Abstract

An Unmanned Aerial Vehicle (UAV) flies overhead with multiple sensors collecting as many as 100 frames per second of high definition images to be processed. Much of that data has to be processed onboard as that amount of data, collectively from a swarm of drones, cannot be transmitted for ground based processing. The drone detects, after much processing, several threats. The drone identifies the type of each threat and its geo-location and then performs a smart push to a threat data base that is being monitored by Command and Control. Deciding to prosecute the threat by using smart pull, commanders inventory appropriate Coalition assets: a Joint Strike Fighter (JSF) is airborne in the theater; a Future Combat System (FCS) tank is within range on the ground, as well as a US Army platoon. A Polish infantry brigade is also in the vicinity and could be attacked by the threat. These assets are formed into a threat based, multi-national, multi-level task force. Each asset belongs to a different security domain, but they must share data to complete the mission. But, there are many different levels and types of data. There also are multiple policies regulating data release to the participants. The JSF is authorized to receive Top Secret sensor data directly from the UAV but the Army platoon is not. Yet, the JSF and the Polish Brigade must coordinate operations with the FCS tank.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.