schuster, Max; Sundermeyer, Janne; Sveegaard, Signe; Siebert, Ursula

    2016-01-01

    The project conducts application-oriented research on impacts of underwater noise on marine vertebrates in the North and Baltic Seas. In distinct subprojects, the hearing sensitivity of harbor porpoises and gray seals as well as the acoustic tolerance limit of harbor porpoises to impulsive noise

  10. An ontological knowledge base for cyber network attack planning

    CSIR Research Space (South Africa)

    Chan, P

    2015-03-01

    Full Text Available In modern warfare it is no longer sufficient to only focus on physical attacks and counter-measures; the threat against cyber networks is becoming increasingly significant. Modern military forces have to provide counter measures against...

  11. A Reference Architecture for Network-Centric Information Systems

    National Research Council Canada - National Science Library

    Renner, Scott; Schaefer, Ronald

    2003-01-01

    This paper presents the "C2 Enterprise Reference Architecture" (C2ERA), which is a new technical concept of operations for building information systems better suited to the Network-Centric Warfare (NCW) environment...

  12. History of chemical and biological warfare agents

    International Nuclear Information System (INIS)

    Szinicz, L.

    2005-01-01

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents

  13. History of chemical and biological warfare agents.

    Science.gov (United States)

    Szinicz, L

    2005-10-30

    Chemical and biological warfare agents constitute a low-probability, but high-impact risk both to the military and to the civilian population. The use of hazardous materials of chemical or biological origin as weapons and for homicide has been documented since ancient times. The first use of chemicals in terms of weapons of mass destruction goes back to World War I, when on April 22, 1915 large amounts of chlorine were released by German military forces at Ypres, Belgium. Until around the 1970s of the 20th century, the awareness of the threat by chemical and biological agents had been mainly confined to the military sector. In the following time, the development of increasing range delivery systems by chemical and biological agents possessors sensitised public attention to the threat emanating from these agents. Their proliferation to the terrorists field during the 1990s with the expanding scale and globalisation of terrorist attacks suggested that these agents are becoming an increasing threat to the whole world community. The following article gives a condensed overview on the history of use and development of the more prominent chemical and biological warfare agents.

  14. [Decontamination of chemical and biological warfare agents].

    Science.gov (United States)

    Seto, Yasuo

    2009-01-01

    Chemical and biological warfare agents (CBWA's) are diverse in nature; volatile acute low-molecular-weight toxic compounds, chemical warfare agents (CWA's, gaseous choking and blood agents, volatile nerve gases and blister agents, nonvolatile vomit agents and lacrymators), biological toxins (nonvolatile low-molecular-weight toxins, proteinous toxins) and microbes (bacteria, viruses, rickettsiae). In the consequence management against chemical and biological terrorism, speedy decontamination of victims, facilities and equipment is required for the minimization of the damage. In the present situation, washing victims and contaminated materials with large volumes of water is the basic way, and additionally hypochlorite salt solution is used for decomposition of CWA's. However, it still remains unsolved how to dispose large volumes of waste water, and the decontamination reagents have serious limitation of high toxicity, despoiling nature against the environments, long finishing time and non-durability in effective decontamination. Namely, the existing decontamination system is not effective, nonspecifically affecting the surrounding non-target materials. Therefore, it is the urgent matter to build up the usable decontamination system surpassing the present technologies. The symposiast presents the on-going joint project of research and development of the novel decontamination system against CBWA's, in the purpose of realizing nontoxic, fast, specific, effective and economical terrorism on-site decontamination. The projects consists of (1) establishment of the decontamination evaluation methods and verification of the existing technologies and adaptation of bacterial organophosphorus hydrolase, (2) development of adsorptive elimination technologies using molecular recognition tools, and (4) development of deactivation technologies using photocatalysis.

  15. Developing cyber security architecture for military networks using cognitive networking

    OpenAIRE

    Kärkkäinen, Anssi

    2015-01-01

    In recent years, the importance of cyber security has increased. Cyber security has not become a critical issue only for governmental or business actors, but also for armed forces that nowadays rely on national or even global networks in their daily activities. The Network Centric Warfare (NCW) paradigm has increased the significance of networking during last decades as it enables information superiority in which military combat power increased by networking the battlefield actors from perspe...

  16. A Novel Fractional Fourier Transform-Based ASK-OFDM System for Underwater Acoustic Communications

    Directory of Open Access Journals (Sweden)

    Rami Ashri

    2017-12-01

    Full Text Available A key research area in wireless transmission is underwater communications. It has a vital role in applications such as underwater sensor networks (UWSNs and disaster detection. The underwater channel is very unique as compared to other alternatives of transmission channels. It is characterized by path loss, multipath fading, Doppler spread and ambient noise. Thus, the bit error rate (BER is increased to a large extent when compared to its counterpart of cellular communications. Acoustic signals are the current best solution for underwater communications. The use of electromagnetic or optical waves obviously entails a much higher data rate. However, they suffer from high attenuation, absorption or scattering. This paper proposes a novel fractional fast Fourier transform (FrFT—orthogonal frequency division multiplexing (FrFT-OFDM system for underwater acoustic (UWA communication—which employs the amplitude shift keying (ASK modulation technique (FrFT-ASK-OFDM. Specifically, ASK achieves a better bandwidth efficiency as compared to other commonly used modulation techniques, such as quadrature amplitude modulation (QAM and phase shift keying (PSK. In particular, the system proposed in this article can achieve a very promising BER performance, and can reach higher data rates when compared to other systems proposed in the literature. The BER performance of the proposed system is evaluated numerically, and is compared to the corresponding M-ary QAM system in the UWA channel for the same channel conditions. Moreover, the performance of the proposed system is compared to the conventional fast Fourier transform (FFT-OFDM (FFT-OFDM system in the absence and presence of the effect of carrier frequency offset (CFO. Numerical results show that the proposed system outperforms the conventional FFT-based systems for UWA channels, even in channels dominated by CFO. Moreover, the spectral efficiency and data rate of the proposed system are approximately double

  17. A Wide Area Risk Assessment Framework for Underwater Military Munitions Response

    Science.gov (United States)

    Holland, K. T.; Calantoni, J.

    2017-12-01

    Our objective was to develop a prototype statistical framework supporting Wide Area Assessment and Remedial Investigation decisions relating to the risk of unexploded ordnance and other military munitions concentrated in underwater environments. Decision making involving underwater munitions is inherently complex due to the high degree of uncertainty in the environmental conditions that force munitions responses (burial, decay, migration, etc.) and associated risks to the public. The prototype framework provides a consistent approach to accurately delineating contaminated areas at underwater munitions sites through the estimation of most probable concentrations. We adapted existing deterministic models and environmental data services for use within statistical modules that allowed the estimation of munition concentration given historic site information and environmental attributes. Ultimately this risk surface can be used to evaluate costs associated with various remediation approaches (e.g. removal, monitoring, etc.). Unfortunately, evaluation of the assessment framework was limited due to the lack of enduser data services from munition site managers. Of the 450 U.S. sites identified as having potential contamination with underwater munitions, assessment of available munitions information (including historic firing or disposal records, and recent ground-truth munitions samples) indicated very limited information in the databases. Example data types include the most probable munition types, approximate firing / disposal dates and locations, and any supportive munition survey or sampling results. However the overall technical goal to integrate trained statistical belief networks with detailed geophysical knowledge of sites, of sensors and of the underwater environment was demonstrated and should allow probabilistic estimates of the most likely outcomes and tradeoffs while managing uncertainty associated with military munitions response.

  18. Drone Warfare: Twenty-First Century Empire and Communications

    Directory of Open Access Journals (Sweden)

    Kevin Howley

    2017-02-01

    Full Text Available This paper, part of a larger project that examines drones from a social-construction of technology perspective, considers drone warfare in light of Harold Innis’s seminal work on empire and communication. Leveraging leading-edge aeronautics with advanced optics, data processing, and networked communication, drones represent an archetypal “space-biased” technology. Indeed, by allowing remote operators and others to monitor, select, and strike targets from half a world away, and in real-time, these weapon systems epitomize the “pernicious neglect of time” Innis sought to identify and remedy in his later writing. With Innis’s time-space dialectic as a starting point, then, the paper considers drones in light of a longstanding paradox of American culture: the impulse to collapse the geographical distance between the United States and other parts of the globe, while simultaneously magnifying the cultural difference between Americans and other peoples and societies. In the midst of the worldwide proliferation of drones, this quintessentially sublime technology embodies this (disconnect in important, profound, and ominous ways.

  19. Stability analysis of hybrid-driven underwater glider

    Science.gov (United States)

    Niu, Wen-dong; Wang, Shu-xin; Wang, Yan-hui; Song, Yang; Zhu, Ya-qiang

    2017-10-01

    Hybrid-driven underwater glider is a new type of unmanned underwater vehicle, which combines the advantages of autonomous underwater vehicles and traditional underwater gliders. The autonomous underwater vehicles have good maneuverability and can travel with a high speed, while the traditional underwater gliders are highlighted by low power consumption, long voyage, long endurance and good stealth characteristics. The hybrid-driven underwater gliders can realize variable motion profiles by their own buoyancy-driven and propeller propulsion systems. Stability of the mechanical system determines the performance of the system. In this paper, the Petrel-II hybrid-driven underwater glider developed by Tianjin University is selected as the research object and the stability of hybrid-driven underwater glider unitedly controlled by buoyancy and propeller has been targeted and evidenced. The dimensionless equations of the hybrid-driven underwater glider are obtained when the propeller is working. Then, the steady speed and steady glide path angle under steady-state motion have also been achieved. The steady-state operating conditions can be calculated when the hybrid-driven underwater glider reaches the desired steady-state motion. And the steadystate operating conditions are relatively conservative at the lower bound of the velocity range compared with the range of the velocity derived from the method of the composite Lyapunov function. By calculating the hydrodynamic coefficients of the Petrel-II hybrid-driven underwater glider, the simulation analysis has been conducted. In addition, the results of the field trials conducted in the South China Sea and the Danjiangkou Reservoir of China have been presented to illustrate the validity of the analysis and simulation, and to show the feasibility of the method of the composite Lyapunov function which verifies the stability of the Petrel-II hybrid-driven underwater glider.

  20. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  1. Irregular Warfare: Impact on Future Professional Military Education

    National Research Council Canada - National Science Library

    Paschal, David G

    2006-01-01

    ... to operate effectively in an irregular warfare environment. The utility of a decisive war between nation states continues to decline and will eventually reach critical mass based upon the extreme imbalance of military power and a U.S. monopoly...

  2. FFT Based VLSI Digital One Bit Electronic Warfare Receiver

    National Research Council Canada - National Science Library

    Chien-In, Henry

    1998-01-01

    ... (1 GHz) digital receiver designed for electronic warfare applications. The receiver can process two simultaneous signals and has the potential for fabrication on a single multi-chip module (MCM...

  3. Back to the Basics: An Aviation Solution to Counterinsurgent Warfare

    National Research Council Canada - National Science Library

    Davis, Arthur D

    2005-01-01

    .... By examining past examples of the use of air power in counterinsurgent warfare, this study sheds light on the United States' current failings in both equipment and doctrine as it wages this type of war...

  4. Precision Warfare Enables Interdependent Fires and Maneuver in 2010

    National Research Council Canada - National Science Library

    Smith, John

    1997-01-01

    The U.S. Army is in the midst of a revolution in military affairs (RMA). Significant advancements in informational technologies and precision weapons are providing unprecedented potential for future warfare...

  5. Irregular Warfare: Special Operations Joint Professional Military Education Transformation

    National Research Council Canada - National Science Library

    Cannady, Bryan H

    2008-01-01

    ... on today's battlefront in Afghanistan and Iraq and in the Global War on Terrorism (GWOT). At the forefront of the GWOT and irregular warfare are the United States Special Operations Command (USSOCOM...

  6. Irregular Warfare: New Challenges for Civil-Military Relations

    National Research Council Canada - National Science Library

    Cronin, Patrick M

    2008-01-01

    .... Irregular warfare introduces new complications to what Eliot Cohen has called an unequal dialogue between civilian and military leaders in which civilian leaders hold the true power but must modulate...

  7. Echoes of Chechnya Warfare Resound in Moscow, Quantico

    National Research Council Canada - National Science Library

    Ackerman, Robert

    2000-01-01

    .... thinking about urban warfare. After suffering stunning public defeats just a few years ago, Russian forces applied painful lessons learned then to drive Chechen forces out of their capital city, Grozny, this year...

  8. zero day exploits and national readiness for cyber-warfare

    African Journals Online (AJOL)

    HOD

    A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.

