Reconnaissance

View this topic in
Reconnaissance, also known as scouting, is the military term for exploring beyond the area occupied by friendly forces to gain information about enemy forces or features of the environment. (Wikipedia.org)






Conferences related to Reconnaissance

Back to Top

2014 International Radar Conference (Radar)

Radar 2014 cover all aspects of radar systems for civil, security and defence application. Waveform design, beamforming, signal processing, Emerging applications and technologies, sub-systems technologies, Radar environment.

  • 2012 International Radar Conference (Radar)

    Radar Environment/Phenomenology, Radar Systems, Remote Sensing from Airborne/Spaceborne Systems, Waveform Design, Beamforming/Signal Processing, Emerging Applications, Advanced Sub-Systems, Computer Modelling, Simulation/Validation.

  • 2011 IEEE CIE International Conference on Radar (Radar)

    This series of successfully organized international conference on radar shows the very fruitful cooperation between IEEE AESS, IET/UK, SEE/France, EA/Australia CIE/China, and the academy societies of other countries , such as Germany, Russia, Japan, Korea and Poland. Radar 2011 is a forum of radar engineers and scientists from all over the world. The conference topics of Radar 2011 will cover all aspects of radar system for civil and defense applications.

  • 2009 International Radar Conference Radar "Surveillance for a Safer World" (RADAR 2009)

    The conference will focus on new research and developments in the field of radar techniques for both military and civil applications. Topics to be covered at Radar 2009 include: Radar Environment and Phenomenology Radar Systems Remote Sensing from Airborne or Spaceborne Systems Waveform Design, Beamforming and Signal Processing Emerging Radar Applications Emerging Technologies Advanced Sub-Systems Technologies Computer Modeling, Simulation and V


2013 IEEE Aerospace Conference

The international IEEE Aerospace Conference is organized to promote interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors. The annual, weeklong conference, set in a stimulating and thought -provoking environment, is designed for aerospace experts, academics, military personnel, and industry leaders.

  • 2012 IEEE Aerospace Conference

    The international IEEE Aerospace Conference is organized to promote interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors. The annual, weeklong conference, set in a stimulating and thought-provoking environment, is designed for aerospace experts, academics, military personnel, and industry leaders.

  • 2011 IEEE Aerospace Conference

    The international IEEE Aerospace Conference is organized to promote interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors.

  • 2010 IEEE Aerospace Conference

    The international IEEE Aerospace Conference is organized to promote interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors.

  • 2009 IEEE Aerospace Conference

    The international IEEE Aerospace Conference promotes interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors. It is an annual, week-long conference designed for aerospace experts, academics, military personnel, and industry leaders and is set in a stimulating, thought-provoking environment.

  • 2008 IEEE Aerospace Conference

    The international IEEE Aerospace Conference is organized to promote interdisciplinary understanding of aerospace systems, their underlying science and technology, and their applications to government and commercial endeavors. It is an annual, week-long conference designed for aerospace experts, academics, military personnel, and industry leaders and is set in a stimulating and thought-provoking environment.

  • 2007 IEEE Aerospace Conference


2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC)

DASC is the premier annual conference providing authors an opportunity for publication and presentation to an international audience of papers encompassing the field of avionics systems for aircraft/rotorcraft/unmanned aircraft (commercial, military, general aviation) launch vehicles, missiles, spacecraft, and space transportation systems, navigation, guidance/control of flight, computers, communications, sensors (radar, infrared, visual bands), avionics architectures and data networking, communications networks, software, crew interface, space and ground components needed for the operation of military, commercial, and business aircraft, and avionics electrical power generation and control, Student papers are entered into a judged competition.


2012 7th International Conference on Computer Science & Education (ICCSE 2012)

Annual selected topics including cloud computing, internet of things, recommendation system, green communication and web application etc. It also covers the topics of interaction between engineering education and computer science.


2012 IEEE/OES Autonomous Underwater Vehicles (AUV)

Technology and applications of autonomous marine vehicles.


More Conferences

Periodicals related to Reconnaissance

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.




Xplore Articles related to Reconnaissance

Back to Top

Identification of IT security-relevant system characteristics

A. Hunstad; J. Hallberg; A. Stjerneby IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

Information systems are continually integrated into increasingly wide-ranging distributed information systems. These systems are becoming difficult to comprehend and the design, implementation, operation, and maintenance are far from straightforward. To facilitate improved analysis and design methods for these systems, the security-level of systems need to be assessed with a greater precision than currently possible. For this purpose, a set of ...


Hardware/Software Convergence for C4ISR/EW

Paul Zablocky; Seth Spoenlein; Ben Peddicord; Yevgeny Ivanyutin; Ryan Nilsen; Paul Sass 2014 IEEE Military Communications Conference, 2014

The Army currently spends Billions procuring similarly functioning, but developmentally stove-piped Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) and Electronic Warfare (EW) systems. Most notably, the Army's communications systems are neither developed nor integrated in tandem with their EW system counterparts, even though both have many common components with similar functionality. In addition, because all of these C4ISR ...


