2,993 resources related to Reconnaissance
- Topics related to Reconnaissance
- IEEE Organizations related to Reconnaissance
- Conferences related to Reconnaissance
- Periodicals related to Reconnaissance
- Most published Xplore authors for Reconnaissance
The International Conference on Robotics and Automation (ICRA) is the IEEE Robotics and Automation Society’s biggest conference and one of the leading international forums for robotics researchers to present their work.
Technical presentations will range from the fundamental physics of electron emission and modulated electron beams to the design and operation of devices at UHF to THz frequencies, theory and computational tool development, active and passive components, systems, and supporting technologies.System developers will find that IVEC provides a unique snapshot of the current state-of-the-art in vacuum electron devices. These devices continue to provide unmatched power and performance for advanced electromagnetic systems, particularly in the challenging frequency regimes of millimeter-wave and THz electronics.Plenary talks will provide insights into the history, the broad spectrum of fundamental physics, the scientific issues, and the technological applications driving the current directions in vacuum electronics research.
2020 IEEE International Symposium on Antennas and Propagation and North American Radio Science Meeting
The joint meeting is intended to provide an international forum for the exchange of information on state of the art research in the area of antennas and propagation, electromagnetic engineering and radio science
Everything to do with radar hardware, techniques, processing and systems.
OCEANS 2020 - SINGAPORE
An OCEANS conference is a major forum for scientists, engineers, and end-users throughout the world to present and discuss the latest research results, ideas, developments, and applications in all areas of oceanic science and engineering. Each conference has a specific theme chosen by the conference technical program committee. All papers presented at the conference are subsequently archived in the IEEE Xplore online database. The OCEANS conference comprises a scientific program with oral and poster presentations, and a state of the art exhibition in the field of ocean engineering and marine technology. In addition, each conference can have tutorials, workshops, panel discussions, technical tours, awards ceremonies, receptions, and other professional and social activities.
IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.
Contains articles on the applications and other relevant technology. Electronic applications include analog and digital circuits employing thin films and active devices such as Josephson junctions. Power applications include magnet design as well asmotors, generators, and power transmission
The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
2010 International Conference On Computer Design and Applications, 2010
Aiming at improving the position selection limitation of artillery reconnaissance radar by map work and field reconnaissance, Multigen Creator and Vega were adopted as the development platform of visual simulation software, the position selection simulation evaluation system of artillery reconnaissance radar was realized. The structure and function of system, three dimension scene modeling and terrain selection evaluation were discussed. Several ...
Proceedings of the IEEE, 2012
In this paper, research into several aspects of robot-enabled reconnaissance of random fields is reported. The work has two major components: the underlying theory of information acquisition in the exploration of unknown fields and the results of experiments on how humans use sensor-equipped robots to perform a simulated reconnaissance exercise. The theoretical framework reported herein extends work on robotic exploration ...
Journal of Systems Engineering and Electronics, 2018
In the design problem of low earth orbit (LEO) reconnaissance satellite constellation, optimization of coverage performance is the design goal in most current methods. However, in the using process, the user only concerns with the detection capabilities rather than coverage performance. To establish the relationship between these two aspects, the reconnaissance processes of normal stochastic targets are considered and the ...
2010 5th International Conference on Computer Science & Education, 2010
In order to support the advanced concept technology demonstration of intelligence reconnaissance activities, multi-agent-based battlefield reconnaissance simulation is studied to provide enough detail to examine dynamic tactical process by a novel method of task decomposition and allocation. Our work includes four parts: (1) describing task by means of Behavior Definition Frame; (2) analyzing task by presenting a role-agent mapping mechanism, ...
2017 2nd Asia-Pacific Conference on Intelligent Robot Systems (ACIRS), 2017
In this paper, the decision-making problem of multi-UAVs cooperative reconnaissance under uncertainty environment is considered. Since multi-UAV cooperative reconnaissance task decision making problem is not only a complicated multi-objective optimization and decision problem with multi- constraint, but also a large-scale coordination control problem. We construct the mathematical model according to the maximization of reconnaissance gains of all task areas for ...
Aiming at improving the position selection limitation of artillery reconnaissance radar by map work and field reconnaissance, Multigen Creator and Vega were adopted as the development platform of visual simulation software, the position selection simulation evaluation system of artillery reconnaissance radar was realized. The structure and function of system, three dimension scene modeling and terrain selection evaluation were discussed. Several key techniques such as improved terrain building algorithm, position evaluation algorithm were given in detail. The results show that the simulation system simulates the position selection operation process of artillery reconnaissance radar livingly and can meet the requirement of real time simulation.
In this paper, research into several aspects of robot-enabled reconnaissance of random fields is reported. The work has two major components: the underlying theory of information acquisition in the exploration of unknown fields and the results of experiments on how humans use sensor-equipped robots to perform a simulated reconnaissance exercise. The theoretical framework reported herein extends work on robotic exploration that has been reported by ourselves and others. Several new figures of merit for evaluating exploration strategies are proposed and compared. Using concepts from differential topology and information theory, we develop the theoretical foundation of search strategies aimed at rapid discovery of topological features (locations of critical points and critical level sets) of a priori unknown differentiable fields. The theory enables study of efficient reconnaissance strategies in which the tradeoff between speed and accuracy can be understood. The proposed approach to rapid discovery of topological features has led in a natural way to the creation of parsimonious reconnaissance routines that do not rely on any prior knowledge of the environment. The design of topology-guided search protocols uses a mathematical framework that quantifies the relationship between what is discovered and what remains to be discovered. The quantification rests on an information theory inspired model whose properties allow us to treat search as a problem in optimal information acquisition. A central theme in this approach is that “conservative” and “aggressive” search strategies can be precisely defined, and search decisions regarding “exploration” versus “exploitation” choices are informed by the rate at which the information metric is changing. The paper goes on to describe a computer game that has been designed to simulate reconnaissance of unknown fields. Players carry out reconnaissance missions by choosing sequences of motion primitives from two families of control laws that enable mobile robots to either ascend/descend in gradient directions of the field or to map contours of constant field value. The strategies that emerge from the choices of motion sequences are classified in terms of the speed with which information is acquired, the fidelity with which the acquired information represents the entire field, and the extent to which all critical level sets have been approximated. The game thus records each player's performance in acquiring information about both the topology and geometry of the unknown fields that have been randomly generated.
In the design problem of low earth orbit (LEO) reconnaissance satellite constellation, optimization of coverage performance is the design goal in most current methods. However, in the using process, the user only concerns with the detection capabilities rather than coverage performance. To establish the relationship between these two aspects, the reconnaissance processes of normal stochastic targets are considered and the mathematic models of detection processes are built. The indicators of coverage performance are used to evaluate the detection probability and expectation of detection time delay, which are important factors in reconnaissance constellation estimation viewed from military intelligence discipline. The conclusions confirmed by the final simulation will be useful in LEO reconnaissance constellation design, optimization and evaluation.
In order to support the advanced concept technology demonstration of intelligence reconnaissance activities, multi-agent-based battlefield reconnaissance simulation is studied to provide enough detail to examine dynamic tactical process by a novel method of task decomposition and allocation. Our work includes four parts: (1) describing task by means of Behavior Definition Frame; (2) analyzing task by presenting a role-agent mapping mechanism, and thus setting up a mapping from a role to an agent, i.e., from battlefield reconnaissance system's real components, to entity agents; (3) decomposing task based on logistic relationships between real components in battlefield reconnaissance system organization, by using a Task Tree decomposition approach, and allocating task by using task allocation processing module; (4) proposing case study and implementing simulation. The result demonstrated in the case study proves the feasibility and efficiency of our method and model.
In this paper, the decision-making problem of multi-UAVs cooperative reconnaissance under uncertainty environment is considered. Since multi-UAV cooperative reconnaissance task decision making problem is not only a complicated multi-objective optimization and decision problem with multi- constraint, but also a large-scale coordination control problem. We construct the mathematical model according to the maximization of reconnaissance gains of all task areas for multi-UAVs. By balancing the reconnaissance gains among the multi-task areas in order to generate a plan that is efficient for the reconnaissance mission, the Lingo software is adopted to settle this scheduling problem. The numerical result shows that we can obtain the optimal solution for the multi-UAV cooperative reconnaissance decision-making problem by Lingo software efficiently.
Air-to-ground cooperative reconnaissance with UAVs is the main application aspect in UAV's operation research. This paper addresses the problem of UAV formation cooperative reconnaissance, and the models associated with it are built which contain targets search for, identification and reconnaissance time aspects; then the factors influencing formation's cooperative reconnaissance capability are discussed with an simple but illuminating instantiation according to information share mechanism and formation constitution. Investigating the models of the problem is the basic of optimizing the constitution and share mechanism.