  9. The Role of Airpower in Urban Warfare. An Airman's Perspective

    National Research Council Canada - National Science Library

    Saffold, Timothy

    1998-01-01

    .... This emphasis on surface force employment stifles innovative thought as to how military forces can achieve operational and strategic effects by employing airpower as the key instrument of force in urban warfare...

  10. Fourth Generation Warfare: The Need for a Comprehensive Approach

    National Research Council Canada - National Science Library

    Benton, LeRoy D

    2008-01-01

    .... A definition of Fourth Generation Warfare is developed, based on Col. Thomas X. Hammes' writings. The definition is further developed to show relevance and applicability to current operations in the Long War on Terrorism...

  11. Two Hop Adaptive Vector Based Quality Forwarding for Void Hole Avoidance in Underwater WSNs.

    Science.gov (United States)

    Javaid, Nadeem; Ahmed, Farwa; Wadud, Zahid; Alrajeh, Nabil; Alabed, Mohamad Souheil; Ilahi, Manzoor

    2017-08-01

    Underwater wireless sensor networks (UWSNs) facilitate a wide range of aquatic applications in various domains. However, the harsh underwater environment poses challenges like low bandwidth, long propagation delay, high bit error rate, high deployment cost, irregular topological structure, etc. Node mobility and the uneven distribution of sensor nodes create void holes in UWSNs. Void hole creation has become a critical issue in UWSNs, as it severely affects the network performance. Avoiding void hole creation benefits better coverage over an area, less energy consumption in the network and high throughput. For this purpose, minimization of void hole probability particularly in local sparse regions is focused on in this paper. The two-hop adaptive hop by hop vector-based forwarding (2hop-AHH-VBF) protocol aims to avoid the void hole with the help of two-hop neighbor node information. The other protocol, quality forwarding adaptive hop by hop vector-based forwarding (QF-AHH-VBF), selects an optimal forwarder based on the composite priority function. QF-AHH-VBF improves network good-put because of optimal forwarder selection. QF-AHH-VBF aims to reduce void hole probability by optimally selecting next hop forwarders. To attain better network performance, mathematical problem formulation based on linear programming is performed. Simulation results show that by opting these mechanisms, significant reduction in end-to-end delay and better throughput are achieved in the network.

  12. Efficient Underwater RSS Value to Distance Inversion Using the Lambert Function

    Directory of Open Access Journals (Sweden)

    Majid Hosseini

    2014-01-01

    Full Text Available There are many applications for using wireless sensor networks (WSN in ocean science; however, identifying the exact location of a sensor by itself (localization is still a challenging problem, where global positioning system (GPS devices are not applicable underwater. Precise distance measurement between two sensors is a tool of localization and received signal strength (RSS, reflecting transmission loss (TL phenomena, is widely used in terrestrial WSNs for that matter. Underwater acoustic sensor networks have not been used (UASN, due to the complexity of the TL function. In this paper, we addressed these problems by expressing underwater TL via the Lambert W function, for accurate distance inversion by the Halley method, and compared this to Newton-Raphson inversion. Mathematical proof, MATLAB simulation, and real device implementation demonstrate the accuracy and efficiency of the proposed equation in distance calculation, with fewer iterations, computation stability for short and long distances, and remarkably short processing time. Then, the sensitivities of Lambert W function and Newton-Raphson inversion to alteration in TL were examined. The simulation results showed that Lambert W function is more stable to errors than Newton-Raphson inversion. Finally, with a likelihood method, it was shown that RSS is a practical tool for distance measurement in UASN.

  13. Structuring Naval Special Warfare junior officer professional military education

    OpenAIRE

    Donovan, Thomas A.

    2007-01-01

    Naval Special Warfare does not currently have a designated career path for an officer that requires professional military education (PME) for SEAL junior officers after the rank of Ensign (O-1) and before the rank of Lieutenant Commander (O-4). There currently is interest in this subject matter at the Naval Special Warfare Command and Center. SEAL officers increasingly hold key leadership positions and influence critical decisions in the execution of national strategy. This growing respo...

  14. Strategy in the Robotic Age: A Case for Autonomous Warfare

    Science.gov (United States)

    2014-09-01

    enabling technology that augments human performance, such as exoskeleton suits, and other complementary fields that make robotics function...philosophy of maneuver warfare with new technologies from the Robotic Age, such as unmanned systems and exoskeleton suits, to present a new warfighting...and Brimley, “20YY,” 12. 49 the exoskeleton suit, but rather that the full benefit of autonomous warfare will be achieved by leveraging mass and

  15. Hydrodynamic Coefficients Identification and Experimental Investigation for an Underwater Vehicle

    Directory of Open Access Journals (Sweden)

    Shaorong XIE

    2014-02-01

    Full Text Available Hydrodynamic coefficients are the foundation of unmanned underwater vehicles modeling and controller design. In order to reduce identification complexity and acquire necessary hydrodynamic coefficients for controllers design, the motion of the unmanned underwater vehicle was separated into vertical motion and horizontal motion models. Hydrodynamic coefficients were regarded as mapping parameters from input forces and moments to output velocities and acceleration of the unmanned underwater vehicle. The motion models of the unmanned underwater vehicle were nonlinear and Genetic Algorithm was adopted to identify those hydrodynamic coefficients. To verify the identification quality, velocities and acceleration of the unmanned underwater vehicle was measured using inertial sensor under the same conditions as Genetic Algorithm identification. Curves similarity between measured velocities and acceleration and those identified by Genetic Algorithm were used as optimizing standard. It is found that the curves similarity were high and identified hydrodynamic coefficients of the unmanned underwater vehicle satisfied the measured motion states well.

  16. Efficient Weibull channel model for salinity induced turbulent underwater wireless optical communications

    KAUST Repository

    Oubei, Hassan M.; Zedini, Emna; Elafandy, Rami T.; Kammoun, Abla; Ng, Tien Khee; Alouini, Mohamed-Slim; Ooi, Boon S.

    2017-01-01

    Recent advances in underwater wireless optical communications necessitate a better understanding of the underwater channel. We propose the Weibull model to characterize the fading of salinity induced turbulent underwater wireless optical channels

  17. Underwater videography and photography in Gulf of Kachchh. Sponsored by Gujarat Ecological Society, Vadodara, Gujarat

    Digital Repository Service at National Institute of Oceanography (India)

    Marine Archaeology Centre (MAC) has been carrying out underwater explorations and excavations of ancient ports and sunken shipwrecks to preserve underwater cultural heritage. MAC has the infrastructure facility to carry out underwater investigations...

  18. Why Failing Terrorist Groups Persist Revisited: A Social Network Approach to AQIM Network Resilience

    Science.gov (United States)

    2017-12-01

    the approach and methods used in this analysis to organize, analyze, and explore the geospatial, statistical , and social network data...requirements for the degree of MASTER OF SCIENCE IN INFORMATION STRATEGY AND POLITICAL WARFARE from the NAVAL POSTGRADUATE SCHOOL December...research utilizes both descriptive statistics and regression analysis of social network data to explore the changes within the AQIM network 2012

  19. The 2014-2015 warming anomaly in the Southern California Current System observed by underwater gliders

    Science.gov (United States)

    Zaba, Katherine D.; Rudnick, Daniel L.

    2016-02-01

    Large-scale patterns of positive temperature anomalies persisted throughout the surface waters of the North Pacific Ocean during 2014-2015. In the Southern California Current System, measurements by our sustained network of underwater gliders reveal the coastal effects of the recent warming. Regional upper ocean temperature anomalies were greatest since the initiation of the glider network in 2006. Additional observed physical anomalies included a depressed thermocline, high stratification, and freshening; induced biological consequences included changes in the vertical distribution of chlorophyll fluorescence. Contemporaneous surface heat flux and wind strength perturbations suggest that local anomalous atmospheric forcing caused the unusual oceanic conditions.

  20. Underwater laser beam welding of Alloy 690

    International Nuclear Information System (INIS)

    Hino, Takehisa; Tamura, Masataka; Kono, Wataru; Kawano, Shohei; Yoda, Masaki

    2009-01-01

    Stress Corrosion Clacking (SCC) has been reported at Alloy 600 welds between nozzles and safe-end in Pressurized Water Reactor (PWR) plant. Alloy 690, which has higher chromium content than Alloy 600, has been applied for cladding on Alloy 600 welds for repairing damaged SCC area. Toshiba has developed Underwater Laser Beam Welding technique. This method can be conducted without draining, so that the repairing period and the radiation exposure during the repair can be dramatically decreased. In some old PWRs, high-sulfur stainless steel is used as the materials for this section. It has a high susceptibility of weld cracks. Therefore, the optimum welding condition of Alloy 690 on the high-sulfur stainless steel was investigated with our Underwater Laser Beam Welding unit. Good cladding layer, without any crack, porosity or lack of fusion, could be obtained. (author)

  1. Cymbal and BB underwater transducers and arrays

    Energy Technology Data Exchange (ETDEWEB)

    Newnham, R.E.; Zhang, J.; Alkoy, S.; Meyer, R.; Hughes, W.J.; Hladky-Hennion, A.C.; Cochran, J.; Markley, D. [Materials Research Laboratory, Penn State University, University Park, PA 16802 (United States)

    2002-09-01

    The cymbal is a miniaturized class V flextensional transducer that was developed for use as a shallow water sound projector and receiver. Single elements are characterized by high Q, low efficiency, and medium power output capability. Its low cost and thin profile allow the transducer to be assembled into large flexible arrays. Efforts were made to model both single elements and arrays using the ATILA code and the integral equation formulation (EQI).Millimeter size microprobe hydrophones (BBs) have been designed and fabricated from miniature piezoelectric hollow ceramic spheres for underwater applications such as mapping acoustic fields of projectors, and flow noise sensors for complex underwater structures. Green spheres are prepared from soft lead zirconate titanate powders using a coaxial nozzle slurry process. A compact hydrophone with a radially-poled sphere is investigated using inside and outside electrodes. Characterization of these hydrophones is done through measurement of hydrostatic piezoelectric charge coefficients, free field voltage sensitivities and directivity beam patterns. (orig.)

  2. Underwater noise modelling for environmental impact assessment

    Energy Technology Data Exchange (ETDEWEB)

    Farcas, Adrian [Centre for Environment, Fisheries and Aquaculture Science (Cefas), Pakefield Road, Lowestoft, NR33 0HT (United Kingdom); Thompson, Paul M. [Lighthouse Field Station, Institute of Biological and Environmental Sciences, University of Aberdeen, Cromarty IV11 8YL (United Kingdom); Merchant, Nathan D., E-mail: nathan.merchant@cefas.co.uk [Centre for Environment, Fisheries and Aquaculture Science (Cefas), Pakefield Road, Lowestoft, NR33 0HT (United Kingdom)

    2016-02-15

    Assessment of underwater noise is increasingly required by regulators of development projects in marine and freshwater habitats, and noise pollution can be a constraining factor in the consenting process. Noise levels arising from the proposed activity are modelled and the potential impact on species of interest within the affected area is then evaluated. Although there is considerable uncertainty in the relationship between noise levels and impacts on aquatic species, the science underlying noise modelling is well understood. Nevertheless, many environmental impact assessments (EIAs) do not reflect best practice, and stakeholders and decision makers in the EIA process are often unfamiliar with the concepts and terminology that are integral to interpreting noise exposure predictions. In this paper, we review the process of underwater noise modelling and explore the factors affecting predictions of noise exposure. Finally, we illustrate the consequences of errors and uncertainties in noise modelling, and discuss future research needs to reduce uncertainty in noise assessments.

  3. Underwater noise modelling for environmental impact assessment

    International Nuclear Information System (INIS)

    Farcas, Adrian; Thompson, Paul M.; Merchant, Nathan D.

    2016-01-01

    Assessment of underwater noise is increasingly required by regulators of development projects in marine and freshwater habitats, and noise pollution can be a constraining factor in the consenting process. Noise levels arising from the proposed activity are modelled and the potential impact on species of interest within the affected area is then evaluated. Although there is considerable uncertainty in the relationship between noise levels and impacts on aquatic species, the science underlying noise modelling is well understood. Nevertheless, many environmental impact assessments (EIAs) do not reflect best practice, and stakeholders and decision makers in the EIA process are often unfamiliar with the concepts and terminology that are integral to interpreting noise exposure predictions. In this paper, we review the process of underwater noise modelling and explore the factors affecting predictions of noise exposure. Finally, we illustrate the consequences of errors and uncertainties in noise modelling, and discuss future research needs to reduce uncertainty in noise assessments.

