<<

ADVANCED TECHNOLOGIES APPLIED TO THE MODERN OF SYSTEMS/EQUIPMENT

9DVLOHù(5%Ă1(6&8 $WHQD9,ğĂ/8ù *Armaments Department ** and Inspection Corps

7KH QDWLRQV WKDW DFKLHYHF\EHUSRZHU ZLOO FRPPDQG LQÀXHQFH LQ JOREDO DIIDLUV HFRQRPLFDOO\ FXOWXUDOO\ PLOLWDULO\ DQG SROLWLFDOO\ LQ WKH GHFDGHV ahead. Military cyberpower is the application of the domain of cyberspace to RSHUDWLRQDOFRQFHSWVWRDFFRPSOLVKPLOLWDU\REMHFWLYHVDQGPLVVLRQVDQGLQÀXHQFH RSHUDWLRQV DV ZHOO DV ZDU¿JKWLQJ ,QIRWURQLFV 7HFKQRORJLHV LQWHUWZLQH DGYDQFHG LQIRUPDWLRQDQGHOHFWURQLFVV\VWHPVLQWHOOLJHQFHDQGHQDEOHDXWRQRPRXVEXVLQHVV IXQFWLRQVDQGREMHFWLYHVWKURXJKWKHXVHRILQWHUQHWDQGRWKHUWHWKHUIUHHWHFKQRORJLHV LHZLUHOHVVZHE« 7KHPRGHUQORJLVWLFVRIPLOLWDU\V\VWHPVHTXLSPHQWLPSO\FRUH WHFKQRORJLHVVXFKDV:DWFKGRJ$JHQWIRU3UHGLFWLYH3URJQRVWLFV:HEHQDEOHG6PDUW '% GHYLFHWREXVLQHVV 3ODWIRUPDQG7RROVIRU'DWD7UDQVIRUPDWLRQ2SWLPL]DWLRQ DQG6\QFKURQL]DWLRQ$SSOLHG:LUHOHVV7HFKQRORJLHVDQG/RJLVWLFV,QIRWURQLFV$JHQW /,$  7KHKHUHE\DUWLFOHDUJXHVWKDWWUDFHDELOLW\SUHGLFWDELOLW\DQGGLDJQRVWLFDELOLW\ WKURXJK DGYDQFHGWHFKQRORJLHVZLOOOHDGWKHDUPHGIRUFHVWRWKHOLIHF\FOHORJLVWLFV DSSURDFKIRULQWHURSHUDELOLW\DQGRSWLPDOFRVWRIPLOLWDU\V\VWHPVHTXLSPHQW