Determining RF angle of arrival using COTS antenna arrays: A field evaluation

Hsieh-Chung Chen; Tsung-Han Lin; H. T. Kung; Chit-Kwan Lin; Youngjune Gwon MILCOM 2012 - 2012 IEEE Military Communications Conference, 2012

We are interested in estimating the angle of arrival of an RF signal by using commercial-off-the-shelf (COTS) software-defined radios (SDRs). The proposed COTS-based approach has the advantages of flexibility, low cost and ease of deployment, but-unlike traditional phased antenna arrays in which elements are already phase-aligned - we face the challenge of aligning individual SDRs during field deployment in order ...


Subsurface Hydrology at Waste Disposal Sites

R. A. Freeze IBM Journal of Research and Development, 1972

One result of the growing concern over surface-water pollution has been an increase in the popularity of ground-based waste disposal practices that save the streams but have a high potential for subsurface pollution. One of these, sanitary landfill, appears quite promising in its ability to handle large waste loads with a minimum of contamination; but two others, waste lagoons and ...


Look where i'm going and go where i'm looking: Camera-up map for unmanned aerial vehicles

R. Brian Valimont; Sheryl L. Chappell 2011 6th ACM/IEEE International Conference on Human-Robot Interaction (HRI), 2011

To optimize UAV reconnaissance operations, direction of viewing and direction of travel must be allowed to diverge. Our challenge was to design a control and display strategy to allow the operator to easily look where they're going, go where they're looking, and look and go in different directions. Two methods of control were devised to align traveling forward, viewing forward ...


More Xplore Articles

Educational Resources on Reconnaissance

Back to Top

eLearning

Identification of IT security-relevant system characteristics

A. Hunstad; J. Hallberg; A. Stjerneby IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003., 2003

Information systems are continually integrated into increasingly wide-ranging distributed information systems. These systems are becoming difficult to comprehend and the design, implementation, operation, and maintenance are far from straightforward. To facilitate improved analysis and design methods for these systems, the security-level of systems need to be assessed with a greater precision than currently possible. For this purpose, a set of ...


Hardware/Software Convergence for C4ISR/EW

Paul Zablocky; Seth Spoenlein; Ben Peddicord; Yevgeny Ivanyutin; Ryan Nilsen; Paul Sass 2014 IEEE Military Communications Conference, 2014

The Army currently spends Billions procuring similarly functioning, but developmentally stove-piped Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) and Electronic Warfare (EW) systems. Most notably, the Army's communications systems are neither developed nor integrated in tandem with their EW system counterparts, even though both have many common components with similar functionality. In addition, because all of these C4ISR ...


Determining RF angle of arrival using COTS antenna arrays: A field evaluation

Hsieh-Chung Chen; Tsung-Han Lin; H. T. Kung; Chit-Kwan Lin; Youngjune Gwon MILCOM 2012 - 2012 IEEE Military Communications Conference, 2012

We are interested in estimating the angle of arrival of an RF signal by using commercial-off-the-shelf (COTS) software-defined radios (SDRs). The proposed COTS-based approach has the advantages of flexibility, low cost and ease of deployment, but-unlike traditional phased antenna arrays in which elements are already phase-aligned - we face the challenge of aligning individual SDRs during field deployment in order ...


Subsurface Hydrology at Waste Disposal Sites

R. A. Freeze IBM Journal of Research and Development, 1972

One result of the growing concern over surface-water pollution has been an increase in the popularity of ground-based waste disposal practices that save the streams but have a high potential for subsurface pollution. One of these, sanitary landfill, appears quite promising in its ability to handle large waste loads with a minimum of contamination; but two others, waste lagoons and ...


Look where i'm going and go where i'm looking: Camera-up map for unmanned aerial vehicles

R. Brian Valimont; Sheryl L. Chappell 2011 6th ACM/IEEE International Conference on Human-Robot Interaction (HRI), 2011

To optimize UAV reconnaissance operations, direction of viewing and direction of travel must be allowed to diverge. Our challenge was to design a control and display strategy to allow the operator to easily look where they're going, go where they're looking, and look and go in different directions. Two methods of control were devised to align traveling forward, viewing forward ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Reconnaissance"