  4. Ocean Research Enabled by Underwater Gliders.

    Science.gov (United States)

    Rudnick, Daniel L

    2016-01-01

    Underwater gliders are autonomous underwater vehicles that profile vertically by changing their buoyancy and use wings to move horizontally. Gliders are useful for sustained observation at relatively fine horizontal scales, especially to connect the coastal and open ocean. In this review, research topics are grouped by time and length scales. Large-scale topics addressed include the eastern and western boundary currents and the regional effects of climate variability. The accessibility of horizontal length scales of order 1 km allows investigation of mesoscale and submesoscale features such as fronts and eddies. Because the submesoscales dominate vertical fluxes in the ocean, gliders have found application in studies of biogeochemical processes. At the finest scales, gliders have been used to measure internal waves and turbulent dissipation. The review summarizes gliders' achievements to date and assesses their future in ocean observation.

  5. The Impacts of Modern Warfare on Freshwater Ecosystems

    Science.gov (United States)

    Francis, Robert A.

    2011-11-01

    There is increasing recognition and concern regarding the impacts of modern industrial warfare on the environment. Freshwater ecosystems are perhaps the most vulnerable to warfare-related impacts, which is of concern given that they provide so many essential environmental resources and services to society. Despite this, there has been little work to establish and quantify the types of impacts (both negative and positive) that warfare may have on such systems. This paper firstly highlights why rivers and lakes may be susceptible to warfare-related impacts, before synthesizing the available literature to explore the following main themes: intensification of wartime resource acquisition, use of water as an offensive or defensive weapon, direct and indirect effects of explosive ordnance, increased pollution, introduction of invasive alien species, and positive ecological impacts. This is then followed by a discussion of the implications of such impacts in relation to future warfare, including a consideration of the efficacy of existing legal instruments to protect the environment during conflict, and the trend for war to become more localized and `informal', and therefore less regulated. Finally, the paper identifies key research foci for understanding and mitigating the effects of warfare on freshwater ecosystems.

  6. Equipment and appliances for underwater operations. Pt. 2

    International Nuclear Information System (INIS)

    Krueger, P.

    1976-01-01

    The 6/75 edition of 'mt' reported on the 'ARGE underwater appliances' and the study on 'design development of appliances and equipment for underwater use' in a brief summary. One of these designs, the 'unmanned DSWS underwater appliance' was described in detail. The present article describes three further design developments mentioned in the above study and which are based on unmanned appliances connected to the mother-ship. These designs were developed by Preussag-Meerestechnik. (orig.) [de

  7. The Manipulation of Human Behavior in Guerrilla Warfare: Can It Enhance U.S. Army Special Forces Guerrilla Warfare Operations?

    National Research Council Canada - National Science Library

    Harris, William

    1997-01-01

    .... Proper integration of psychological communications to manipulate behavior in guerrilla warfare may facilitate the recruiting1 motivation, morale, sustainment and popular support for a guerrilla movement and its cause...

  8. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  9. MEDITERRANEAN: Underwater neutrinos get off the ground

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    Now funded is the initial stage of NESTOR, an imaginative new programme for a dedicated underwater neutrino astroparticle physics laboratory. Located in the international waters off the southernmost corner of continental Europe near the town of Pylos in S.W. Greece, NESTOR (NEutrinos from Supernovae and TeV sources Ocean Range) recalls the wise king of Pylos who counselled the Greeks during the Trojan war, an excellent tradition for new scientific goals of detecting neutrinos

  10. Inspecting the inside of underwater hull

    Science.gov (United States)

    Valkovic, Vladivoj; Sudac, Davorin

    2009-05-01

    In order to demonstrate the possibility of identifying the material within ship's underwater hull, sunken ships and other objects on the sea floor tests with the 14 MeV sealed tube neutron generator incorporated inside a small submarine submerged in the test basin filled with sea water have been performed. Results obtained for inspection of diesel fuel and explosive presence behind single and double hull constructions are presented.

  11. Underwater bipedal locomotion by octopuses in disguise.

    Science.gov (United States)

    Huffard, Christine L; Boneka, Farnis; Full, Robert J

    2005-03-25

    Here we report bipedal movement with a hydrostatic skeleton. Two species of octopus walk on two alternating arms using a rolling gait and appear to use the remaining six arms for camouflage. Octopus marginatus resembles a coconut, and Octopus (Abdopus) aculeatus, a clump of floating algae. Using underwater video, we analyzed the kinematics of their strides. Each arm was on the sand for more than half of the stride, qualifying this behavior as a form of walking.

  12. Role of Confined Water in Underwater Adhesion

    Science.gov (United States)

    Dhinojwala, Ali

    Surface bound water is a strong deterrent for forming strong bonds between two surfaces underwater and expelling that bound water is important for strong adhesion. I will discuss examples of different strategies used by geckos, spiders, and mussels to handle this last layer of bound water. Recent results using infrared-visible sum frequency generation spectroscopy to probe the structure of this bound water will be discussed. National Science Foundation.

  13. Study on underwater plasma arc cutting technology

    International Nuclear Information System (INIS)

    Yada, Toshio; Nakamura, Uhachiro; Tomidokoro, Sakae; Fukuzawa, Mitsuo

    1980-01-01

    The zirconium alloy tube of the impile creep test facility had been subjected to inner pressure in the Japan Material Testing Reactor (JMTR) environment. In the near future, it will be necessary to dismantle the facility and to take out the tube for such examinations as irradiation effects on material properties. In order to establish the dismantling technology for the radioactive facility, a study on underwater plasma arc cutting has been carried out since 1977. Primarily, optimum underwater cutting sequence and conditions were studied in details for developing the remote control handling and the cutting system. Further, the amounts of particles suspended in water as well as those contained in bubbled gas were quantitatively analyzed for developing a safe removal system for contaminants which were produced by cutting the radioactive material. As a result of this study, it has been concluded that the underwater plasma arc cutting method is generally suitable and effective for dismantling such radioactive material as the impile creep test facility of the JMTR. (author)

  14. Underwater Acoustic Target Tracking: A Review

    Science.gov (United States)

    Han, Ying; Fan, Liying

    2018-01-01

    Advances in acoustic technology and instrumentation now make it possible to explore marine resources. As a significant component of ocean exploration, underwater acoustic target tracking has aroused wide attention both in military and civil fields. Due to the complexity of the marine environment, numerous techniques have been proposed to obtain better tracking performance. In this paper, we survey over 100 papers ranging from innovative papers to the state-of-the-art in this field to present underwater tracking technologies. Not only the related knowledge of acoustic tracking instrument and tracking progress is clarified in detail, but also a novel taxonomy method is proposed. In this paper, algorithms for underwater acoustic target tracking are classified based on the methods used as: (1) instrument-assisted methods; (2) mode-based methods; (3) tracking optimization methods. These algorithms are compared and analyzed in the aspect of dimensions, numbers, and maneuvering of the tracking target, which is different from other survey papers. Meanwhile, challenges, countermeasures, and lessons learned are illustrated in this paper. PMID:29301318

  15. Underwater detection by using ultrasonic sensor

    Science.gov (United States)

    Bakar, S. A. A.; Ong, N. R.; Aziz, M. H. A.; Alcain, J. B.; Haimi, W. M. W. N.; Sauli, Z.

    2017-09-01

    This paper described the low cost implementation of hardware and software in developing the system of ultrasonic which can visualize the feedback of sound in the form of measured distance through mobile phone and monitoring the frequency of detection by using real time graph of Java application. A single waterproof transducer of JSN-SR04T had been used to determine the distance of an object based on operation of the classic pulse echo detection method underwater. In this experiment, the system was tested by placing the housing which consisted of Arduino UNO, Bluetooth module of HC-06, ultrasonic sensor and LEDs at the top of the box and the transducer was immersed in the water. The system which had been tested for detection in vertical form was found to be capable of reporting through the use of colored LEDs as indicator to the relative proximity of object distance underwater form the sensor. As a conclusion, the system can detect the presence of an object underwater within the range of ultrasonic sensor and display the measured distance onto the mobile phone and the real time graph had been successfully generated.

  16. Afocal viewport optics for underwater imaging

    Science.gov (United States)

    Slater, Dan

    2014-09-01

    A conventional camera can be adapted for underwater use by enclosing it in a sealed waterproof pressure housing with a viewport. The viewport, as an optical interface between water and air needs to consider both the camera and water optical characteristics while also providing a high pressure water seal. Limited hydrospace visibility drives a need for wide angle viewports. Practical optical interfaces between seawater and air vary from simple flat plate windows to complex water contact lenses. This paper first provides a brief overview of the physical and optical properties of the ocean environment along with suitable optical materials. This is followed by a discussion of the characteristics of various afocal underwater viewport types including flat windows, domes and the Ivanoff corrector lens, a derivative of a Galilean wide angle camera adapter. Several new and interesting optical designs derived from the Ivanoff corrector lens are presented including a pair of very compact afocal viewport lenses that are compatible with both in water and in air environments and an afocal underwater hyper-hemispherical fisheye lens.

  17. Modeling and Control of Underwater Robotic Systems

    Energy Technology Data Exchange (ETDEWEB)

    Schjoelberg, I:

    1996-12-31

    This doctoral thesis describes modeling and control of underwater vehicle-manipulator systems. The thesis also presents a model and a control scheme for a system consisting of a surface vessel connected to an underwater robotic system by means of a slender marine structure. The equations of motion of the underwater vehicle and manipulator are described and the system kinematics and properties presented. Feedback linearization technique is applied to the system and evaluated through a simulation study. Passivity-based controllers for vehicle and manipulator control are presented. Stability of the closed loop system is proved and simulation results are given. The equation of motion for lateral motion of a cable/riser system connected to a surface vessel at the top end and to a thruster at the bottom end is described and stability analysis and simulations are presented. The equations of motion in 3 degrees of freedom of the cable/riser, surface vessel and robotic system are given. Stability analysis of the total system with PD-controllers is presented. 47 refs., 32 figs., 7 tabs.

  18. Environmental effects on underwater optical transmission

    Science.gov (United States)

    Chu, Peter C.; Breshears, Brian F.; Cullen, Alexander J.; Hammerer, Ross F.; Martinez, Ramon P.; Phung, Thai Q.; Margolina, Tetyana; Fan, Chenwu

    2017-05-01

    Optical communication/detection systems have potential to get around some limitations of current acoustic communications and detection systems especially increased fleet and port security in noisy littoral waters. Identification of environmental effects on underwater optical transmission is the key to the success of using optics for underwater communication and detection. This paper is to answer the question "What are the transfer and correlation functions that relate measurements of hydrographic to optical parameters?" Hydrographic and optical data have been collected from the Naval Oceanographic Office survey ships with the High Intake Defined Excitation (HIDEX) photometer and sea gliders with optical back scattering sensor in various Navy interested areas such as the Arabian Gulf, Gulf of Oman, east Asian marginal seas, and Adriatic Sea. The data include temperature, salinity, bioluminescence, chlorophyll-a fluorescence, transmissivity at two different wavelengths (TRed at 670 nm, TBlue at 490 nm), and back scattering coefficient (bRed at 700 nm, bBlue at 470 nm). Transfer and correlation functions between the hydrographic and optical parameters are obtained. Bioluminescence and fluorescence maxima, transmissivity minimum with their corresponding depths, red and blue laser beam peak attenuation coefficients are identified from the optical profiles. Evident correlations are found between the ocean mixed layer depth and the blue and red laser beam peak attenuation coefficients, bioluminescence and fluorescence maxima in the Adriatic Sea, Arabian Gulf, Gulf of Oman, and Philippine Sea. Based on the observational data, an effective algorithm is recommended for solving the radiative transfer equation (RTE) for predicting underwater laser radiance.

  19. Automatic stabilization of underwater robots in the time manipulation operations

    International Nuclear Information System (INIS)

    Filaretov, V.F.; Koval, E.V.

    1994-01-01

    When carrying out underwater technical works by means of an underwater vehicles having a manipulator it is desirable to perform manipulation operations in the regime of the underwater vehicle hovering above the object without durable and complicated operations up its rigid fixation. Underwater vehicle stabilization is achieved by compensation all the effects on the vehicle caused by the operating manipulator in water medium. This automatic stabilization is formed due to input of the required control signals into corresponding vehicle propellers proportional to calculated components of the generalized forces and moments. The propellers should form stops reacting against effects

  20. Underwater hearing in the great cormorant (Phalacrocorax carbo sinensis)

    DEFF Research Database (Denmark)

    Hansen, Kirstin Anderson; Larsen, Ole Næsbye; Wahlberg, Magnus

    2016-01-01

    The underwater hearing threshold of a great cormorant (Phalacrocroax carbo sinensis) was measured at 2 kHz using psychophysical methods. Previous in-air and underwater testing suggests that cormorants have rather poor in-air hearing compared to other birds of similar size (Johansen, 2016). Prelim......The underwater hearing threshold of a great cormorant (Phalacrocroax carbo sinensis) was measured at 2 kHz using psychophysical methods. Previous in-air and underwater testing suggests that cormorants have rather poor in-air hearing compared to other birds of similar size (Johansen, 2016...

