SlideShare a Scribd company logo
Course Catalog

   Spring 2012
Who Should Attend an Alidade Institute Seminar?
    Alidade Institute Seminars are designed for military, civilian and defense
       industry professionals responsible for assessment and analysis of:

                        Distributed Network Operations
                        Cyber and Information Warfare
                          Complex Military Operations
                         Innovative Logistics Concepts

   Alidade Institute Seminars provide a unique combination of breakthrough
research in emerging technical disciplines and insightful application to some of
  the most vexing new defense and homeland security operational challenges.
 On-site Seminars can be presented under Non-Disclosure Agreement (NDA)
and tailored to meet the operational objectives of an organization, the technical
         skill set of a target audience or a more specific research topic.




Phone: (401) 662-9842            www.alidade.net                Fax: (401)-633-6420
Operations Research for Cyber Analysis

One of the biggest challenges facing today’s operational commanders is the
lack of tools for formally assessing Cyber Operations. Although there is a
substantial capability to analyze more traditional operations such as kinetic
combat and logistics, cyber analysis remains highly idiosyncratic and imprecise,
and Measures of Effectiveness for Cyber Operations remain elusive. As a
result, decision makers cannot plan and execute with the same confidence that
the discipline of Operations Research has brought to traditional plans and
operations.

Recent research by Alidade Incorporated, however, offers new methods for
overcoming this challenge. A full-day seminar, part of Alidade Institute’s
“Where’s the MathTM” seminar series, will present and discuss fresh approaches
for quantitatively assessing the full range of Cyber Operations.
This seminar will introduce participants to new quantitative techniques for
analyzing Cyber Operations. Topics covered will include:

     Review of the strengths and weaknesses of existing techniques
     Introduction to new mathematics to describe social, cultural, information
     and influence networks
     Application of the mathematics to cyber disciplines such as Computer
     Network Attack, Computer Network Defense, Influence Operations and
     Strategic Communications
     Procedures for developing Cyber Operations Measures of Effectiveness
     Design of Cyber Common Operational Pictures (COPs) for Operational
     Level of War decision making
     Case studies from recent real world analyses




Phone: (401) 662-9842            www.alidade.net               Fax: (401)-633-6420
Network Science 101


From Euler’s 1736 solution to the famous “Seven Bridges of Konigsberg”
problem to Information Age research into predictions of the size of the
worldwide market for internet routers, Network Science has been a valuable
tool for analyzing arrangements, flows and interactions in connected systems.
Also known formally as “Graph theory,” this subject has enjoyed a recent
renaissance, providing new insight into the structure, dynamics and evolution
of such systems as genomics, the internet, the worldwide web, scientific
collaborations, ecological food webs, open source software and patterns of
employment the motion picture actor industry. While most of this research has
focused on the many variants of distributed, networked systems in nonmilitary
contexts, a growing community of practitioners are applying new developments
in network mathematics to distributed, networked military systems.

As part of Alidade Institute’s “Where’s the MathTM” seminar series, a new, full-
day seminar presents an overarching review of recent developments in
Network Science, specifically tailored to a technical military audience.

This seminar will discuss the fundamentals of Graph Theory, beginning with
classical approaches and updating the subject with the recent developments
most relevant to military, intelligence and Homeland Defense audiences.
Specific topics covered include:

     New classes of network structures
     Statistics developed to describe the characteristics of these new classes
     Techniques for analyzing the structure, dynamics and evolution of
     complex networks
     New research into how networks compete with networks
     Case studies from recent real world analyses
     Measures of Effectiveness for networked systems




Phone: (401) 662-9842            www.alidade.net                Fax: (401)-633-6420
Operations Research for Unmanned Systems
Militaries worldwide are employing unmanned systems as part of innovative,
networked systems and concepts. The standard industry models for evaluating
how systems work, however, are more than a century old, so analysts are
struggling with such important questions as:
       What is the value of robotics in warfare?
       How should new unmanned systems be designed, built and operated?
       What new command and control arrangements are most appropriate for
       unmanned systems?
       How should legacy military systems integrate into manned-unmanned
       hybrid enterprises?
Recent research by Alidade Incorporated offers new methods for analyzing
these systems. A full-day seminar, part of Alidade Institute’s “Where’s the
Math™” seminar series, will present and discuss fresh approaches – drawn
from the fields of Complex Systems Research and Social Network Analysis –
for assessing a wide range of networks containing both humans and machines.

