Subscribe free to our newsletters via your
. Medical and Hospital News .




TECH SPACE
Big Mechanism Seeks the "Whys" Hidden in Big Data
by Staff Writers
Washington DC (SPX) Feb 27, 2014


File image.

As commercial technologies become more advanced and widely available, adversaries are rapidly developing capabilities that put our forces at risk. To counter these threats, the U.S. military is developing systems-of-systems concepts in which networks of manned and unmanned platforms, weapons, sensors, and electronic warfare systems interact over robust satellite and tactical communications links.

These approaches offer flexible and powerful options to the warfighter, but the complexity introduced by the increase in the number of employment alternatives creates a battle management challenge. Current battle management systems often lack the benefit of automated aids to help comprehend and adapt to dynamic situations.

Further complicating matters, in future conflicts U.S. forces may face degradation or denial of critical communications capabilities essential for coordination and shared situation understanding. With both the complexity of coordinating innovative systems of systems, and the sophistication of adversary capabilities expected to grow, automated decision aids become vital.

DARPA's Distributed Battle Management (DBM) program aims to address these challenges. The program aims to develop control algorithms and demonstrate robust decision-aid software for battle management at the tactical edge.

"We're looking for innovative algorithms from the planning and control theory communities that go beyond current algorithms, many of which assume assured communications in the tactical environment," said Craig Lawrence, DARPA program manager.

"Advanced human-machine interaction technologies for cockpits and battle manager stations are also an area where we're looking for novel approaches to enable greater comprehension and quick decision making in an increasingly contested and complex battlespace."

The program envisions two phases. Phase 1 focuses on technology development-planning, control, and situation understanding algorithms, and design of appropriate human-machine interfaces-and system engineering.

Phase 2 plans for a team to build an integrated DBM capability to manage air-to-air and air-to-ground combat in a contested environment and to demonstrate that capability in large-scale simulation and live fly events.

DARPA has issued a Broad Agency Announcement (BAA) solicitation for the first phase of the program

.


Related Links
DARPA
Space Technology News - Applications and Research






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks








TECH SPACE
Data links quick fix
London, UK (SPX) Feb 18, 2014
Software that can fix 90 percent of broken links in the web of data, assuming the resources are still on the site's server, has been developed by researchers in Iran. The details are reported this month in the International Journal Web Engineering and Technology. Everyone knows the frustration of following a link to an interesting web site only to discover the target page is no longer ther ... read more


TECH SPACE
Corpses still being found in Philippine typhoon zone

UN report sees $1.45 tn global warming cost: media

Tunisian navy 'rescues 98 sub-Saharan migrants'

Nepal government to set up contact office at Mt. Qomolangma base camp

TECH SPACE
Fifth Boeing GPS IIF Spacecraft Sends Initial Signals from Space

Russia to deploy up to 7 Glonass ground stations outside of national territory in 2014

Northrop Grumman Awarded U.S. Military Contract for Navigation Systems

Galileo works, and works well

TECH SPACE
Baylor Sheds New Light on the Habitat of Early Apes

Oldest fortified settlement in North America discovered in Georgia

What makes memories last?

Thinking it through: Scientists seek to unlock mysteries of the brain

TECH SPACE
Scientists unlock a 'microbial Pompeii'

Kenya rhino-poaching doubled last year

Virginia Tech scientist proposes revolutionary naming system for all life on Earth

Peru's Manu National Park sets new biodiversity record

TECH SPACE
Early warning system for epidemics

The parasite that escaped out of Africa

Study on flu evolution may change textbooks, history books

Flu hits young, middle aged people hard this year

TECH SPACE
Xinjiang separatists kill 29 in China rail attack: Xinhua

China arrests more than 1000 baby trafficking suspects

Hong Kong editor in press freedom row hacked with cleaver

Wife of jailed Chinese Nobel winner in hospital

TECH SPACE
French navy arrests pirates suspected of oil tanker attack

Mexican vigilantes accuse army of killing four

Gunmen kill two soldiers in troubled Mexican state

China smugglers dig tunnel into Hong Kong: media

TECH SPACE
Outside View: Tax reform: Eliminate the income tax and IRS

New Italian PM Renzi: EU 'is not our enemy'

China home price rises slow in February: survey

Bitcoin rebounds despite probes, calls for regulation




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.