  1. Contour Tracking Control for the REMUS Autonomous Underwater Vehicle

    National Research Council Canada - National Science Library

    Van Reet, Alan R

    2005-01-01

    In the interest of enhancing the capabilities of autonomous underwater vehicles used in US Naval Operations, controlling vehicle position to follow depth contours presents exciting potential for navigation...

  2. Autopilot Using Differential Thrust for ARIES Autonomous Underwater Vehicle

    National Research Council Canada - National Science Library

    Sarton, Christopher

    2003-01-01

    .... Unfortunately, communication antennas must point to specific satellites in this system and thus underwater vehicles must steer a specific course on the surface during the communication process...

  3. Research on Operational Aspects of Large Autonomous Underwater Glider Fleets

    National Research Council Canada - National Science Library

    Fratantoni, David M

    2007-01-01

    This program supported research on the operational and management issues stemming from application of large fleets of autonomous underwater gliders to oceanographic research and rapid environmental...

  4. A brief review of advances in complex networks of nuclear science and technology field

    International Nuclear Information System (INIS)

    Fang Jinqing

    2010-01-01

    A brief review of advances in complex networks of nuclear science and technology field at home and is given and summarized. These complex networks include: nuclear energy weapon network, network centric warfare, beam transport networks, continuum percolation evolving network associated with nuclear reactions, global nuclear power station network, (nuclear) chemistry reaction networks, radiological monitoring and anti-nuclear terror networks, and so on. Some challenge issues and development prospects of network science are pointed out finally. (authors)

  5. The concept of guerrilla warfare in Lithuania in the 1920—1930s

    Directory of Open Access Journals (Sweden)

    Jokubauskas Vytautas

    2012-03-01

    Full Text Available This article analyses the military and tactical training of the members of the Lithuanian Riflemen’s Union for guerrilla warfare in the interwar period. Small nations, such as Lithuania and other Baltic states, being unable to build up military strength in order to ensure national security, were forced to seek for unconventional methods of warfare, including guerrilla strategies. The study places emphasis on the development of the guerrilla war concept in the Union periodicals. The author retraces a change in the intensity of the guerrilla warfare concept propagation amongst Lithuanian population and riflemen, in particular, through publications in the Trimitas — a periodical of the Lithuanian Riflemen’s Union. The author also identifies the narratives associated with the guerrilla matters employed for propaganda purposes in order to create an image of a guerrilla as a defender of the Homeland — Lithuania. Additionally, the structure and numbers of the Union are analysed through a comparison with similar organisations of the other «small nations» of the Baltic North-East. The author addresses the issue of military missions planned by the Lithuanian Army, as well as the way riflemen implemented them. Since the Union did not only offer military training, but was also engaged in the patriotic propaganda, the article focuses on the network of cultural institutions, homes of riflemen, orchestras, libraries, choirs, and athletic clubs used by the Union. The article sets out to establish whether the loss of Lithuanian sovereignty could have been possible without giving rise to a protracted guerrilla war.

  6. Nuclear, biological and chemical warfare. Part I: Medical aspects of nuclear warfare.

    Science.gov (United States)

    Kasthuri, A S; Pradhan, A B; Dham, S K; Bhalla, I P; Paul, J S

    1990-04-01

    Casualties in earlier wars were due much more to diseases than to weapons. Mention has been made in history of the use of biological agents in warfare, to deny the enemy food and water and to cause disease. In the first world war chemical agents were used to cause mass casualties. Nuclear weapons were introduced in the second world war. Several countries are now involved in developing nuclear, biological and chemical weapon systems, for the mass annihilation of human beings, animals and plants, and to destroy the economy of their enemies. Recently, natural calamities and accidents in nuclear, chemical and biological laboratories and industries have caused mass instantaneous deaths in civilian population. The effects of future wars will not be restricted to uniformed persons. It is time that physicians become aware of the destructive potential of these weapons. Awareness, immediate protective measures and first aid will save a large number of persons. This series of articles will outline the medical aspects of nuclear, biological and chemical weapon systems in three parts. Part I will deal with the biological effects of a nuclear explosion. The short and long term effects due to blast, heat and associated radiation are highlighted. In Part II, the role of biological agents which cause commoner or new disease patterns is mentioned. Some of the accidents from biological warfare laboratories are a testimony to its potential deleterious effects. Part III deals with medical aspects of chemical warfare agents, which in view of their mass effects can overwhelm the existing medical resources, both civilian and military.(ABSTRACT TRUNCATED AT 250 WORDS)

  7. Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare

    Science.gov (United States)

    2009-10-01

    official definition of asymmetric warfare , considering that its use was redundant to irregular warfare [30]. 2 Such as the Lanchester Equations...RTP-MP-MSG-069 23 - 1 Using Agent Based Distillation to Explore Issues Related to Asymmetric Warfare Martin Adelantado, Jean-Michel Mathé...shows that both conventional and asymmetric warfare are characterised by nonlinear behaviours and that engagement is a Complex Adaptive System (CAS

  8. Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials

    Science.gov (United States)

    2016-06-01

    2013 4. TITLE AND SUBTITLE Transport and Reactivity of Decontaminants to Provide Hazard Mitigation of Chemical Warfare Agents from Materials 5a...directions for future decontamination formulation approaches. 15. SUBJECT TERMS GD HD Decontamination Hazard mitigation VX Chemical warfare agent... DECONTAMINANTS TO PROVIDE HAZARD MITIGATION OF CHEMICAL WARFARE AGENTS FROM MATERIALS 1. INTRODUCTION Decontamination of materials is the

  9. WODA technical guidance on underwater sound from dredging

    NARCIS (Netherlands)

    Thomsen, F.; Borsani, F.; Clarke, D.; Jong, C. de; Wit, P. de; Goethals, F.; Holtkamp, M.; Martin, E.S.; Spadaro, P.; Raalte, G. van; Victor, G.Y.V.; Jensen, A.

    2016-01-01

    The World Organization of Dredging Associations (WODA) has identified underwater sound as an environmental issue that needs further consideration. A WODA Expert Group on Underwater Sound (WEGUS) prepared a guidance paper in 2013 on dredging sound, including a summary of potential impacts on aquatic

  10. Evaluating the SCC resistance of underwater welds in sodium tetrathionate

    International Nuclear Information System (INIS)

    White, R.A.; Angeliu, T.M.

    1997-01-01

    The susceptibility of welds to stress corrosion cracking (SCC) is enhanced by the surface residual tensile stresses generated by the typical welding process. However, underwater plasma transferred arc (PTA) welding has been shown to produce compressive surface residual stresses, an encouraging result if repairs of cracked boiling water reactor (BWR) components are to be made without further endangering them to SCC. This program was designed to verify that underwater PTA welds are resistant to SCC and to determine if underwater PTA welding could mitigate SCC in potentially susceptible welds. This was achieved by exposing various welds on solution annealed (SA) and SA + thermally sensitized 304 stainless steel at 25 C in a solution of 1.5 gm/liter of sodium sulfide added to 0.05M sodium tetrathionate, titrated to a pH of 1.25 with H 2 SO 4 . The autogeneous welds were produced using gas tungsten arc (GTA) and plasma transferred arc (PTA) welding under atmospheric conditions, and PTA welding underwater. After 1 hour of sodium tetrathionate exposure, GTA and air PTA welds exhibited SCC while the underwater PTA weld heat affected zones were more resistant. Underwater PTA welds bisecting a GTA weld eliminated the cracking in the GTA weld heat affected zone under certain conditions. The lack of IG cracking in the region influenced by the underwater PTA weld is consistent with the measurement of compressive surface residual stresses inherent to the underwater welding process

  11. Remarks on the observability of single beacon underwater navigation

    DEFF Research Database (Denmark)

    Jouffroy, Jerome; Ross, Andrew

    This paper contributes a simple and intuitive result in the analysis of underwater navigation using a single ranging beacon. This analysis should help with the design of small and lightweight underwater vehicles by reducing the amount of instrumentation required for accurate navigation. The concept...

  12. Underwater laser cladding and seal welding for INCONEL 52

    International Nuclear Information System (INIS)

    Tamura, Masataka; Kouno, Wataru; Makino, Yoshinobu; Kawano, Shohei; Yoda, Masaki

    2007-01-01

    Recently, stress corrosion cracking (SCC) has been observed at aged components of nuclear power plants under water environment and high exposure of radiation. Toshiba has been developing both an underwater laser welding directly onto surface of the aged components as maintenance and repair techniques. This paper reports underwater laser cladding and seal welding for INCONEL 52. (author)

  13. Underwater methods for study of salmonids in the Intermountain West

    Science.gov (United States)

    Russell F. Thurow

    1994-01-01

    This guide describes underwater methods using snorkeling gear to study fish populations in flowing waters of the Intermountain West. It outlines procedures for estimating salmonid abundance and habitat use and provides criteria for identifying and estimating the size of fish underwater.

  14. The WODA guidance paper on underwater sound from dredging (abstract)

    NARCIS (Netherlands)

    Thomsen, F.; Borsani, F.; Clarke, D.; Jong, C.A.F. de; Witt, P. de; Holtkamp, M.; Goethals, F.; San Martin, E.; Spadaro, P.; Raalte, G. van; Jensen, A.

    2013-01-01

    The World Organisation of Dredging Associations (WODA) has identified underwater sound as an environmental issue that needs further consideration. A WODA Expert Group on Underwater Sound (WEGUS) was established to provide a guidance paper on dredging sound, impact on aquatic biota and advice on

  15. Battle-Wise: Gaining Advantage in Networked Warfare

    National Research Council Canada - National Science Library

    Gompert, David C; Lachow, Irving; Perkins, Justin

    2005-01-01

    .... But the United States will have company not all of it friendly. For example, China and Al Qaeda, using very different doctrines, are showing interest in tapping the power of information. Indeed, Al Qaeda and its franchised affiliates are displaying cunning and resourcefulness in putting this power to work with virtually no investment.

  16. Towards a Semiotic Information Position Framework for Network Centric Warfare

    Science.gov (United States)

    2011-06-01

    study of anything which stands for something else [10]. Swiss linguist Ferdinand de Saussure and American logician and philosopher Charles Sanders Peirce...are considered as the founders of semiotics [10]. As a linguist, Saussure was interested in the relationships between words (or signs) and he argued...to Eco, Saussure “did not define the signified any too clearly, leaving it half way between a mental image, a concept and a psychological reality

  17. Motivation and requirements for determining a Network Warfare Capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2010-06-01

    Full Text Available activities on systems. Another perspective of auditing relates to the checking of conformance to policies that govern the applicable information and systems. Vroom and Von Solomons discuss information security auditing as checking the use of security... states that an audit will consist of reviewing all aspects of the stated criteria of systems and reviewing threats and practices to ensure compliance with written guidelines (Kizza 2006). These descriptions of auditing depict a testing and checking...

  18. Service Through Cyberspace Science: 262nd Network Warfare Squadron

    Science.gov (United States)

    an attack on the States, and units like the Cyber Operations Group provide the necessary support to Home About Disclaimer Privacy Policy Search... Search Featured Technology Space Matters Cyber Activity Cyber security is one of the top priorities of the U.S. armed forces today. It takes a special

  19. Manhunting: Counter-Network Organization for Irregular Warfare

    Science.gov (United States)

    2009-09-01

    Buenos Aires, Argentina Israeli Mossad pursued Adolf Eichmann . Eichmann was finally identified in Buenos Aires. Apprehended on his way home, he...Malkin and Harry Stein, Eichmann in My Hands (New York: Warner Books, May 1990). Mossad is the Israeli intelligence service. 288. “Dr. Gerald Bull

  20. Battle-Wise: Gaining Advantage in Networked Warfare

    Science.gov (United States)

    2005-01-01

    Al Qaeda, using very different doctrines, are showing interest in tapping the power of information. Indeed, Al Qaeda and its franchised affiliates...having to engage at all because the time-information- disadvantaged force—even though networked—knows it will lose. To illustrate the importance of

  1. Space Technology and Network Centric Warfare: A Strategic Paradox

    National Research Council Canada - National Science Library

    Ginter, Karl

    2007-01-01

    The Department of Defense (DoD) force transformation is in large measure predicated on harnessing and exploiting the benefits of shared information on the battlefield to develop a common operating picture...