This seminar explains why legacy models are unsuitable for answering these
questions and describes a new set of principles for Operations Research for
unmanned military systems. The seminar will provide methods to analyze:
       The structure, dynamics and evolution of robotic systems
       Application of the concepts and mathematics to the engineering and
       acquisition of unmanned systems
       Application of the concepts and mathematics to tactics and operational
       art
       Recent operational and acquisition case studies

The seminar will review mathematical models relevant to networked
competition and provide examples from the recent studies of networked
military systems. By the end of the day, participants will:
       Understand the dynamics that create and motivate collectives
       Understand analytical tools that inform acquisition, engineering,
       operations of unmanned systems
       Achieve a greater perspective of how robotics systems perform in the
       context of both conventional and unconventional combat


Phone: (401) 662-9842           www.alidade.net              Fax: (401)-633-6420
Achieve practical insight into how to compete against unmanned
       systems



  Operations Research for Networked Military Systems

As we learn more about operations in the Information Age, every person
involved in new defense systems recognizes their program’s heavy dependences
on networked systems and concepts. Yet, the standard industry tools and
models for evaluating how systems work are, in many cases, more than a
century old. As a result, analysts find themselves struggling to answer such
fundamental questions as:

      What is the value of networking in warfare?
      How should new systems be designed, built and operated?
      What new command and control arrangements are most appropriate for
      networkedsystems?
      How should legacy military systems be integrated with new, networked
      enterprises?

Operations Research for Networked Military Systems explains why legacy
models are unsuitable for answering these questions. This full-day seminar
describes a new set of principles and methods:

     Mechanisms of advantage for distributed networked operations
     Design architects for distributed networked forces
     Important C2 patterns observed in networked military operations
     New models for search and detection
     Distribution networks for adaptive logistics

This seminar will reviews mathematical models of networked competition and
provides examples from recent studies of network-centric military systems.




Phone: (401) 662-9842           www.alidade.net               Fax: (401)-633-6420
Command and Control Network Analysis (C2NA)

The biggest changein military operations in the Information Age has been the
extraordinary advance in command and control (C2) networks. Military
operations centers are now state-of-the-art electronic nerve centers fed by an
increasing desire for more data and better collaboration. This change is
mirrored in federal/state emergency management and metropolitan first
responder command centers. It is surprising, then, that while a great deal of
effort has been expended to engineer and protect the IT elements of these
networks, far less has been put forth to understand how operators actually use
their networks. The development of new mathematics, tools and techniques is
changing this situation, however, and there is a growing community of analysts
who are mining network usage patterns to help organizations reach a deeper
understanding of how to design, build and use today’s sophisticated command
and control suites.

Alidade Incorporated is one of the very few firms with experience studying
real-world C2 Network usage patterns and analyzing what these patterns mean
for mission accomplishment, executive decision making, network defense and
system architecture. Drawing from its analysis of Joint Task Force and four-star
Command Post Exercises (CPXs), Alidade Institute’s will conduct a full-day
seminar that presents new approaches for quantitatively evaluating C2
networks.

The Command and Control Network Analysis seminar explains why legacy
Operations Research models not suitable for assessing C2systems and describes
a new set of principles for military network analysis. Topics include:

 New techniques for preparing, conducting and briefing the results of C2
 network analyses
 Recent mathematical developments that have revolutionized the analysis of
 C2 systems
 Overview of the new types of analytical packages that analyze C2 networks
 Methods for developing C2 Network Measures of Effectiveness


Phone: (401) 662-9842           www.alidade.net               Fax: (401)-633-6420
Phone: (401) 662-9842   www.alidade.net   Fax: (401)-633-6420
Fundamentals of Adaptive Logistics

Although advanced information networks and RF commodity tags promise to
provide greater in-transit visibility for military networks, experience in recent
operations shows that visibility is not enough. The extreme uncertainties found
in tactical level battlefield conditions create turbulence in delivery systems, and
quite often the speed at which information flows on the battlefield far out-
strips the ability of distribution systems to respond to new demands, revised
delivery locations or unexpected interruptions. Alidade Incorporated has been
at the forefront of research into adaptive logistics concepts, developing
innovative processes and doctrine for informed, flexible information and
delivery systems that provide more operationally useful logistics structures.

