scholarly journals Adaptable Underwater Networks: The Relation between Autonomy and Communications

2020 ◽  
Vol 12 (20) ◽  
pp. 3290
Author(s):  
Alexander Hamilton ◽  
Sam Holdcroft ◽  
Davide Fenucci ◽  
Paul Mitchell ◽  
Nils Morozs ◽  
...  

This paper discusses requirements for autonomy and communications in maritime environments through two use cases which are sourced from military scenarios: Mine Counter Measures (MCM) and Anti-Submarine Warfare (ASW). To address these requirements, this work proposes a service-oriented architecture that breaks the typical boundaries between the autonomy and the communications stacks. An initial version of the architecture has been implemented and its deployment during a field trial done in January 2019 is reported. The paper discusses the achieved results in terms of system flexibility and ability to address the MCM and ASW requirements.

Author(s):  
Carlos Salgado ◽  
Ricardo J. Machado ◽  
Rita S. P. Maciel

The transformation of requirements specification into an architectural design has been a crucial endeavor for the information systems analysis and design community, with ever-new challenges to tackle. Despite the wide and diverse existing proposals, the lack of a common structure and use of different strategies makes it close to impossible to analyze or compare these approaches. Therefore, the use of model-based methods benefits from a detailed specification in order to support their analysis and evolution, also in comparison to other approaches. Following work on the derivation of a logical architecture from business-process use-cases requirements in a service-oriented approach, the authors propose a detailed specification, within a SPEM approach, of a transformation method, which they further analyze and refurbish in order to meet current and future challenges.


2016 ◽  
Vol 1 (1) ◽  
Author(s):  
Muhammad Aamir Nadeem

Cloud Computing is a recently emerged paradigm, for sure out of infancy but yet not matured, is aiming at provisioning of computing resources in most efficient and economical way. Virtualization is the key technique behind Cloud Computing. It adopts Service Oriented Architecture which enables its clients to transform their requirements problems into services thus benefited by the solution provided by the Cloud. Besides provisioning of computing and storage resources, it expanded the traditional threat environment. The vulnerabilities and threats to Cloud are the issues which if successfully overcome would make Cloud a digital fort for its users. This paper surveys the weaknesses in Cloud architecture, internet protocols, operating system and application software, and in crypto system. It also identifies the challenges related to Cloud security and counter measures to resolve those issues.


Sign in / Sign up

Export Citation Format

Share Document