  2. Russian New Art of Hybrid Warfare in Ukraine

    Directory of Open Access Journals (Sweden)

    Rusnáková Soňa

    2017-10-01

    Full Text Available The main aim of this paper is to analyse the annexation of Crimea by the Russian Federation. For the purposes of the paper, the theory of hybrid warfare was chosen as an analytical category. Throughout the paper, the concept of hybrid warfare is examined and applied on case study of Crimean annexation. Hybrid warfare, especially in connection with Russian actions in Crimea has been an intensely debated concept. There is an ongoing debate among scholars concerning the meaning of the concept, its existence and employment by the Russian Federation. This paper showed that the article of Valeriy Gerasimov – the incumbent Chief of the General Staff of the Russian Federation-invoked a new warfare strategy for the Russian Federation which was consequently for the very first time in its full spectre and effectivity employed on case of Crimean annexation in March 2014. Observing the application of the hybrid warfare in practice serves the purposes of countering its further potential application in post-Soviet space and Russian ‘near abroad’.

  3. Nondestructive inspection of chemical warfare based on API-TOF

    International Nuclear Information System (INIS)

    Wang Xinhua; Zheng Pu; He Tie; An Li; Yang Jie; Fan Yu

    2013-01-01

    Background: Real-time, fast, accurate, nondestructive inspection (NDI) and quantitative analysis for chemical warfare are very imperative for chemical defense, anti-terror and nation security. Purpose: Associated Particles Technique (APT)/Neutron Time of Flight (TOF) has been developed for non-invasive inspection of sealed containers with chemical warfare agents. Methods: A prototype equipment for chemical warfare is consisted of an APT neutron generator with a 3×3 matrix of semiconductor detectors of associated alpha-particles, the shielding protection of neutron and gamma-ray, arrayed NaI(Tl)-based detectors of gamma-rays, fully-digital data acquisition electronics, data analysis, decision-making software, support platform and remote control system. Inelastic scattering gamma-ray pulse height spectra of sarin, VX, mustard gas and adamsite induced by 14-MeV neutron are measured. The energies of these gamma rays are used to identify the inelastic scattering elements, and the intensities of the peaks at these energies are used to reveal their concentrations. Results: The characteristic peaks of inelastic scattering gamma-ray pulse height spectra show that the prototype equipment can fast and accurately inspect chemical warfare. Conclusion: The equipment can be used to detect not only chemical warfare agents but also other hazardous materials, such as chemical/toxic/drug materials, if their chemical composition is in any way different from that of the surrounding materials. (authors)

  4. Numerical simulation of RCS for carrier electronic warfare airplanes

    Directory of Open Access Journals (Sweden)

    Yue Kuizhi

    2015-04-01

    Full Text Available This paper studies the radar cross section (RCS of carrier electronic warfare airplanes. Under the typical naval operations section, the mathematical model of the radar wave’s pitch angle incidence range analysis is established. Based on the CATIA software, considering dynamic deflections of duck wing leading edge flaps, flaperons, horizontal tail, and rudder, as well as aircraft with air-to-air missile, anti-radiation missile, electronic jamming pod, and other weapons, the 3D models of carrier electronic warfare airplanes Model A and Model B with weapons were established. Based on the physical optics method and the equivalent electromagnetic flow method, by the use of the RCSAnsys software, the characteristics of carrier electronic warfare airplanes’ RCS under steady and dynamic flights were simulated under the UHF, X, and S radar bands. This paper researches the detection probability of aircraft by radars under the condition of electronic warfare, and completes the mathematical statistical analysis of the simulation results. The results show that: The Model A of carrier electronic warfare airplane is better than Model B on stealth performance and on discover probability by radar detection effectively.

  5. SWARMs Ontology: A Common Information Model for the Cooperation of Underwater Robots

    Science.gov (United States)

    Li, Xin; Bilbao, Sonia; Martín-Wanton, Tamara; Bastos, Joaquim; Rodriguez, Jonathan

    2017-01-01

    In order to facilitate cooperation between underwater robots, it is a must for robots to exchange information with unambiguous meaning. However, heterogeneity, existing in information pertaining to different robots, is a major obstruction. Therefore, this paper presents a networked ontology, named the Smart and Networking Underwater Robots in Cooperation Meshes (SWARMs) ontology, to address information heterogeneity and enable robots to have the same understanding of exchanged information. The SWARMs ontology uses a core ontology to interrelate a set of domain-specific ontologies, including the mission and planning, the robotic vehicle, the communication and networking, and the environment recognition and sensing ontology. In addition, the SWARMs ontology utilizes ontology constructs defined in the PR-OWL ontology to annotate context uncertainty based on the Multi-Entity Bayesian Network (MEBN) theory. Thus, the SWARMs ontology can provide both a formal specification for information that is necessarily exchanged between robots and a command and control entity, and also support for uncertainty reasoning. A scenario on chemical pollution monitoring is described and used to showcase how the SWARMs ontology can be instantiated, be extended, represent context uncertainty, and support uncertainty reasoning. PMID:28287468

  6. Optimization of an Intelligent Controller for an Unmanned Underwater Vehicle

    Directory of Open Access Journals (Sweden)

    M. Fauzi Nor Shah

    2011-08-01

    Full Text Available Underwater environment poses a difficult challenge for autonomous underwater navigation. A standard problem of underwater vehicles is to maintain it position at a certain depth in order to perform desired operations. An effective controller is required for this purpose and hence the design of a depth controller for an unmanned underwater vehicle is described in this paper. The control algorithm is simulated by using the marine guidance navigation and control simulator. The project shows a radial basis function metamodel can be used to tune the scaling factors of a fuzzy logic controller. By using offline optimization approach, a comparison between genetic algorithm and metamodeling has been done to minimize the integral square error between the set point and the measured depth of the underwater vehicle. The results showed that it is possible to obtain a reasonably good error using metamodeling approach in much a shorter time compared to the genetic algorithm approach.

  7. A man-made object detection for underwater TV

    Science.gov (United States)

    Cheng, Binbin; Wang, Wenwu; Chen, Yao

    2018-03-01

    It is a great challenging task to complete an automatic search of objects underwater. Usually the forward looking sonar is used to find the target, and then the initial identification of the target is completed by the side-scan sonar, and finally the confirmation of the target is accomplished by underwater TV. This paper presents an efficient method for automatic extraction of man-made sensitive targets in underwater TV. Firstly, the image of underwater TV is simplified with taking full advantage of the prior knowledge of the target and the background; then template matching technology is used for target detection; finally the target is confirmed by extracting parallel lines on the target contour. The algorithm is formulated for real-time execution on limited-memory commercial-of-the-shelf platforms and is capable of detection objects in underwater TV.

  8. Acquisition and tracking for underwater optical communications

    Science.gov (United States)

    Williams, Andrew J.; Laycock, Leslie L.; Griffith, Michael S.; McCarthy, Andrew G.; Rowe, Duncan P.

    2017-10-01

    There is a growing requirement to transfer large volumes of data between underwater platforms. As seawater is transmissive in the visible band, underwater optical communications is an active area of interest since it offers the potential for power efficient, covert and high bandwidth datalinks at short to medium ranges. Short range systems have been successfully demonstrated using sources with low directionality. To realise higher data rates and/or longer ranges, the use of more efficient directional beams is required; by necessity, these must be sufficiently aligned to achieve the required link margin. For mobile platforms, the acquisition and tracking of each node is therefore critical in order to establish and maintain an optical datalink. This paper describes work undertaken to demonstrate acquisition and tracking in a 3D underwater environment. A range of optical sources, beam steering technologies, and tracking sensors have been assessed for suitability. A novel scanning strategy exploiting variable beam divergence was developed to provide robust acquisition whilst minimising acquisition time. A prototype system was assembled and demonstrated in a large water tank. This utilised custom quadrant detectors based on Silicon PhotoMultiplier (SiPM) arrays for fine tracking, and a Wide Field of View (WFoV) sCMOS camera for link acquisition. Fluidic lenses provided dynamic control of beam divergence, and AC modulation/filtering enabled background rejection. The system successfully demonstrated robust optical acquisition and tracking between two nodes with only nanowatt received optical powers. The acquisition time was shown to be dependent on the initial conditions and the transmitted optical power.

  9. On the Effects of Frequency Scaling Over Capacity Scaling in Underwater Networks—Part I

    DEFF Research Database (Denmark)

    Shin, Won-Yong; Roetter, Daniel Enrique Lucani; Médard, Muriel

    2013-01-01

    power-limited network. Interestingly, it is shown that the upper bound is intrinsically related to the attenuation parameter but not the spreading factor. Furthermore, we propose an achievable communication scheme based on the nearest-neighbor MH transmission, which is suitable due to the low......In this two-part paper, information-theoretic capacity scaling laws are analyzed in an underwater acoustic network with n regularly located nodes on a square, in which both bandwidth and received signal power can be limited significantly. Parts I and II deal with an extended network of unit node...... parameter that depends on the frequency scaling as well as the transmission distance. Upper and lower bounds on the capacity scaling are then derived. In Part I, we show that the upper bound on capacity for extended networks is inversely proportional to the attenuation parameter, thus resulting in a highly...

  10. Leakage warning system for flexible underwater pipelines

    Energy Technology Data Exchange (ETDEWEB)

    Moeller, E; Bernstein, L

    1985-08-01

    Underwater pipelines for unloading oil tankers, e.g. in 30 km distance from the harbour site, are required to be flexible and require supervision. This is done by implementation of oil sensitive sensors between the inner rubber tube and the following impregnated textile layer. The generated sensor signals, influenced by leak oil, have to be wireless transmitted from 150 meters under water to the supervisory station at the coast. Sensor configurations are described, to derive the point of the leakage from the topologized warning signals.

  11. Underwater Sound Propagation from Marine Pile Driving.

    Science.gov (United States)

    Reyff, James A

    2016-01-01

    Pile driving occurs in a variety of nearshore environments that typically have very shallow-water depths. The propagation of pile-driving sound in water is complex, where sound is directly radiated from the pile as well as through the ground substrate. Piles driven in the ground near water bodies can produce considerable underwater sound energy. This paper presents examples of sound propagation through shallow-water environments. Some of these examples illustrate the substantial variation in sound amplitude over time that can be critical to understand when computing an acoustic-based safety zone for aquatic species.

  12. Underwater photography - A visual survey method

    Digital Repository Service at National Institute of Oceanography (India)

    Sharma, R.

    Content-Type text/plain; charset=UTF-8 173 Underwater photography - A visual survey method Rahul Sharma National Institute of Oceanography, Dona Paula, Goa-403004 rsharma@nio.org Introduction “Photography as a means of observing...-sea photographs were those made by Maurice Ewing and his co-workers during cruises on Atlantis in 1940-48. Their subject was the seafloor and their method of clicking was to trigger the camera mechanically when its mounting struck bottom. This is the only...

  13. Water waves generated by underwater explosion

    CERN Document Server

    Mehaute, Bernard Le

    1996-01-01

    This is the first book on explosion-generated water waves. It presents the theoretical foundations and experimental results of the generation and propagation of impulsively generated waves resulting from underwater explosions. Many of the theories and concepts presented herein are applicable to other types of water waves, in particular, tsunamis and waves generated by the fall of a meteorite. Linear and nonlinear theories, as well as experimental calibrations, are presented for cases of deep and shallow water explosions. Propagation of transient waves on dissipative, nonuniform bathymetries to

  14. Radon dynamics in underwater thermal radon therapy

    International Nuclear Information System (INIS)

    Lettner, H.; Hofmann, W.; Winkler, R.; Rolle, R.; Foisner, W.

    1998-01-01

    At a facility for underwater thermal radon therapy in Bad Hofgastein, experiments were carried out with the aim of establishing radon in the air exhaled by the treated patients and of radon decay products on the skin of the patients. The time course of radon concentration in the exhaled air shows a maximum a few minutes after entering the bath, then the Rn concentration remains constant over the remaining time spent in the bath. Taking into account several simplifying assumptions, the average dose to the epidermis from radon daughters is about 50 μGy. (A.K.)

  15. Underwater Activities in the Soviet Union

    Science.gov (United States)

    1975-03-01

    morska , no. 12, 1967, 558-559. Eighty hours under the ice. Poseidon, no. 10 (70), 1967, inside front cover, 433-438, and 465. Fisera, M. A tent, a...Schiffbautechnik, no. 10, 1968. 568-574. 222. Kullnski, J. Meduza-2 underwater base for divers. Technika i gospodarka morska , no. 1, 1969, 44-46. 223...Technika i gospodarka morska , no. 4, 1973, 225-226. Baras, J., S. A. Guljar, and J. N. Kiklewitsch. The Ikhtiandr experiments. Poseidon, no. 4(136

  16. Hydraulic lifter for an underwater drilling rig

    Energy Technology Data Exchange (ETDEWEB)

    Garan' ko, Yu L

    1981-01-15

    A hydraulic lifter is suggested for an underwater drilling rig. It includes a base, hydraulic cylinders for lifting the drilling pipes connected to the clamp holder and hydraulic distributor. In order to simplify the design of the device, the base is made with a hollow chamber connected to the rod cavities and through the hydraulic distributor to the cavities of the hydraulic cylinders for lifting the drilling pipes. The hydraulic distributor is connected to the hydrosphere through the supply valve with control in time or by remote control. The base is equipped with reverse valves whose outlets are on the support surface of the base.