The Alidade Institute Fundamentals of Adaptive Logistics seminar provides
new theoretical and technical research that is inspiring a new breed of
sustainment capabilities. Topics covered in the seminar include:

 Review of classic operational logistics theory
 Presentation of new technical and mathematical models of logistics networks
 Development of a new theory of Demand Networks
 Discussion of when and how Demand Networks outperform Supply Chains
 Summary of the application of Demand Networks to new operational
 concepts, particularly those envisioned for unmanned, autonomous forces




Phone: (401) 662-9842             www.alidade.net                Fax: (401)-633-6420
Seminar Pricing

Alidade Institute seminars are offered to a public audience at $1200/seat
(corporate) and $1000/seat (government/academia). They are also offered on-
site and can be tailored to support the requirements of individual clients (under
NDA, if desired). On-site rates are the same as public rates, although a 50%
discount is applied to groups of 10 or more. A further discount is applied for
60-day advanced booking. ContactBetty at (401) 662-9842or
betty@alidade.netfor group and on-site rates.




Phone: (401) 662-9842            www.alidade.net               Fax: (401)-633-6420

More Related Content

What's hot

AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
IJNSA Journal
 
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
AIRCC Publishing Corporation
 
IT Architecture Automatic Verification
IT Architecture Automatic VerificationIT Architecture Automatic Verification
IT Architecture Automatic Verification
António Alegria
 
Advanced infrastructure for pan european collaborative engineering - E-colleg
Advanced infrastructure for pan european collaborative engineering - E-collegAdvanced infrastructure for pan european collaborative engineering - E-colleg
Advanced infrastructure for pan european collaborative engineering - E-colleg
Xavier Warzee
 
Big Data and Next Generation Network Challenges - Phdassistance
Big Data and Next Generation Network Challenges - PhdassistanceBig Data and Next Generation Network Challenges - Phdassistance
Big Data and Next Generation Network Challenges - Phdassistance
PhD Assistance
 
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelAssurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment Model
IJMTST Journal
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
Ganesh Awati
 
Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges ...
Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges ...Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges ...
Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges ...
AIRCC Publishing Corporation
 
A survey of models for computer networks management
A survey of models for computer networks managementA survey of models for computer networks management
A survey of models for computer networks management
IJCNCJournal
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Tripwire
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
2015 security for the internet of things a survey of
2015 security for the internet of things a survey of2015 security for the internet of things a survey of
2015 security for the internet of things a survey of
Vinod Salunkhe
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologiesIEEEBTECHMTECHPROJECTS
 

What's hot (13)

AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
 
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
PROVIDES AN APPROACH BASED ON ADAPTIVE FORWARDING AND LABEL SWITCHING TO IMPR...
 
IT Architecture Automatic Verification
IT Architecture Automatic VerificationIT Architecture Automatic Verification
IT Architecture Automatic Verification
 
Advanced infrastructure for pan european collaborative engineering - E-colleg
Advanced infrastructure for pan european collaborative engineering - E-collegAdvanced infrastructure for pan european collaborative engineering - E-colleg
Advanced infrastructure for pan european collaborative engineering - E-colleg
 
Big Data and Next Generation Network Challenges - Phdassistance
Big Data and Next Generation Network Challenges - PhdassistanceBig Data and Next Generation Network Challenges - Phdassistance
Big Data and Next Generation Network Challenges - Phdassistance
 
Assurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment ModelAssurance of Security and Privacy Requirements for Cloud Deployment Model
Assurance of Security and Privacy Requirements for Cloud Deployment Model
 
15CS81 Module1 IoT
15CS81 Module1 IoT15CS81 Module1 IoT
15CS81 Module1 IoT
 
Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges ...
Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges ...Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges ...
Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges ...
 