Key words: OLIHF\FOHORJLVWLFVF\EHUVSDFHURERWLFVORJLVWLFVLQIRWURQLFVDJHQW

The cyber revolution is just the cyberspace secure. The nations ODWHVWLQDVHULHVRIPDVVLYHZDYHVRI that achieve cyberpower will “creative destruction” that arise when FRPPDQGLQÀXHQFHLQJOREDODIIDLUV WKHFRQYHUJHQFHRIQHZWHFKQRORJLHV economically, culturally, militarily, RUJDQL]DWLRQDO PRGHOV DQG SURFHVV and politically in the decades ahead. innovations spawns new industries, (DFK VXFFHVVLYH ZDYH RI UHPDNHV ROG HFRQRPLF VHFWRUV DQG WHFKQRORJ\ FRQVWHOODWLRQV HJ WKH in the process, creates new sources FRQYHUJHQFH RI PLFURSURFHVVRUV RI HFRQRPLF VRFLDO SROLWLFDO DQG VRIWZDUHDQGGLJLWDOQHWZRUNVGXULQJ military power. WKH FXUUHQW HUD  EHFRPH WKH HQJLQH 7KH JRDO WRGD\ LV cyberpower, RI HFRQRPLF JURZWK DQG VRFLDO the ability to master and exploit FKDQJH FUHDWLQJ QHZ LQGXVWULHV DQG WKH UHYROXWLRQDU\ FDSDELOLWLHV RI WUDQVIRUPLQJWKHXQGHUO\LQJSROLWLFDO LQIRUPDWLRQDQGFRPPXQLFDWLRQV>@ military systems. Older industries ZKLOH VLPXOWDQHRXVO\ NHHSLQJ ZHUH GLVSODFHG RU WUDQVIRUPHG LQ D SURFHVV WKDW FUHDWHG QHZ VRXUFHV RI maturity, and decline, Figure 2. FRPSHWLWLYH DGYDQWDJH DQG RIWHQ /LNHZLVH WKH UROH RI JRYHUQPHQW QHZFHQWHUVRIJHRSROLWLFDOSRZHU IROORZVDSUHGLFWDEOHSDWWHUQDVWKHVH 2YHUWKHODVW\HDUVZDYHVRI industries evolve. Incubation occurs ³FUHDWLYHGHVWUXFWLRQ´HPHUJHDURXQG when innovations are still in the WKHFRQYHUJHQFHRIQHZWHFKQRORJLHV UHVHDUFKDQGGHYHORSPHQWVWDJHDQG DQG RUJDQL]DWLRQDO LQQRYDWLRQV where use is limited to early adopters. These waves create new industries, &\EHULVZHOOZLWKLQWKHV\QHUJ\ WUDQVIRUP WKH XQGHUO\LQJ VRFLDO DQG phase and stands ready to enter the SROLWLFDOPLOLWDU\V\VWHPVDQGFUHDWH PDWXULW\ SKDVH RYHU WKH QH[W IHZ QHZ VRXUFHV DQG FHQWHUV RI SRZHU \HDUV7KHUHFHQWUHLQYHVWPHQWLQ¿EHU Figure 1. RSWLFQHWZRUNVDQGFORXGFRPSXWLQJ These new waves included the LQIUDVWUXFWXUHVUHÀHFWVWKLVWUDQVLWLRQ DJHV RI VWHDP LURQ DQG UDLOURDGV 7KHNH\TXHVWLRQVDUHZKHUHZLOO VWHHO FKHPLFDOV DQG HOHFWULFLW\ cyber be by 2020, and what is the RLO DXWRV DQG HOHFWURQLFV DQG DSSURSULDWH UROH IRU JRYHUQPHQW LQ WRGD\ LQIRUPDWLRQ DQG FRPSXWHU FDSLWDOL]LQJ RQ F\EHU RSSRUWXQLWLHV WHFKQRORJLHV ZLWK WKH FRQWRXUV ZKLOHNHHSLQJF\EHUVSDFHVHFXUH" RI WKH QH[W ZDYH DURXQG QDQR 7KHDGYHQWRIWKH,QIRUPDWLRQDQG ELRWHFKQRORJ\ DQG URERWLFV MXVW Communications TechnRORJLHV $JH HPHUJLQJ KDVFUHDWHGDQHZLQIUDVWUXFWXUHWKH 7KHVH LQGXVWU\ ZDYHV IROORZ D Internet and a new domain called SUHGLFWDEOHVHTXHQFH>@WKDWPLUURUV F\EHUVSDFH  WKDW KDV WUDQVIRUPHG WHFKQRORJ\ 6FXUYH  OLIH F\FOHV how individuals, businesses and LQFXEDWLRQLUUXSWLRQIUHQ]\V\QHUJ\ JRYHUQPHQWVLQWHUDFW

Fig.1. 7KHZDYHVRI³&UHDWLYH'HVWUXFWLRQ´1H[WZDYH1DQR%LR5RERWLFV 1%5 Fig. 2. ,QIRUPDWLRQ&RPPXQLFDWLRQ7HFKQRORJ\ ,&7 (YROXWLRQDQG5ROHRI*RYHUQPHQW