  17. Forecast of Remote Underwater Sensing Technology.

    Science.gov (United States)

    1980-07-01

    Ndgrt o oth NIA ye ’ Suite 709NrtFaothMAO5i Arligton VA 2202Attn: Dave Ho0soci, Chief Enginee~r Attn : Jay W. -arford, Manlager, (617) 563-59)17 (703...0,1305 Attn: Dr. A. Zielinski , Asst. Professor Attn: C. R. B. Lister Faculty of Engineering and (20t) 325-5497 Applied Science (709) 753-1200 Lockheed...157. Zielinski , A.; Barbour, L.; "Swept Carrier Acoustic Underwater Communica- tions," IEEE/MTS Oceans 󈨒, Washington, DC, Sept. 6-8, 1978. 158

  18. Navigation System Fault Diagnosis for Underwater Vehicle

    DEFF Research Database (Denmark)

    Falkenberg, Thomas; Gregersen, Rene Tavs; Blanke, Mogens

    2014-01-01

    This paper demonstrates fault diagnosis on unmanned underwater vehicles (UUV) based on analysis of structure of the nonlinear dynamics. Residuals are generated using dierent approaches in structural analysis followed by statistical change detection. Hypothesis testing thresholds are made signal...... based to cope with non-ideal properties seen in real data. Detection of both sensor and thruster failures are demonstrated. Isolation is performed using the residual signature of detected faults and the change detection algorithm is used to assess severity of faults by estimating their magnitude...

  19. Working underwater: deepwater drilling support by ROV

    Energy Technology Data Exchange (ETDEWEB)

    1958-01-01

    Experience with the drill ships Discoverer Seven Seas and Penrod 78 explains some of the problems associated with the use of remotely operated vehicles (ROVs) for underwater operations. Support services are a bigger problem than depth. The author describes developments, such as the new guidewire methods, side launch A-frame davit, and top hat stabilizing frame. All parts of the ROV system must be of heavy duty design, and operative skill is of paramount importance. The major requirements for deep water ROVs are reliability, fail-safe redundancy, cage deployment, compact size, adequate power, and capacity for heavy intervention work. 8 figures.

  20. Determining spherical lens correction for astronaut training underwater.

    Science.gov (United States)

    Porter, Jason; Gibson, C Robert; Strauss, Samuel

    2011-09-01

    To develop a model that will accurately predict the distance spherical lens correction needed to be worn by National Aeronautics and Space Administration astronauts while training underwater. The replica space suit's helmet contains curved visors that induce refractive power when submersed in water. Anterior surface powers and thicknesses were measured for the helmet's protective and inside visors. The impact of each visor on the helmet's refractive power in water was analyzed using thick lens calculations and Zemax optical design software. Using geometrical optics approximations, a model was developed to determine the optimal distance spherical power needed to be worn underwater based on the helmet's total induced spherical power underwater and the astronaut's manifest spectacle plane correction in air. The validity of the model was tested using data from both eyes of 10 astronauts who trained underwater. The helmet's visors induced a total power of -2.737 D when placed underwater. The required underwater spherical correction (FW) was linearly related to the spectacle plane spherical correction in air (FAir): FW = FAir + 2.356 D. The mean magnitude of the difference between the actual correction worn underwater and the calculated underwater correction was 0.20 ± 0.11 D. The actual and calculated values were highly correlated (r = 0.971) with 70% of eyes having a difference in magnitude of astronauts. The model accurately predicts the actual values worn underwater and can be applied (more generally) to determine a suitable spectacle lens correction to be worn behind other types of masks when submerged underwater.

  1. Underwater welding using remote controlled robots. Development of remote underwater welding technology with a high power YAG laser

    International Nuclear Information System (INIS)

    Miwa, Yasuhiro; Sato, Syuuichi; Kojima, Toshio; Owaki, Katsura; Hirose, Naoya

    2002-01-01

    As components in nuclear power plant have been periodically carried out their inspection and repair to keep their integrity, on radioactive liquid wastes storage facility, because of difficulty on their inspection by human beings, some are remained without inspection, and even when capable of inspection, conversion from human works to remote operations is desired from a viewpoint of their operation efficiency upgrading. For response to these needs, some developments on a technology capable of carrying out inspection of their inside at underwater environment and repairing welding with YAG laser by means of remote operation, have been performed. Remote underwater inspection and repair technology is a combination technology of already applied underwater mobile technique (underwater inspection robot) with underwater YAG laser welding technique which is recently at actual using level. Therefore, this technology is composed of an inspection robot and a repair welding robot. And, testing results using the underwater inspection robot and welding test results using the underwater repair welding robot, were enough preferable to obtain forecasting applicable to actual apparatuses. This technology is especially effective for inspection and repair of inside of nuclear fuel cycle apparatuses and relatively high dose apparatuses, and can be thought to be applicable also to large capacity tanks, tanks dealing with harmful matters, underwater structures, and so on, in general industries. (G.K.)

  2. [Decontamination of chemical warfare agents by photocatalysis].

    Science.gov (United States)

    Hirakawa, Tsutomu; Mera, Nobuaki; Sano, Taizo; Negishi, Nobuaki; Takeuchi, Koji

    2009-01-01

    Photocatalysis has been widely applied to solar-energy conversion and environmental purification. Photocatalyst, typically titanium dioxide (TiO(2)), produces active oxygen species under irradiation of ultraviolet light, and can decompose not only conventional pollutants but also different types of hazardous substances at mild conditions. We have recently started the study of photocatalytic decontamination of chemical warfare agents (CWAs) under collaboration with the National Research Institute of Police Science. This article reviews environmental applications of semiconductor photocatalysis, decontamination methods for CWAs, and previous photocatalytic studies applied to CWA degradation, together with some of our results obtained with CWAs and their simulant compounds. The data indicate that photocatalysis, which may not always give a striking power, certainly helps detoxification of such hazardous compounds. Unfortunately, there are not enough data obtained with real CWAs due to the difficulty in handling. We will add more scientific data using CWAs in the near future to develop useful decontamination systems that can reduce the damage caused by possible terrorism.

  3. Biomaterials for mediation of chemical and biological warfare agents.

    Science.gov (United States)

    Russell, Alan J; Berberich, Jason A; Drevon, Geraldine F; Koepsel, Richard R

    2003-01-01

    Recent events have emphasized the threat from chemical and biological warfare agents. Within the efforts to counter this threat, the biocatalytic destruction and sensing of chemical and biological weapons has become an important area of focus. The specificity and high catalytic rates of biological catalysts make them appropriate for decommissioning nerve agent stockpiles, counteracting nerve agent attacks, and remediation of organophosphate spills. A number of materials have been prepared containing enzymes for the destruction of and protection against organophosphate nerve agents and biological warfare agents. This review discusses the major chemical and biological warfare agents, decontamination methods, and biomaterials that have potential for the preparation of decontamination wipes, gas filters, column packings, protective wear, and self-decontaminating paints and coatings.

  4. Underwater sediment-contact radiation survey method

    International Nuclear Information System (INIS)

    Lee, D.R.; St. Aubin, M.; Welch, S.J.

    1991-01-01

    The authors are striving to produce a practical system for mapping lateral distributions in gamma activity on submerged sediments. This is in response to the need for quality control and interpretation of data obtainable by sediment sampling and analyses near nuclear utilities. A prototype gamma probe has been constructed and tested. The prototype is essentially a background survey meter packaged in a 53-cm-long x 5.4-cm-diam waterproof vehicle. This usage-shaped vehicle is connected to a cable for towing in contact with bottom sediments of lakes, rivers, and coastal waters. This vehicle, or sediment probe as it is called, was initially developed for measuring sediment electrical conductances, a parameter that can be used to locate underwater areas of groundwater and contaminant upwelling. During towing, the probe does not roll or twist around its longitudinal axis by more than 10 deg, so that sensors, which have been fixed within the vehicle, can be oriented to look up, down, or sideways. In over 450 lin-km of underwater survey, only a single sediment probe has been irretrievably snagged on sunken rocks or other debris. Work in the Ottawa River near the Chalk River Laboratories has shown good agreement among point measurements of river sediment with continuous measurements using the moving probe

  5. Underwater inspection training in intense radiation field

    International Nuclear Information System (INIS)

    Taniguchi, Ryoichi

    2017-01-01

    Osaka Prefecture University has a large dose cobalt 60 gamma ray source of about 2 PBq, and is engaged in technological training and human resource development. It is assumed that the decommissioning underwater operation of Fukushima Daiichi Nuclear Power Station would be the focus. The university aims at acquisition of the basic of underwater inspection work under radiation environment that is useful for the above purpose, radiation measurement under water, basic training in image measurement, and aims as well to evaluate the damage of imaging equipment due to radiation, and master practical knowledge for the use of inspection equipment under a large dose. In particular, it is valuable to train in the observation of Cherenkov light emitted from a large dose cobalt radiation source in water using a high sensitivity camera. The measurement of radiation dose distribution in water had difficulty in remote measurement due to water shielding effect. Although it took much time before, the method using high sensitivity camera is easy to sequentially perform two-dimensional measurement, and its utility value is large. Its effect on the dose distribution measurement of irregularly shaped sources is great. The contents of training includes the following: radiation source imaging in water, use of a laser rangefinder in water, dose distribution measurement in water and Cherenkov light measurement, judgment of equipment damage due to irradiation, weak radiation measurement, and measurement and decontamination of surface contamination. (A.O.)

  6. Underwater noise from a wave energy converter

    DEFF Research Database (Denmark)

    Tougaard, Jakob

    A recent addition to the anthropogenic sources of underwater noise is offshore wave energy converters. Underwater noise was recorded from the Wavestar wave energy converter located at Hastholm, Denmark (57°7.73´N, 8°37.23´E). The Wavestar is a full-scale test and demonstration converter...... in full operation and start and stop of the converter. Median broad band (10 Hz – 20 kHz) sound pressure level (Leq) was 123 dB re. 1 Pa, irrespective of status of the wave energy converter (stopped, running or starting/stopping). The most pronounced peak in the third-octave spectrum was in the 160 Hz...... significant noise above ambient could be detected above the 250 Hz band. The absolute increase in noise above ambient was very small. L50 third-octave levels in the four bands with the converter running were thus only 1-2 dB above ambient L50 levels. The noise recorded 25 m from the wave energy converter...

  7. An explanatory model of underwater adaptation

    Directory of Open Access Journals (Sweden)

    Joaquín Colodro

    Full Text Available The underwater environment is an extreme environment that requires a process of human adaptation with specific psychophysiological demands to ensure survival and productive activity. From the standpoint of existing models of intelligence, personality and performance, in this explanatory study we have analyzed the contribution of individual differences in explaining the adaptation of military personnel in a stressful environment. Structural equation analysis was employed to verify a model representing the direct effects of psychological variables on individual adaptation to an adverse environment, and we have been able to confirm, during basic military diving courses, the structural relationships among these variables and their ability to predict a third of the variance of a criterion that has been studied very little to date. In this way, we have confirmed in a sample of professionals (N = 575 the direct relationship of emotional adjustment, conscientiousness and general mental ability with underwater adaptation, as well as the inverse relationship of emotional reactivity. These constructs are the psychological basis for working under water, contributing to an improved adaptation to this environment and promoting risk prevention and safety in diving activities.

  8. Modelling cavitating flow around underwater missiles

    Directory of Open Access Journals (Sweden)

    Fabien Petitpas

    2011-12-01

    Full Text Available The diffuse interface model of Saurel et al. (2008 is used for the computation of compressible cavitating flows around underwater missiles. Such systems use gas injection and natural cavitation to reduce drag effects. Consequently material interfaces appear separating liquid and gas. These interfaces may have a really complex dynamics such that only a few formulations are able to predict their evolution. Contrarily to front tracking or interface reconstruction method the interfaces are computed as diffused numerical zones, that are captured in a routinely manner, as is done usually with gas dynamics solvers for shocks and contact discontinuity. With the present approach, a single set of partial differential equations is solved everywhere, with a single numerical scheme. This leads to very efficient solvers. The algorithm derived in Saurel et al. (2009 is used to compute cavitation pockets around solid bodies. It is first validated against experiments done in cavitation tunnel at CNU. Then it is used to compute flows around high speed underwater systems (Shkval-like missile. Performance data are then computed showing method ability to predict forces acting on the system.