A survey of models for computer networks management
A survey of models for computer networks managementA survey of models for computer networks management
A survey of models for computer networks management
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
2015 security for the internet of things a survey of
2015 security for the internet of things a survey of2015 security for the internet of things a survey of
2015 security for the internet of things a survey of
 
2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies2013 2014 ieee java projects richbraintechnologies
2013 2014 ieee java projects richbraintechnologies
 

Viewers also liked

A survey of low power wallace and dadda multipliers using different logic ful...
A survey of low power wallace and dadda multipliers using different logic ful...A survey of low power wallace and dadda multipliers using different logic ful...
A survey of low power wallace and dadda multipliers using different logic ful...
eSAT Journals
 
iBIM value to Data Center from design to operate
iBIM  value to Data Center from  design to operateiBIM  value to Data Center from  design to operate
iBIM value to Data Center from design to operate
Stephen Au
 
Wallace tree multiplier.pptx1
Wallace tree multiplier.pptx1Wallace tree multiplier.pptx1
Wallace tree multiplier.pptx1
vamshi krishna
 
Wallace tree multiplier
Wallace tree multiplierWallace tree multiplier
Wallace tree multiplierSudhir Kumar
 
Deep Learning - A Literature survey
Deep Learning - A Literature surveyDeep Learning - A Literature survey
Deep Learning - A Literature survey
Akshay Hegde
 
The Multipliers Seminar
The Multipliers SeminarThe Multipliers Seminar
The Multipliers Seminar
Greg McKeown
 

Viewers also liked (6)

A survey of low power wallace and dadda multipliers using different logic ful...
A survey of low power wallace and dadda multipliers using different logic ful...A survey of low power wallace and dadda multipliers using different logic ful...
A survey of low power wallace and dadda multipliers using different logic ful...
 
iBIM value to Data Center from design to operate
iBIM  value to Data Center from  design to operateiBIM  value to Data Center from  design to operate
iBIM value to Data Center from design to operate
 
Wallace tree multiplier.pptx1
Wallace tree multiplier.pptx1Wallace tree multiplier.pptx1
Wallace tree multiplier.pptx1
 
Wallace tree multiplier
Wallace tree multiplierWallace tree multiplier
Wallace tree multiplier
 
Deep Learning - A Literature survey
Deep Learning - A Literature surveyDeep Learning - A Literature survey
Deep Learning - A Literature survey
 
The Multipliers Seminar
The Multipliers SeminarThe Multipliers Seminar
The Multipliers Seminar
 

Similar to Spring 2012 Seminar Catalogue

dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152Lenore Mullin
 
Application Of VLSI In Artificial Intelligence
Application Of VLSI In Artificial IntelligenceApplication Of VLSI In Artificial Intelligence
Application Of VLSI In Artificial Intelligence
Dereck Downing
 
Application of VLSI In Artificial Intelligence
Application of VLSI In Artificial IntelligenceApplication of VLSI In Artificial Intelligence
Application of VLSI In Artificial Intelligence
IOSR Journals
 
Cloud-based control systems: a systematic literature review
Cloud-based control systems: a systematic literature reviewCloud-based control systems: a systematic literature review
Cloud-based control systems: a systematic literature review
International Journal of Reconfigurable and Embedded Systems
 
Cps sec sg sg2017 conf_iran
Cps sec sg  sg2017 conf_iranCps sec sg  sg2017 conf_iran
Cps sec sg sg2017 conf_iran
Ahmadreza Ghaznavi
 
Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Petar Radanliev
 
Next Generation Standards - A Science-Based Discipline of Information Managem...
Next Generation Standards - A Science-Based Discipline of Information Managem...Next Generation Standards - A Science-Based Discipline of Information Managem...
Next Generation Standards - A Science-Based Discipline of Information Managem...
Steve Ray
 
First Year Report, PhD presentation
First Year Report, PhD presentationFirst Year Report, PhD presentation
First Year Report, PhD presentation
Bang Xiang Yong
 
Cyber Physical Systems – Collaborating Systems of Systems
Cyber Physical Systems – Collaborating Systems of SystemsCyber Physical Systems – Collaborating Systems of Systems
Cyber Physical Systems – Collaborating Systems of Systems
Joachim Schlosser
 
