2018 International Conference on Military Communications and Information Systems (ICMCIS) 2018
DOI: 10.1109/icmcis.2018.8398729
|View full text |Cite
|
Sign up to set email alerts
|

The angloval tactical military scenario and experimentation environment

Abstract: The Anglova scenario is designed to support experimentation with tactical networking environments and provides node mobility and network connectivity for a realistic battalion-sized military operation consisting of three vignettes, including the deployment of armored vehicles, surveillance of the maritime domain and an urban operation with a naval component. Altogether, the scenario includes 283 nodes and lasts over four hours with detailed mobility and pathloss data for each node. Also included with the scena… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 32 publications
(8 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…The paper is structured as follows: In Section 2 we present a brief background to the use of hyper-dimensional semantic vectors in the context of artificial intelligence and brain inspired computation and we describe why such vectors are particularly well suited to computing paradigms such as in-memory computing; In Section 3 we explain the mathematical concepts that underpin our VSA representation of services and workflows; In Section 4 we describe how the key vector operations can be implemented as an associative memory using a PCM crossbar and, from experimental results, show the typical energy efficiency savings that can be achieved when compared with an alternative CMOS implementations; In Section 5 we present an example scenario based on a dynamic communications re-planning task; In Section 6 we illustrate how vector representations of devices/services and workflows are constructed; In Section 7 we present the logical architecture of a service that implements the VSA operations required and show how a PCM type device can be integrated into the architecture; In Section 8 we present the results obtained from a simulation of the communications re-planning scenario implemented in a representative tactical communications environment based on the NATO Anglova tactical military scenario; 5 Finally in Section 9 we present our conclusions and plans for the future direction of this work.…”
Section: Introductionmentioning
confidence: 99%
“…The paper is structured as follows: In Section 2 we present a brief background to the use of hyper-dimensional semantic vectors in the context of artificial intelligence and brain inspired computation and we describe why such vectors are particularly well suited to computing paradigms such as in-memory computing; In Section 3 we explain the mathematical concepts that underpin our VSA representation of services and workflows; In Section 4 we describe how the key vector operations can be implemented as an associative memory using a PCM crossbar and, from experimental results, show the typical energy efficiency savings that can be achieved when compared with an alternative CMOS implementations; In Section 5 we present an example scenario based on a dynamic communications re-planning task; In Section 6 we illustrate how vector representations of devices/services and workflows are constructed; In Section 7 we present the logical architecture of a service that implements the VSA operations required and show how a PCM type device can be integrated into the architecture; In Section 8 we present the results obtained from a simulation of the communications re-planning scenario implemented in a representative tactical communications environment based on the NATO Anglova tactical military scenario; 5 Finally in Section 9 we present our conclusions and plans for the future direction of this work.…”
Section: Introductionmentioning
confidence: 99%
“…The tactical edge hosts mobile nodes using heterogeneous ad hoc networks providing radio links with low data rate and high latency [24]- [26]. Thus, the movement of nodes and the presence of physical obstacles on the way will constantly change the network topology and the link quality, which may include link disconnections (worst case).…”
Section: B Tactical Systemsmentioning
confidence: 99%
“…Thus, the movement of nodes and the presence of physical obstacles on the way will constantly change the network topology and the link quality, which may include link disconnections (worst case). There are investigations combining simulation and emulation to create realistic military scenarios [26], [27] to test the whole software stack within tactical systems.…”
Section: B Tactical Systemsmentioning
confidence: 99%
“…These three problems are partially addressed in the literature reporting simulations and field experiments in tactical networks (e.g. [5], [6], [7], [8], [9], [10]). For example, it is common to find studies using non-stochastic user-generated data flows with few types of messages sent to the network within an uniform time window (problem A).…”
Section: Introductionmentioning
confidence: 99%