  9. Chemical Warfare Materiel in Sediment at a Deep-Water Discarded Military Munitions Site

    Science.gov (United States)

    Briggs, C. W.; Bissonnette, M. C.; Edwards, M.; Shjegstad, S. M.

    2016-12-01

    Understanding the release and transformation of chemical agent (CA) at underwater discarded military munitions (DMM) sites is essential to determine the potential risk to human health and impact on the ocean environment; yet few studies have been conducted at sites in excess of 250 m, the depth at which most U.S. CA munitions were disposed. Maritime construction workers installing cables or pipelines at a CA DMM site, as well as fishermen and scientific researchers deploying bottom-contact gear, represent possible exposure pathways to human receptors. The Hawai`i Undersea Military Munitions Assessment (HUMMA) sought to characterize a historic munitions sea-disposal site at depths between 400-650 m. During the 2014 HUMMA Sampling Survey, the Jason 2 remotely operated vehicle was used to collect sediments within two meters of suspected World War II chemical munitions, confirmed to be 100-lb M47 series bombs containing sulfur mustard. When environmental media was brought to the surface, samples were screened for distilled sulfur mustard (HD) and related agent breakdown products (ABP) (collectively referred to as chemical warfare materiel [CWM]). Detectable concentrations of HD and/or its ABP 1,4-dithiane were found in sediments collected at all CA DMM sites; HD was also detected at two control sites. The location and extent of munitions casing deterioration strongly influenced the distribution and level of CWM in sediment. The interior of the casing contained levels of CWM orders of magnitudes higher than that observed in the surrounding sediment at one meter distance, indicating the majority of the CWM is hydrolyzed as it is released from the munitions casing and a fraction of the fill materiel persists in the environment for decades following disposal. Although the potential for future site users to become exposed to CWA in recovered sediments and debris exists, the level of risk is significantly mitigated by the depth and location of the sea-disposal site.

  10. Lanchester-Type Models of Warfare, Volume II

    OpenAIRE

    Taylor, James G.

    1980-01-01

    This monograph is a comprehensive treatist on Lanchester-type models of warfare, i.e. differential-equation models of attrition in force-on-force combat operations. Its goal is to provide both an introduction to and current-state-of-the-art overview of Lanchester-type models of warfare as well as a comprehensive and unified in-depth treatment of them. Both deterministic as well as stochastic models are considered. Such models have been widely used in the United States and elsewhere for the...

  11. Hybrid warfare of the USA in South America

    Directory of Open Access Journals (Sweden)

    A. V. Budaev

    2015-01-01

    Full Text Available Washington’s hybrid warfare in Latin American region differs by its inventive and sophisticated methods and in fact represents a complex and multidimensional phenomenon including symbiosis of the “soft” and “hard” power as well as their combination in the form of the “smart power”. The increasing importance of hybrid warfare technologies in the US foreign policy in Latin America predetermines the necessity of thorough studies and analysis of this phenomenon for providing Russian interests.

  12. IMS software developments for the detection of chemical warfare agent

    Science.gov (United States)

    Klepel, ST.; Graefenhain, U.; Lippe, R.; Stach, J.; Starrock, V.

    1995-01-01

    Interference compounds like gasoline, diesel, burning wood or fuel, etc. are presented in common battlefield situations. These compounds can cause detectors to respond as a false positive or interfere with the detector's ability to respond to target compounds such as chemical warfare agents. To ensure proper response of the ion mobility spectrometer to chemical warfare agents, two special software packages were developed and incorporated into the Bruker RAID-1. The programs suppress interferring signals caused by car exhaust or smoke gases resulting from burning materials and correct the influence of variable sample gas humidity which is important for detection and quantification of blister agents like mustard gas or lewisite.

  13. Multiuser underwater acoustic communication using single-element virtual time reversal mirror

    Institute of Scientific and Technical Information of China (English)

    YIN JingWei; WANG YiLin; WANG Lei; HUI JunYing

    2009-01-01

    Pattern time delay shift coding (PDS) scheme is introduced and combined with spread spectrum tech-nique called SS-PDS for short which is power-saving and competent for long-range underwater acous-tic networks.Single-element virtual time reversal mirror (VTRM) is presented in this paper and validated by the lake trial results.Employing single-element VTRM in multiuser communication system based on SS-PDS can separate different users' information simultaneously at master node as indicated in the simulation results.

  14. Impact of Vessel Noise on Oyster Toadfish (Opsanus tau) Behavior and Implications for Underwater Noise Management

    Science.gov (United States)

    Krahforst, Cecilia S.

    Underwater noise and its impacts on marine life are growing management concerns. This dissertation considers both the ecological and social concerns of underwater noise, using the oyster toadfish (Opsanus tau) as a model species. Oyster toadfish call for mates using a boatwhistle sound, but increased ambient noise levels from vessels or other anthropogenic activities are likely to influence the ability of males to find mates. If increased ambient noise levels reduce fish fitness then underwater noise can impact socially valued ecosystem services (e.g. fisheries). The following ecological objectives of the impacts of underwater noise on oyster toadfish were investigated: (1) to determine how noise influences male calling behavior; (2) to assess how areas of high vessel activity ("noisy") and low vessel activity ("quiet") influence habitat utilization (fish standard length and occupancy rate); and (3) to discover if fitness (number of clutches and number of embryos per clutch) is lower in "noisy" compared with "quiet" sites. Field experiments were executed in "noisy" and "quiet" areas. Recorded calls by males in response to playback sounds (vessel, predator, and snapping shrimp sounds) and egg deposition by females ("noisy" vs. "quiet" sites) demonstrated that oyster toadfish are impacted by underwater noise. First, males decreased their call rates and called louder in response to increased ambient noise levels. Second, oyster toadfish selected nesting sites in areas with little or no inboard motorboat activity. Third, male oyster toadfish at "noisy" sites either had no egg clutches on their shelters or the number of embryos per clutch was significantly lower than in the "quiet" areas. Underwater noise and disturbance from vessels are influencing the fitness of the oyster toadfish. The social significance of the growing concerns regarding underwater noise was investigated by identifying dominant themes found within two types of texts: four recent underwater noise

  15. Underwater cladding with laser beam and plasma arc welding

    International Nuclear Information System (INIS)

    White, R.A.; Fusaro, R.; Jones, M.G.; Solomon, H.D.; Milian-Rodriguez, R.R.

    1997-01-01

    Two welding processes, plasma arc (transferred arc) (PTA) and laser beam, were investigated to apply cladding to austenitic stainless steels and Inconel 600. These processes have long been used to apply cladding layers , but the novel feature being reported here is that these cladding layers were applied underwater, with a water pressure equivalent to 24 m (80 ft). Being able to apply the cladding underwater is very important for many applications, including the construction of off-shore oil platforms and the repair of nuclear reactors. In the latter case, being able to weld underwater eliminates the need for draining the reactor and removing the fuel. Welding underwater in reactors presents numerous challenges, but the ability to weld without having to drain the reactor and remove the fuel provides a huge cost savings. Welding underwater in reactors must be done remotely, but because of the radioactive corrosion products and neutron activation of the steels, remote welding would also be required even if the reactor is drained and the fuel removed. In fact, without the shielding of the water, the remote welding required if the reactor is drained might be even more difficult than that required with underwater welds. Furthermore, as shall be shown, the underwater welds that the authors have made were of high quality and exhibit compressive rather than tensile residual stresses

  16. Underwater fiber-wireless communication with a passive front end

    Science.gov (United States)

    Xu, Jing; Sun, Bin; Lyu, Weichao; Kong, Meiwei; Sarwar, Rohail; Han, Jun; Zhang, Wei; Deng, Ning

    2017-11-01

    We propose and experimentally demonstrate a novel concept on underwater fiber-wireless (Fi-Wi) communication system with a fully passive wireless front end. A low-cost step-index (SI) plastic optical fiber (POF) together with a passive collimating lens at the front end composes the underwater Fi-Wi architecture. We have achieved a 1.71-Gb/s transmission at a mean BER of 4.97 × 10-3 (1.30 × 10-3 when using power loading) over a 50-m SI-POF and 2-m underwater wireless channel using orthogonal frequency division multiplexing (OFDM). Although the wireless part is very short, it actually plays a crucial role in practical underwater implementation, especially in deep sea. Compared with the wired solution (e.g. using a 52-m POF cable without the UWOC part), the proposed underwater Fi-Wi scheme can save optical wet-mate connectors that are sophisticated, very expensive and difficult to install in deep ocean. By combining high-capacity robust POF with the mobility and ubiquity of underwater wireless optical communication (UWOC), the proposed underwater Fi-Wi technology will find wide application in ocean exploration.

  17. Intelligent Navigation for a Solar Powered Unmanned Underwater Vehicle

    Directory of Open Access Journals (Sweden)

    Francisco García-Córdova

    2013-04-01

    Full Text Available In this paper, an intelligent navigation system for an unmanned underwater vehicle powered by renewable energy and designed for shadow water inspection in missions of a long duration is proposed. The system is composed of an underwater vehicle, which tows a surface vehicle. The surface vehicle is a small boat with photovoltaic panels, a methanol fuel cell and communication equipment, which provides energy and communication to the underwater vehicle. The underwater vehicle has sensors to monitor the underwater environment such as sidescan sonar and a video camera in a flexible configuration and sensors to measure the physical and chemical parameters of water quality on predefined paths for long distances. The underwater vehicle implements a biologically inspired neural architecture for autonomous intelligent navigation. Navigation is carried out by integrating a kinematic adaptive neuro-controller for trajectory tracking and an obstacle avoidance adaptive neuro- controller. The autonomous underwater vehicle is capable of operating during long periods of observation and monitoring. This autonomous vehicle is a good tool for observing large areas of sea, since it operates for long periods of time due to the contribution of renewable energy. It correlates all sensor data for time and geodetic position. This vehicle has been used for monitoring the Mar Menor lagoon.

  18. The influence of underwater turbulence on optical phase measurements

    Science.gov (United States)

    Redding, Brandon; Davis, Allen; Kirkendall, Clay; Dandridge, Anthony

    2016-05-01

    Emerging underwater optical imaging and sensing applications rely on phase-sensitive detection to provide added functionality and improved sensitivity. However, underwater turbulence introduces spatio-temporal variations in the refractive index of water which can degrade the performance of these systems. Although the influence of turbulence on traditional, non-interferometric imaging has been investigated, its influence on the optical phase remains poorly understood. Nonetheless, a thorough understanding of the spatio-temporal dynamics of the optical phase of light passing through underwater turbulence are crucial to the design of phase-sensitive imaging and sensing systems. To address this concern, we combined underwater imaging with high speed holography to provide a calibrated characterization of the effects of turbulence on the optical phase. By measuring the modulation transfer function of an underwater imaging system, we were able to calibrate varying levels of optical turbulence intensity using the Simple Underwater Imaging Model (SUIM). We then used high speed holography to measure the temporal dynamics of the optical phase of light passing through varying levels of turbulence. Using this method, we measured the variance in the amplitude and phase of the beam, the temporal correlation of the optical phase, and recorded the turbulence induced phase noise as a function of frequency. By bench marking the effects of varying levels of turbulence on the optical phase, this work provides a basis to evaluate the real-world potential of emerging underwater interferometric sensing modalities.

  19. Underwater television camera for monitoring inner side of pressure vessel

    International Nuclear Information System (INIS)

    Takayama, Kazuhiko.

    1997-01-01

    An underwater television support device equipped with a rotatable and vertically movable underwater television camera and an underwater television camera controlling device for monitoring images of the inside of the reactor core photographed by the underwater television camera to control the position of the underwater television camera and the underwater light are disposed on an upper lattice plate of a reactor pressure vessel. Both of them are electrically connected with each other by way of a cable to rapidly observe the inside of the reactor core by the underwater television camera. The reproducibility is extremely satisfactory by efficiently concentrating the position of the camera and image information upon inspection and observation. As a result, the steps for periodical inspection can be reduced to shorten the days for the periodical inspection. Since there is no requirement to withdraw fuel assemblies over a wide reactor core region, and the device can be used with the fuel assemblies being left as they are in the reactor, it is suitable for inspection of detectors for nuclear instrumentation. (N.H.)