Cyberspace LV FRPSULVHG RI comprehensive and includes policy WKH QHWZRUNV FRPSXWHUV VRIWZDUH DQGJRYHUQDQFHWHFKQLFDOVWDQGDUGV hardware, and other devices operations, human capital, and LQFOXGLQJFHOOSKRQHVDQGUDGLRV WKDW PDQDJHPHQW RUJDQL]DWLRQVDQGSHRSOHXVHWRVWRUH 7KHQXPEHURIXVHUVDQGPHWKRGV DQGH[FKDQJHLQIRUPDWLRQDFURVVWKH used to access cyberspace have JOREH LW LQFOXGHV WKH LQIRUPDWLRQ JURZQ H[SRQHQWLDOO\ LQ VL]H VFRSH and business processes that power DQGFRPSOH[LW\%\WKHUHZLOO the economy and allow individuals EH DOPRVW  ELOOLRQ LQWHUQHW XVHUV to connect and collaborate across ZLWK PRVW RI WKH JURZWK RFFXUULQJ RUJDQL]DWLRQDOVRFLDODQGJHRJUDSKLF LQ,QGLDDQG&KLQD GULYLQJPDVVLYH borders. More importantly, while the QHZ LQYHVWPHQWV LQ LQIUDVWUXFWXUH ,QWHUQHW LV IRFXVHG RQ WHFKQRORJ\ WHFKQRORJ\ DQG QHZ VHFXULW\ and operations, cyberspace is more architectures, Figure 3.

Fig. 3. Cyberspace – Opportunities and Trends %DVLF DGYDQFHPHQW LQ VFLHQFH H[DE\WHVE\JURZLQJDWD DQGWHFKQRORJ\>@FRPHDERXWWZLFH FRPSRXQGDQQXDOJURZWKUDWHRIRYHU a century and lead to massive wealth SHUFHQWD\HDUDQGFUHDWLQJDGDWD creation. Nanotechnology is an WVXQDPLLQWKHSURFHVV HQDEOLQJWHFKQRORJ\WKDWZLOOLPSDFW  XELTXLWRXV KLJKEDQGZLGWK DOO WKH HFRQRPLF VHFWRUV LQFOXGLQJ QHWZRUNVERWKZLUHGDQG:LUHOHVV GHIHQFHLQGXVWULHVFigure 4. ZLOOOLQNPRELOHXVHUVVPDUWGHYLFHV $VZHDUHRQO\KDOIZD\WKURXJK DQG FRPSXWLQJ FORXGV WR FUHDWH DQ the ICT wave, we can expect dramatic ³,QWHUQHWRIWKLQJV´ FKDQJHVRYHUWKHQH[W\HDUVDVQHZ  JOREDO DGRSWLRQ RI ,QWHUQHW GHYHORSPHQWV DFFHOHUDWH WKH JURZWK 3URWRFROYHUVLRQ ,3Y ZLOOH[SDQG RI F\EHUVSDFH LQ VL]H FDSDELOLWLHV H[SRQHQWLDOO\ WKH QXPEHU RI ,3 DQGFRPSOH[LW\$PRQJWKHH[SHFWHG DGGUHVVHVDYDLODEOHIRUVPDUWGHYLFHV WUHQGV These and other developments  VHPLFRQGXFWRUV ZLOO FRQWLQXH DUH OHDGLQJ WR ZKDW¶V FRPPRQO\ WR PLQLDWXUL]H WKURXJK QDQRVFDOH FDOOHGWKH:HEVWDJHRI,QWHUQHW PDQXIDFWXULQJ UHVXOWLQJ LQ WKH GHYHORSPHQW :HE  ZDV DERXW SUROLIHUDWLRQ RI ELOOLRQV RI ³VPDUW GLJLWL]LQJGDWDDQGFRQQHFWLQJSHRSOH devices” and inexpensive laptops WRLQIRUPDWLRQYLDWKH,QWHUQHW:HE FRVWLQJRUOHVV 2.0 saw the  WKHVH QHZ VPDUW GHYLFHV ZLOO GHSOR\PHQW RI VRFLDO FROOHFW DQG SURFHVV LQIRUPDWLRQ ± QHWZRUNLQJ DSSOLFDWLRQV VXFK DV DFFHOHUDWLQJWKHJURZWKRIGDWDIURP 0\6SDFH )DFHERRN ZLNLV DQG SHWDE\WHVLQWRPRUHWKDQ Twitter, which connected people