IEEE-USA E-Books

  • Lexicon

    The maps in this book are drawn with satellites, assembled with pixels radioed from outer space, and constructed from statistics; they record situations of intense conflict and express fundamental transformations in our ways of seeing and of experiencing space. These maps are built with Global Positioning Systems (GPS), remote sensing satellites, or Geographic Information Systems (GIS): digital spatial hardware and software designed for such military and governmental uses as reconnaissance, secrecy, monitoring, ballistics, the census, and national security. Rather than shying away from the politics and complexities of their intended uses, in Close Up at a Distance Laura Kurgan attempts to illuminate them. Poised at the intersection of art, architecture, activism, and geography, her analysis uncovers the implicit biases of the new views, the means of recording information they present, and the new spaces they have opened up. Her presentation of these maps reclaims, repurposes, and discovers new and even inadvertent uses for them, including documentary, memorial, preservation, interpretation, political, or simply aesthetic. GPS has been available to both civilians and the military since 1991; the World Wide Web democratized the distribution of data in 1992; Google Earth has captured global bird's-eye views since 2005. Technology has brought about a revolutionary shift in our ability to navigate, inhabit, and define the spatial realm. The traces of interactions, both physical and virtual, charted by the maps in Close Up at a Distance define this shift.

  • Projects

    The maps in this book are drawn with satellites, assembled with pixels radioed from outer space, and constructed from statistics; they record situations of intense conflict and express fundamental transformations in our ways of seeing and of experiencing space. These maps are built with Global Positioning Systems (GPS), remote sensing satellites, or Geographic Information Systems (GIS): digital spatial hardware and software designed for such military and governmental uses as reconnaissance, secrecy, monitoring, ballistics, the census, and national security. Rather than shying away from the politics and complexities of their intended uses, in Close Up at a Distance Laura Kurgan attempts to illuminate them. Poised at the intersection of art, architecture, activism, and geography, her analysis uncovers the implicit biases of the new views, the means of recording information they present, and the new spaces they have opened up. Her presentation of these maps reclaims, repurposes, and discovers new and even inadvertent uses for them, including documentary, memorial, preservation, interpretation, political, or simply aesthetic. GPS has been available to both civilians and the military since 1991; the World Wide Web democratized the distribution of data in 1992; Google Earth has captured global bird's-eye views since 2005. Technology has brought about a revolutionary shift in our ability to navigate, inhabit, and define the spatial realm. The traces of interactions, both physical and virtual, charted by the maps in Close Up at a Distance define this shift.

  • Introduction

    The maps in this book are drawn with satellites, assembled with pixels radioed from outer space, and constructed from statistics; they record situations of intense conflict and express fundamental transformations in our ways of seeing and of experiencing space. These maps are built with Global Positioning Systems (GPS), remote sensing satellites, or Geographic Information Systems (GIS): digital spatial hardware and software designed for such military and governmental uses as reconnaissance, secrecy, monitoring, ballistics, the census, and national security. Rather than shying away from the politics and complexities of their intended uses, in Close Up at a Distance Laura Kurgan attempts to illuminate them. Poised at the intersection of art, architecture, activism, and geography, her analysis uncovers the implicit biases of the new views, the means of recording information they present, and the new spaces they have opened up. Her presentation of these maps reclaims, repurposes, and discovers new and even inadvertent uses for them, including documentary, memorial, preservation, interpretation, political, or simply aesthetic. GPS has been available to both civilians and the military since 1991; the World Wide Web democratized the distribution of data in 1992; Google Earth has captured global bird's-eye views since 2005. Technology has brought about a revolutionary shift in our ability to navigate, inhabit, and define the spatial realm. The traces of interactions, both physical and virtual, charted by the maps in Close Up at a Distance define this shift.

  • Malware and APTs

    Major vulnerabilities exposed by the necessary free flowing of DNS traffic fall into two main categories: network reconnaissance and tunneling. An attacker may attempt to issue an ANY query to retrieve all resource records for a given domain name within the zone. Periodically review network activity logs to determine if any suspicious traffic subsequently originated from the query source's IP address. Data exfiltration may be accomplished by either using DNS as the data exfiltration transport protocol or by using DNS to locate an Internet destination to which to exfiltrate data or both. This chapter considers the former case. Methods for detection of DNS tunneling include the examination of DNS payload and of DNS transactions. These methods can also be applied to detecting queries to random domains using dynamically generated algorithms (DGAs) commonly used for malware detection evasion.