  20. Autonomous docking control of visual-servo type underwater vehicle system aiming at underwater automatic charging

    International Nuclear Information System (INIS)

    Yanou, Akira; Ohnishi, Shota; Ishiyama, Shintaro; Minami, Mamoru

    2015-01-01

    A visual-servo type remotely operated vehicle (ROV) system with binocular wide-angle lens was developed to survey submarine resources, decontaminate radiation from mud in dam lake and so on. This paper explores the experiments on regulator performance and underwater docking of the robot system utilizing Genetic Algorithm (GA) for real-time recognition of the robot's relative position and posture through 3D marker. The visual servoing performances have been verified as follows; (1) The stability performances of the proposed regulator system have been evaluated by exerting abrupt distrubane force while the ROV is controlled by visual servoing. (2) The proposed system can track time-variant desired target position in x-axis (front-back direction of the robot). (3) The underwater docking can be completed by switching visual servoing and docking modes based on the error threshold, and by giving time-varying desired target position and orientation to the controller as a desired pose. (author)

  1. Summary of the guideline on underwater laser beam repair welding

    International Nuclear Information System (INIS)

    Ichikawa, Hiroya; Yoda, Masaki; Motora, Yuichi

    2013-01-01

    It is known that stress corrosion cracking (SCC) might occur at the weld of a reactor pressure vessel or core internals. Underwater laser beam clad welding for mitigation of SCC has been already established and the guideline 'Underwater laser beam clad welding' was published. Moreover, the guideline 'Seal welding' was also published as a repair method for SCC. In addition to these guidelines, the guideline 'Underwater laser beam repair welding' was newly published in November, 2012 for the repair welding after completely removing a SCC crack occurred in weld or base metal. This paper introduces the summary of this guideline. (author)

  2. Application of YAG laser processing in underwater welding and cutting

    Energy Technology Data Exchange (ETDEWEB)

    Ohwaki, Katsura; Morita, Ichiro; Kojima, Toshio; Sato, Shuichi [Ishikawajima-Harima Heavy Industries Co. Ltd., Tokyo (Japan)

    2002-09-01

    The high-power YAG laser is a new fabrication tool. The laser torch is easy to combine with complex with complex mechanics because of beam delivery through optical fiber. A direct underwater laser welding technology has been developed and applied to the preservation, maintenance and removal of nuclear power plants. For subdividing or removing operations for retirement of plants, the laser cutting properties were confirmed to allow a maximum cutting thickness of 80 mm. For repairing inner surface of stainless steel tanks, an underwater laser welding system using a remote-controlled robot was developed and the high quality of underwater laser welding was confirmed. (author)

  3. WODA Technical Guidance on Underwater Sound from Dredging.

    Science.gov (United States)

    Thomsen, Frank; Borsani, Fabrizio; Clarke, Douglas; de Jong, Christ; de Wit, Pim; Goethals, Fredrik; Holtkamp, Martine; Martin, Elena San; Spadaro, Philip; van Raalte, Gerard; Victor, George Yesu Vedha; Jensen, Anders

    2016-01-01

    The World Organization of Dredging Associations (WODA) has identified underwater sound as an environmental issue that needs further consideration. A WODA Expert Group on Underwater Sound (WEGUS) prepared a guidance paper in 2013 on dredging sound, including a summary of potential impacts on aquatic biota and advice on underwater sound monitoring procedures. The paper follows a risk-based approach and provides guidance for standardization of acoustic terminology and methods for data collection and analysis. Furthermore, the literature on dredging-related sounds and the effects of dredging sounds on marine life is surveyed and guidance on the management of dredging-related sound risks is provided.

  4. Development of underwater laser cladding and underwater laser seal welding techniques for reactor components

    International Nuclear Information System (INIS)

    Hino, Takehisa; Tamura, Masataka; Tanaka, Yoshimi; Kouno, Wataru; Makino, Yoshinobu; Kawano, Shohei; Matsunaga, Keiji

    2009-01-01

    Stress corrosion cracking (SCC) has been reported at the aged components in many nuclear power plants. Toshiba has been developing the underwater laser welding. This welding technique can be conducted without draining the water in the reactor vessel. It is beneficial for workers not to exposure the radiation. The welding speed can be attaining twice as fast as that of Gas Tungsten Arc Welding (GTAW). The susceptibility of SCC can also be lower than the Alloy 600 base metal. (author)

  5. Nanostructured Metal Oxides for Stoichiometric Degradation of Chemical Warfare Agents

    Czech Academy of Sciences Publication Activity Database

    Štengl, Václav; Henych, Jiří; Janos, P.; Skoumal, M.

    2016-01-01

    Roč. 236, č. 2016 (2016), s. 239-258 ISSN 0179-5953 R&D Projects: GA ČR(CZ) GAP106/12/1116 Institutional support: RVO:61388980 Keywords : chemical warfare agent * metal nanoparticle * unique surface- chemistry * mesoporous manganese oxide Subject RIV: CA - Inorganic Chemistry Impact factor: 3.930, year: 2016

  6. The Role of Civil Affairs in Unconventional Warfare

    Science.gov (United States)

    2012-12-01

    neighbor to the west, and secured the eastern border of Laos 32 Mao Tse -Tung, On Guerrilla Warfare...INTRODUCTION..........................................................................................19  B.  BRIEF HISTORY OF LAOS ...Royal Lao Army SCA Support to Civil Administration SCIRI Supreme Council of Iraq SG Shadow Government SOF Special Operations Forces TAI Targeted

  7. Management information systems for electronic warfare command and decision support

    CSIR Research Space (South Africa)

    Van Niekerk, B

    2015-04-01

    Full Text Available information to allow them to manage their own spectrum, to identify threats, and to deny adversaries’ use of the spectrum. In this paper, the concepts of integrated electronic warfare and spectrum battle management are introduced, and the relevant information...

  8. Manoeuvre warfare analysis of South Africa's 1914-1915 German ...

    African Journals Online (AJOL)

    The study reported in this article explored the nexus between military theory and history. Military theory attempts to quantify, qualify and illuminate the often unpredictable phenomenon of war. The article consists of two parts: the theory of manoeuvre warfare and the history of the 1914-1915 South African campaign in ...

  9. blitzkrieg to desert storm: the evolution of operational warfare

    African Journals Online (AJOL)

    a_nabb

    disease of stalemates infecting militaries before the Second World War. The invasion did not change the world; instead, it brought about an increased awareness of the importance of the operational level of war, a dimension of warfare previously neglected. The German operational effectiveness represented an evolution ...

  10. A identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongping

    2006-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of Detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on the theory discussed above. (authors)

  11. Identification system for chemical warfare agents with PGNAA method

    International Nuclear Information System (INIS)

    Wang Bairong; Yin Guanghua; Yang Zhongpin

    2007-01-01

    The principle and the experimental commanding of Chemical warfare Agents Identification with PGNAA method are discussed in this paper. The choosing of detector, neutron source and the data processing method are detailed. Finally, a set of experimental instruments composed of Cf-232 and BGO detector is developed based on this theory discussed above. (authors)

  12. Biomonitoring of exposure to chemical warfare agents: A review

    NARCIS (Netherlands)

    Noort, D.; Benschop, H.P.; Black, R.M.

    2002-01-01

    In this report an overview of the methods currently available for detection of exposure to a number of chemical warfare agents (CWA), i.e., sulfur mustard, lewisite and nerve agents, is presented. Such methods can be applied for various purposes, e.g., diagnosis and dosimetry of exposure of

  13. Researchers study decontamination of chemical, biological warfare agents

    OpenAIRE

    Trulove, Susan

    2007-01-01

    The U.S. Army Research Office has awarded Virginia Tech a $680,000 grant over two years to build an instrument that can be used to study the chemistry of gases that will decompose both chemical and biological warfare agents on surfaces.

  14. Recent canadian experience in chemical warfare agent destruction. An overview

    Energy Technology Data Exchange (ETDEWEB)

    McAndless, J.M.

    1995-09-01

    A Canadian chemical warfare agent destruction project (Swiftsure) was recently completed in which stockpiles of aged mustard, lewisite, nerve agents and contaminated scrap metal were incinerated or chemically neutralized in a safe, environmentally-responsible manner. The project scope, destruction technologies, environmental monitoring and public consultation programs are described.

  15. Distribution of chemical warfare agent, energetics, and metals in sediments at a deep-water discarded military munitions site

    Science.gov (United States)

    Briggs, Christian; Shjegstad, Sonia M.; Silva, Jeff A. K.; Edwards, Margo H.

    2016-06-01

    There is a strong need to understand the behavior of chemical warfare agent (CWA) at underwater discarded military munitions (DMM) sites to determine the potential threat to human health or the environment, yet few studies have been conducted at sites in excess of 250 m, the depth at which most U.S. chemical munitions were disposed. As part of the Hawai'i Undersea Military Munitions Assessment (HUMMA), sediments adjacent to chemical and conventional DMM at depths of 400-650 m were sampled using human occupied vehicles (HOVs) in order to quantify the distribution of CWA, energetics, and select metals. Sites in the same general area, with no munitions within 50 m in any direction were sampled as a control. Sulfur mustard (HD) and its degradation product 1,4-dithiane were detected at each CWA DMM site, as well as a single sample with the HD degradation product 1,4-thioxane. An energetic compound was detected in sediment to a limited extent at one CWA DMM site. Metals common in munitions casings (i.e., Fe, Cu, and Pb) showed similar trends at the regional and site-wide scales, likely reflecting changes in marine sediment deposition and composition. This study shows HD and its degradation products can persist in the deep-marine environment for decades following munitions disposal.

  16. The NESTOR underwater neutrino telescope project

    Energy Technology Data Exchange (ETDEWEB)

    Rapidis, Petros A. [Institute of Nuclear Physics, National Center for Scientific Research ' Demokritos' , Athens 15310 (Greece)], E-mail: rapidis@inp.demokritos.gr

    2009-04-11

    The NESTOR collaboration is continuing its efforts towards deploying an underwater neutrino telescope. Further site studies (e.g. water light transmission measurements, sedimentation rates, etc.) are being carried out within the context of characterizing a site that may host the proposed KM3NeT infrastructure. In addition, following the successful deployment of a single floor of a NESTOR tower in 2003, five floors are now in the final stages of preparation. The use of these five floors in a form of a truncated tower together with four autonomous strings to be located some 300 m away from the tower is being contemplated. This arrangement, named NuBE (for Neutrino Burst Experiment), that may allow the detection neutrinos in coincidence with Gamma Ray Bursts, will be described.

  17. Transducers and arrays for underwater sound

    CERN Document Server

    Butler, John L

    2016-01-01

    This improved and updated second edition covers the theory, development, and design of electro-acoustic transducers for underwater applications. This highly regarded text discusses the basics of piezoelectric and magnetostrictive transducers that are currently being used as well as promising new designs. It presents the basic acoustics as well as the specific acoustics data needed in transducer design and evaluation. A broad range of designs of projectors and hydrophones are described in detail along with methods of modeling, evaluation, and measurement. Analysis of projector and hydrophone transducer arrays, including the effects of mutual radiation impedance and numerical models for elements and arrays, are also covered. The book includes new advances in transducer design and transducer materials and has been completely reorganized to be suitable for use as a textbook, as well as a reference or handbook. The new edition contains updates to the first edition, end-of-chapter exercises, and solutions to select...

  18. Collision Detection for Underwater ROV Manipulator Systems

    Directory of Open Access Journals (Sweden)

    Satja Sivčev

    2018-04-01

    Full Text Available Work-class ROVs equipped with robotic manipulators are extensively used for subsea intervention operations. Manipulators are teleoperated by human pilots relying on visual feedback from the worksite. Operating in a remote environment, with limited pilot perception and poor visibility, manipulator collisions which may cause significant damage are likely to happen. This paper presents a real-time collision detection algorithm for marine robotic manipulation. The proposed collision detection mechanism is developed, integrated into a commercial ROV manipulator control system, and successfully evaluated in simulations and experimental setup using a real industry standard underwater manipulator. The presented collision sensing solution has a potential to be a useful pilot assisting tool that can reduce the task load, operational time, and costs of subsea inspection, repair, and maintenance operations.

  19. The NESTOR underwater neutrino telescope project

    International Nuclear Information System (INIS)

    Rapidis, Petros A.

    2009-01-01

    The NESTOR collaboration is continuing its efforts towards deploying an underwater neutrino telescope. Further site studies (e.g. water light transmission measurements, sedimentation rates, etc.) are being carried out within the context of characterizing a site that may host the proposed KM3NeT infrastructure. In addition, following the successful deployment of a single floor of a NESTOR tower in 2003, five floors are now in the final stages of preparation. The use of these five floors in a form of a truncated tower together with four autonomous strings to be located some 300 m away from the tower is being contemplated. This arrangement, named NuBE (for Neutrino Burst Experiment), that may allow the detection neutrinos in coincidence with Gamma Ray Bursts, will be described.

  20. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber