US Military need to know more and sooner (situational awareness) to allow rapid, decisive action on the emerging multi- domain battlefield with multi-faceted internet of battlefield things, big data, AI, and tactical cloud. Now, and even more so in the future, the battlespace is characterized by highly distributed processing, heterogeneous and mobile assets with limited battery life, communications- dominated but restricted network capacity, and operating with time-critical needs in a rapidly changing hostile environment. Distributed and low power edge processing is one of the essential technologies for maintaining overmatch in various emerging operational and contested environments for various technical groups across DoD COI communities including C4I, microelectronics, cyber, autonomy, human systems, Electronic warfare, and Weapon systems.
Number innovations in computing hardware, algorithms, software, networking and complex Military applications at the edge are helping DoD to take advantage of this new paradigm of computing at the edge. This talk will discuss recent advances in trusted computing at the edge for Military applications.
Information technology has transformed our world as an innovation enabler in our daily lives on how we interact with the world and people around us. One of the key driver for this innovation is the exponential growth of computational capability – over the last seventy years starting from ENIAC and then followed with Moore’s law exponent growth. Along with exponential growth of computer hardware, algorithms and methods have also progressed to solve complex science and technology applications that can take advantage of evolving generation of computer hardware. One can easily argue that mathematical algorithms from interdisciplinary sciences played significant role as key enablers for information sciences and information technology revolution. In this talk, we will review key mathematical algorithmic research that played key role over the last 70 years in our evolving computing hardware era - ENIAC, digital computing, vector computing, massively parallel computing, cloud computing, multi-core computing, and mobile computing. Next, we will discuss algorithmic research challenges for future computing hardware that is envisioned to be heterogeneous or hybrid computing consisting of vector computing processors, multi-core computing processors, neuromorphic computing processors, mobile tactical cloudlets, and quantum computing processors with software based intelligent networking as backbone.
There is a push in the Army to develop lighter vehicles that can get to remote parts of the world quickly. This objective force is not some new vehicle, but a whole new way of fighting wars. The Future Combat System (FCS), as it is called, has an extremely aggressive timeline and must rely on modeling and simulation to aid in defining the goals, optimizing the design and materials, and testing the performance of the various FCS systems concepts. While virtual prototyping for vehicles (both military and commercial) has been around as a concept for well over a decade and its use is promoted heavily in tours and in boardrooms, the actual application of virtual protoyping is often limited and when successful has been confined to specific physical engineering areas such as weight, space, stress, mobility, and ergonomics. If FCS is to succeed in its acquisition schedule, virtual prototyping will have to be relied on heavily and its application expanded. Signature management is an example of an area that would benefit greatly from virtual prototyping tools. However, there are several obstacles to achieving this goal. To rigorously analyze a vehicle's IR and visual signatures extensively in several different environments over different weather and seasonal conditions could result millions of potentially unique signatures to evaluate. In addition, there is no real agreement on what evaluate means or even what value is used to represent signature; Delta T( degree(s)C), Probability of Detection? What the user really wants to know is: how do I make my system survivable? This paper attempts to describe and then bound the problem and describe how the Army is attempting to deal with some of these issues in a holistic manner using SMART (Simulation and Modeling for Acquisition, Requirements, and Training) principles.
Conference Committee Involvement (14)
Geospatial Informatics XV
13 April 2025 | Orlando, Florida, United States
Geospatial Informatics XIV
25 April 2024 | National Harbor, Maryland, United States
Disruptive Technologies in Information Sciences VIII
22 April 2024 | National Harbor, Maryland, United States
Geospatial Informatics XIII
4 May 2023 | Orlando, Florida, United States
Disruptive Technologies in Information Sciences VII
1 May 2023 | Orlando, Florida, United States
Geospatial Informatics XII
6 April 2022 | Orlando, Florida, United States
Disruptive Technologies in Information Sciences VI
4 April 2022 | Orlando, Florida, United States
Geospatial Informatics XI
12 April 2021 | Online Only, Florida, United States
Disruptive Technologies in Information Sciences V
12 April 2021 | Online Only, Florida, United States
Geospatial Informatics X
27 April 2020 | Online Only, California, United States
Disruptive Technologies in Information Sciences IV
27 April 2020 | Online Only, California, United States
Geospatial Informatics IX
15 April 2019 | Baltimore, MD, United States
Disruptive Technologies in Information Sciences III
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.