This paper examines techniques for a large network infrastructure reconnaissance and dives into a real-world case study of a nation-wide passive network vulnerability assessment. The main goal of this study is to understand methods of a large network risk evaluation and conduct practical experiments using a national network. The main contribution of this paper is a non- intrusive method of a large network infrastructure reconnaissance and an application of acquired data to measure network vulnerability exposures within the analysed network. In this study our assumption is based on an estimation that actual threats come from the actively exploited vulnerabilities. Information on exploit-targeted platforms and vulnerabilities could be easily collected from a large set of malicious websites and automatically turned into signatures. We propose an automated method of building such signatures and use those to analyse the reconnaissance data set to identify ranges of vulnerable systems.
Different from the conventional phased-array, frequency diverse array (FDA) introduces a small frequency increment across the array element, thus yielding a range-and-time-dependent beampattern. This property motivates the application of FDA in radio frequency (RF) localization deception. In this paper, the sum and difference beams algorithm is used to test the effectiveness of the proposed method in FDA reconnaissance. Both theoretical analysis and simulation results show that the sum and difference algorithm cannot achieve FDA radar reconnaissance effectively and accurately. Therefore, compared to phased-array, FDA has a better RF localization deception performance.
Summary form only given. In this paper, a novel robot system for a jellyfish reconnaissance and removal using unmanned aerial vehicle (UAV) and unmanned surface vehicle (USV) is introduced. In recent years, overpopulated jellyfish are threatening ocean ecosystem as well as damaging to ocean-related industries such as fishery, seaside power plants, and casualties. The damage is estimated about 300M USD per year in South Korea. To resolve this problem, a jellyfish removal net towed by trawl boats and a few of devices to prevent the influx of jellyfish have been developed. However, most of these devices have the limited usage due to environmental constraints. To solve this problem using a robotic system, the jellyfish removal robot system, named JEROS (Jellyfish Elimination RObotic Swarm), has been proposed . The JEROS consists of a USV and a jellyfish remover device. The USV can perform a jellyfish removal task using an autonomous navigation system. The jellyfish remover device is originally designed to shred jellyfish. It is additionally designed using a conveyor device to remove venomous jellyfish without shredding. JEROS is extended to a swarm robot system to enhance the performance of jellyfish removal . The swarm robot system performs the jellyfish removal task while maintaining a formation. The UAV-type jellyfish reconnaissance system is proposed. The UAV flies over the sea along a coverage path to search a swarm of jellyfish. A camera mounted on the UAV takes images of the sea surface and a jellyfish recognition algorithm based on a deep learning finds distribution of jellyfish using the taken images. The jellyfish removal task is performed by JEROS in combination with the reconnaissance system. The reconnaissance system recognizes the distribution of jellyfish and transmits the position of the distribution to the JEROS system. The JEROS system generates a path from a starting position to the received region and follows the path. On arriving, the JEROS system remove jellyfish using the jellyfish remover device while following a coverage path.
Network reconnaissance of addresses and ports is prerequisite to a vast majority of cyber attacks. Meanwhile, the static address configuration of networks and hosts simplifies adversarial reconnaissance for target discovery. Although the randomization of host addresses has been suggested as a proactive disruption mechanism against such reconnaissance, the proposed approaches do not exploit the full potentials of address randomization in provision of unpredictability and attack adaptability. Moreover, these approaches do not provide thorough analysis on effectiveness and limitations of address randomization against relevant threat models, including stealthy scanning and worms. In this paper, we present an effective address randomization technique, called random host address mutation (RHM), that turns end-hosts into untraceable moving targets. This technique achieves maximum efficacy by allowing address randomization to be highly unpredictable and fast, and adaptive to adversarial behavior, while incurring low operational and reconfiguration overhead. Our approach achieves the following objectives: (1) it achieves high uncertainty in adversary scanning by modeling address mutation randomization as a multi-level satisfiability problem; (2) it adapts the mutation scheme by fast characterization of adversarial reconnaissance patterns; (3) it achieves high mutation rate by separating mutation from end- hosts and managing it via network appliances; and (4) it preserves network integrity, manageability and performance by bounding the size of routing tables, preserving end-to-end reachability, and efficient handling of reconfiguration updates. Our extensive analyses and simulation show that the RHM distorts adversarial reconnaissance, slows down (deters) the attack, and increases its detectability. Consequently, the RHM is effective in countering a significant number of sophisticated threat models, including reconnaissance, stealthy/evasive scanning methods, and targeted attacks. We also address limitations of our approach in terms of effectiveness and applicability.
No standards are currently tagged "Reconnaissance"