  • Index

    **A unique guide to the state of the art of tracking, classification, and sensor management** This book addresses the tremendous progress made over the last few decades in algorithm development and mathematical analysis for filtering, multi-target multi-sensor tracking, sensor management and control, and target classification. It provides for the first time an integrated treatment of these advanced topics, complete with careful mathematical formulation, clear description of the theory, and real-world applications. Written by experts in the field, _Integrated Tracking, Classification, and Sensor Management_ provides readers with easy access to key Bayesian modeling and filtering methods, multi-target tracking approaches, target classification procedures, and large scale sensor management problem-solving techniques. Features include: * An accessible coverage of random finite set based multi-target filtering algorithms such as the Probability Hypothesi Density filters and multi-Bernoulli filters with focus on problem solving * A succinct overview of the track-oriented MHT that comprehensively collates all significant developments in filtering and tracking * A state-of-the-art algorithm for hybrid Bayesian network (BN) inference that is efficient and scalable for complex classification models * New structural results in stochastic sensor scheduling and algorithms for dynamic sensor scheduling and management * Coverage of the posterior Cramer-Rao lower bound (PCRLB) for target tracking and sensor management * Insight into cutting-edge military and civilian applications, including intelligence, surveillance, and reconnaissance (ISR) With its emphasis on the latest research results, _Integrated Tracking, Classification, and Sensor Management_ is an invaluable guide for researchers and practitioners in statistical signal processing, radar systems, operations research, and control the ry.

  • Problems of Barrier and Sweep Coverage in Corridor Environments

    This chapter theoretically develops decentralized control laws for the coordination of a mobile robotic sensor network to address the barrier and sweep coverage problems in corridor environments. The barrier and sweep coverage include, but are not limited to, a military; for example, barrier coverage can be applied to mine deployment and sentry duty; whereas sweep coverage can be used in multi-sensor minesweeping, reconnaissance, maintenance inspection, and ship hull cleaning. The proposed control algorithms are applicable to real-time coverage operations. The control algorithms are illustrated by numerical simulations. Even though the theoretical results on the developed control algorithms are proved for straight corridors, computer simulations demonstrate that the algorithms are effective in curved corridors as well.

  • Radar Principles

    Advances in radar system hardware and software have enabled radar systems to detect, differentiate, classify, image, and track the range, altitude, direction, or velocity of multiple moving or fixed targets simultaneously. A radar system has a receiver intended to detect the reflected electromagnetic waves, indicating an object with a different dielectric constant in the propagation direction. Doppler radar is typically used to detect moving targets, and estimate their velocity. Security systems motion detectors and door openers are common uses of Doppler radar???based motion detectors. There are two basic radar configurations based on the spatial relationship between the transmitting and receiving antennas: monostatic and bistatic. The major areas of radar application are briefly described, including military defense and weapons systems, remote monitoring of the Earth's surface, the ocean, and other planets, reconnaissance imaging, ground???penetrating radar for archeological expeditions, weather surveillance, air traffic control, and others.

  • Categorizing Life and Death: The Denial of Civilians in U.S. Robot Wars

    This chapter contains sections titled: Bug Splat, Computers and Remote- Controlled Wars, Categorizing Civilians, Counting Victims--From Drone Attacks in Pakistan, Capabilities of Reconnaissance: On Differentiating Combatants and Civilians, "To Classify Is Human": On Moral Choices, Notes, References

  • Attacker Exploitation of DNS

    Major vulnerabilities exposed by the necessary free flowing of DNS traffic fall into two main categories: network reconnaissance and tunneling. An attacker may attempt to issue an ANY query to retrieve all resource records for a given domain name within the zone. Periodically review network activity logs to determine if any suspicious traffic subsequently originated from the query source's IP address. Data exfiltration may be accomplished by either using DNS as the data exfiltration transport protocol or by using DNS to locate an Internet destination to which to exfiltrate data or both. This chapter considers the former case. Methods for detection of DNS tunneling include the examination of DNS payload and of DNS transactions. These methods can also be applied to detecting queries to random domains using dynamically generated algorithms (DGAs) commonly used for malware detection evasion.

  • Acknowledgments

    The maps in this book are drawn with satellites, assembled with pixels radioed from outer space, and constructed from statistics; they record situations of intense conflict and express fundamental transformations in our ways of seeing and of experiencing space. These maps are built with Global Positioning Systems (GPS), remote sensing satellites, or Geographic Information Systems (GIS): digital spatial hardware and software designed for such military and governmental uses as reconnaissance, secrecy, monitoring, ballistics, the census, and national security. Rather than shying away from the politics and complexities of their intended uses, in Close Up at a Distance Laura Kurgan attempts to illuminate them. Poised at the intersection of art, architecture, activism, and geography, her analysis uncovers the implicit biases of the new views, the means of recording information they present, and the new spaces they have opened up. Her presentation of these maps reclaims, repurposes, and discovers new and even inadvertent uses for them, including documentary, memorial, preservation, interpretation, political, or simply aesthetic. GPS has been available to both civilians and the military since 1991; the World Wide Web democratized the distribution of data in 1992; Google Earth has captured global bird's-eye views since 2005. Technology has brought about a revolutionary shift in our ability to navigate, inhabit, and define the spatial realm. The traces of interactions, both physical and virtual, charted by the maps in Close Up at a Distance define this shift.



Standards related to Reconnaissance

Back to Top

No standards are currently tagged "Reconnaissance"


Jobs related to Reconnaissance

Back to Top