A Review of Neural Networks Architectures, Designs, and Applications
A Review of Neural Networks Architectures, Designs, and ApplicationsA Review of Neural Networks Architectures, Designs, and Applications
A Review of Neural Networks Architectures, Designs, and Applications
IRJET Journal
 
Data dynamics in IoT Era
Data dynamics in IoT EraData dynamics in IoT Era
Data dynamics in IoT Era
Paddy Ramanathan
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
Dr Dev Kambhampati
 
Internet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkInternet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a framework
Rezgar Mohammad
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
Vanya Vladeva
 
IEEE ACADEMIC PROJECTS
IEEE ACADEMIC PROJECTSIEEE ACADEMIC PROJECTS
IEEE ACADEMIC PROJECTS
syslogtechnology
 
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...
srinivasanece7
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
guesta67d4a
 
Semantic Web for Advanced Engineering
Semantic Web for Advanced EngineeringSemantic Web for Advanced Engineering
Semantic Web for Advanced Engineering
Marta Sabou
 

Similar to Spring 2012 Seminar Catalogue (20)

dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152dagrep_v006_i004_p057_s16152
dagrep_v006_i004_p057_s16152
 
Application Of VLSI In Artificial Intelligence
Application Of VLSI In Artificial IntelligenceApplication Of VLSI In Artificial Intelligence
Application Of VLSI In Artificial Intelligence
 
Application of VLSI In Artificial Intelligence
Application of VLSI In Artificial IntelligenceApplication of VLSI In Artificial Intelligence
Application of VLSI In Artificial Intelligence
 
Cloud-based control systems: a systematic literature review
Cloud-based control systems: a systematic literature reviewCloud-based control systems: a systematic literature review
Cloud-based control systems: a systematic literature review
 
Cps sec sg sg2017 conf_iran
Cps sec sg  sg2017 conf_iranCps sec sg  sg2017 conf_iran
Cps sec sg sg2017 conf_iran
 
Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...
 
Next Generation Standards - A Science-Based Discipline of Information Managem...
Next Generation Standards - A Science-Based Discipline of Information Managem...Next Generation Standards - A Science-Based Discipline of Information Managem...
Next Generation Standards - A Science-Based Discipline of Information Managem...
 
First Year Report, PhD presentation
First Year Report, PhD presentationFirst Year Report, PhD presentation
First Year Report, PhD presentation
 
Cyber Physical Systems – Collaborating Systems of Systems
Cyber Physical Systems – Collaborating Systems of SystemsCyber Physical Systems – Collaborating Systems of Systems
Cyber Physical Systems – Collaborating Systems of Systems
 
40 41
40 4140 41
40 41
 
A Review of Neural Networks Architectures, Designs, and Applications
A Review of Neural Networks Architectures, Designs, and ApplicationsA Review of Neural Networks Architectures, Designs, and Applications
A Review of Neural Networks Architectures, Designs, and Applications
 
Data dynamics in IoT Era
Data dynamics in IoT EraData dynamics in IoT Era
Data dynamics in IoT Era
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
 
Internet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkInternet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a framework
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
IEEE ACADEMIC PROJECTS
IEEE ACADEMIC PROJECTSIEEE ACADEMIC PROJECTS
IEEE ACADEMIC PROJECTS
 
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 
Semantic Web for Advanced Engineering
Semantic Web for Advanced EngineeringSemantic Web for Advanced Engineering
Semantic Web for Advanced Engineering
 

Spring 2012 Seminar Catalogue

  • 1. Course Catalog Spring 2012
  • 2. Who Should Attend an Alidade Institute Seminar? Alidade Institute Seminars are designed for military, civilian and defense industry professionals responsible for assessment and analysis of: Distributed Network Operations Cyber and Information Warfare Complex Military Operations Innovative Logistics Concepts Alidade Institute Seminars provide a unique combination of breakthrough research in emerging technical disciplines and insightful application to some of the most vexing new defense and homeland security operational challenges. On-site Seminars can be presented under Non-Disclosure Agreement (NDA) and tailored to meet the operational objectives of an organization, the technical skill set of a target audience or a more specific research topic. Phone: (401) 662-9842 www.alidade.net Fax: (401)-633-6420
  • 3. Operations Research for Cyber Analysis One of the biggest challenges facing today’s operational commanders is the lack of tools for formally assessing Cyber Operations. Although there is a substantial capability to analyze more traditional operations such as kinetic combat and logistics, cyber analysis remains highly idiosyncratic and imprecise, and Measures of Effectiveness for Cyber Operations remain elusive. As a result, decision makers cannot plan and execute with the same confidence that the discipline of Operations Research has brought to traditional plans and operations. Recent research by Alidade Incorporated, however, offers new methods for overcoming this challenge. A full-day seminar, part of Alidade Institute’s “Where’s the MathTM” seminar series, will present and discuss fresh approaches for quantitatively assessing the full range of Cyber Operations. This seminar will introduce participants to new quantitative techniques for analyzing Cyber Operations. Topics covered will include: Review of the strengths and weaknesses of existing techniques Introduction to new mathematics to describe social, cultural, information and influence networks Application of the mathematics to cyber disciplines such as Computer Network Attack, Computer Network Defense, Influence Operations and Strategic Communications Procedures for developing Cyber Operations Measures of Effectiveness Design of Cyber Common Operational Pictures (COPs) for Operational Level of War decision making Case studies from recent real world analyses Phone: (401) 662-9842 www.alidade.net Fax: (401)-633-6420
  • 4. Network Science 101 From Euler’s 1736 solution to the famous “Seven Bridges of Konigsberg” problem to Information Age research into predictions of the size of the worldwide market for internet routers, Network Science has been a valuable tool for analyzing arrangements, flows and interactions in connected systems. Also known formally as “Graph theory,” this subject has enjoyed a recent renaissance, providing new insight into the structure, dynamics and evolution of such systems as genomics, the internet, the worldwide web, scientific collaborations, ecological food webs, open source software and patterns of employment the motion picture actor industry. While most of this research has focused on the many variants of distributed, networked systems in nonmilitary contexts, a growing community of practitioners are applying new developments in network mathematics to distributed, networked military systems. As part of Alidade Institute’s “Where’s the MathTM” seminar series, a new, full- day seminar presents an overarching review of recent developments in Network Science, specifically tailored to a technical military audience. This seminar will discuss the fundamentals of Graph Theory, beginning with classical approaches and updating the subject with the recent developments most relevant to military, intelligence and Homeland Defense audiences. Specific topics covered include: New classes of network structures Statistics developed to describe the characteristics of these new classes Techniques for analyzing the structure, dynamics and evolution of complex networks New research into how networks compete with networks Case studies from recent real world analyses Measures of Effectiveness for networked systems Phone: (401) 662-9842 www.alidade.net Fax: (401)-633-6420
  • 5. Operations Research for Unmanned Systems Militaries worldwide are employing unmanned systems as part of innovative, networked systems and concepts. The standard industry models for evaluating how systems work, however, are more than a century old, so analysts are struggling with such important questions as: What is the value of robotics in warfare? How should new unmanned systems be designed, built and operated? What new command and control arrangements are most appropriate for unmanned systems? How should legacy military systems integrate into manned-unmanned hybrid enterprises? Recent research by Alidade Incorporated offers new methods for analyzing these systems. A full-day seminar, part of Alidade Institute’s “Where’s the Math™” seminar series, will present and discuss fresh approaches – drawn from the fields of Complex Systems Research and Social Network Analysis – for assessing a wide range of networks containing both humans and machines. This seminar explains why legacy models are unsuitable for answering these questions and describes a new set of principles for Operations Research for unmanned military systems. The seminar will provide methods to analyze: The structure, dynamics and evolution of robotic systems Application of the concepts and mathematics to the engineering and acquisition of unmanned systems Application of the concepts and mathematics to tactics and operational art Recent operational and acquisition case studies The seminar will review mathematical models relevant to networked competition and provide examples from the recent studies of networked military systems. By the end of the day, participants will: Understand the dynamics that create and motivate collectives Understand analytical tools that inform acquisition, engineering, operations of unmanned systems Achieve a greater perspective of how robotics systems perform in the context of both conventional and unconventional combat Phone: (401) 662-9842 www.alidade.net Fax: (401)-633-6420
  • 6. Achieve practical insight into how to compete against unmanned systems Operations Research for Networked Military Systems As we learn more about operations in the Information Age, every person involved in new defense systems recognizes their program’s heavy dependences on networked systems and concepts. Yet, the standard industry tools and models for evaluating how systems work are, in many cases, more than a century old. As a result, analysts find themselves struggling to answer such fundamental questions as: What is the value of networking in warfare? How should new systems be designed, built and operated? What new command and control arrangements are most appropriate for networkedsystems? How should legacy military systems be integrated with new, networked enterprises? Operations Research for Networked Military Systems explains why legacy models are unsuitable for answering these questions. This full-day seminar describes a new set of principles and methods: Mechanisms of advantage for distributed networked operations Design architects for distributed networked forces Important C2 patterns observed in networked military operations New models for search and detection Distribution networks for adaptive logistics This seminar will reviews mathematical models of networked competition and provides examples from recent studies of network-centric military systems. Phone: (401) 662-9842 www.alidade.net Fax: (401)-633-6420
  • 7. Command and Control Network Analysis (C2NA) The biggest changein military operations in the Information Age has been the extraordinary advance in command and control (C2) networks. Military operations centers are now state-of-the-art electronic nerve centers fed by an increasing desire for more data and better collaboration. This change is mirrored in federal/state emergency management and metropolitan first responder command centers. It is surprising, then, that while a great deal of effort has been expended to engineer and protect the IT elements of these networks, far less has been put forth to understand how operators actually use their networks. The development of new mathematics, tools and techniques is changing this situation, however, and there is a growing community of analysts who are mining network usage patterns to help organizations reach a deeper understanding of how to design, build and use today’s sophisticated command and control suites. Alidade Incorporated is one of the very few firms with experience studying real-world C2 Network usage patterns and analyzing what these patterns mean for mission accomplishment, executive decision making, network defense and system architecture. Drawing from its analysis of Joint Task Force and four-star Command Post Exercises (CPXs), Alidade Institute’s will conduct a full-day seminar that presents new approaches for quantitatively evaluating C2 networks. The Command and Control Network Analysis seminar explains why legacy Operations Research models not suitable for assessing C2systems and describes a new set of principles for military network analysis. Topics include: New techniques for preparing, conducting and briefing the results of C2 network analyses Recent mathematical developments that have revolutionized the analysis of C2 systems Overview of the new types of analytical packages that analyze C2 networks Methods for developing C2 Network Measures of Effectiveness Phone: (401) 662-9842 www.alidade.net Fax: (401)-633-6420
  • 8. Phone: (401) 662-9842 www.alidade.net Fax: (401)-633-6420
  • 9. Fundamentals of Adaptive Logistics Although advanced information networks and RF commodity tags promise to provide greater in-transit visibility for military networks, experience in recent operations shows that visibility is not enough. The extreme uncertainties found in tactical level battlefield conditions create turbulence in delivery systems, and quite often the speed at which information flows on the battlefield far out- strips the ability of distribution systems to respond to new demands, revised delivery locations or unexpected interruptions. Alidade Incorporated has been at the forefront of research into adaptive logistics concepts, developing innovative processes and doctrine for informed, flexible information and delivery systems that provide more operationally useful logistics structures. The Alidade Institute Fundamentals of Adaptive Logistics seminar provides new theoretical and technical research that is inspiring a new breed of sustainment capabilities. Topics covered in the seminar include: Review of classic operational logistics theory Presentation of new technical and mathematical models of logistics networks Development of a new theory of Demand Networks Discussion of when and how Demand Networks outperform Supply Chains Summary of the application of Demand Networks to new operational concepts, particularly those envisioned for unmanned, autonomous forces Phone: (401) 662-9842 www.alidade.net Fax: (401)-633-6420
  • 10. Seminar Pricing Alidade Institute seminars are offered to a public audience at $1200/seat (corporate) and $1000/seat (government/academia). They are also offered on- site and can be tailored to support the requirements of individual clients (under NDA, if desired). On-site rates are the same as public rates, although a 50% discount is applied to groups of 10 or more. A further discount is applied for 60-day advanced booking. ContactBetty at (401) 662-9842or betty@alidade.netfor group and on-site rates. Phone: (401) 662-9842 www.alidade.net Fax: (401)-633-6420