Fig. 4.$GYDQFHPHQWLQVFLHQFHDQGWHFKQRORJ\ WR SHRSOH LPSURYLQJ FROODERUDWLRQ JLYHQ WKH PLOLWDU\ QHZ FDSDELOLWLHV DQGFUHDWLQJQHZVRFLDOHFRV\VWHPV EXWKDVDOVRQHZFKDOOHQJHV Enabled by distributed clouds, the Military robots are used VHPDQWLF:HEWHFKQRORJLHVDQGRWKHU LQFUHDVLQJO\LQZDUWLPHVLWXDWLRQVWR HPHUJLQJDSSOLFDWLRQV:HEZLOO UHGXFHKXPDQFDVXDOWLHVEHLQJXVHG FRQQHFW LQIRUPDWLRQ WR LQIRUPDWLRQ IRUDPL[RIERWKFRPEDWDJDLQVWWKH LQ ZD\V WKDW VLJQL¿FDQWO\ LQFUHDVH HQHP\DQGQRQFRPEDWUROHV>@ WKHDPRXQWDQGXVHIXOQHVVRIWKHGDWD 7KH UDQJH RI DYDLODEOH PLOLWDU\ collected. URERWV LV KXJH EXW D VXFFHVVIXOO\ Military cyberpower >@ is one is Multifunction Utility / WKH DSSOLFDWLRQ RI WKH GRPDLQ RI Logistics and Equipment Vehicle cyberspace to operational concepts (MULE)08/(>@LVDQXQPDQQHG to accomplish military objectives SODWIRUP WKDW SURYLGHV WUDQVSRUW RI DQG PLVVLRQV DQG LQÀXHQFH HTXLSPHQWDQGRUVXSSOLHVLQVXSSRUW RSHUDWLRQV DV ZHOO DV ZDU¿JKWLQJ RIGLVPRXQWHGPDQHXYHUIRUFHV7KH Military administration, personnel YHKLFOHLVGHVLJQHGWRFDUU\WKHORDG PDQDJHPHQW PHGLFDO FDUH DQG RIWZRLQIDQWU\VTXDGVWRWDOLQJDERXW ORJLVWLFVDUHDOVRHQKDQFHGE\F\EHU SRXQGV NJ DQGVXSSRUW WRROV 7KH JURZWK LQ LQIRUPDWLRQ troops with water and power sources WHFKQRORJ\DQGXVHRIF\EHUVSDFHKDV IRUH[WHQGHGRSHUDWLRQVFigure 5.

Fig. 5.0XOWLIXQFWLRQ8WLOLW\/RJLVWLFVDQG(TXLSPHQW 08/( 8QPDQQHG*URXQG 9HKLFOHV 8*9V 7KH08/(ZLOOEHD³IROORZHU´ 7KHFRPSDQ\H[SHFWVDUHTXLUHPHQW WRWKHKXPDQWHDP(DFKRIWKHWHDP IRUYHKLFOHVEDVHGRQFXUUHQW members will be able to order the Army plans. 08/( WR FRPH IRUZDUG WR VXSSRUW ,QWKHODVW\HDUVHYROXWLRQLQ the operation. Otherwise, the vehicle proGXFW PDQXIDFWXULQJ DQG TXDOLW\ ZLOOPDLQWDLQDVDIHGLVWDQFHEHKLQG Figure 6) implied some important WKH WHDP ZDLWLQJ IRU RUGHUV 7KH ÄVWHSV´IURPLQWHOOLJHQWPHFKDWURQLFV MULE can communicate with and GDWD FRQWUROLQWHOOLJHQFH WRSURGXFW sometime, deploy unmanned aerial WKDWWKLQNVDQGOLQNV LQIRUPDWLRQ  DQGJURXQGYHKLFOHV 8$98*9 WR FRPSXWHU LQWHOOLJHQFH  DQG SURGXFWV JLYH WKH VTXDG PHPEHUV D WUXH  WKDW OHDUQ JURZ UHFRQ¿JXUH DQG GHJUHHLPDJHRIWKHEDWWOH¿HOG VXVWDLQ NQRZOHGJH  GLVWULEXWHG ,Q  /2&.+((' 0$57,1 LQWHOOLJHQFH  RU IURP IDFWRU\ GLVSOD\HG WKH ODWHVW FRQ¿JXUDWLRQ RI DXWRPDWLRQ ÀH[LELOLW\ WRHQWHUSULVH the MULE which recently received LQWHJUDWLRQ DJLOLW\  DQG HORJLVWLFV QHZ ZKHHOV XWLOL]LQJ VSULQJV PDGH  HPDQXIDFWXULQJ YHORFLW\  ZLWK RI FRPSRVLWH PDWHULDOV LQVWHDG QHDU]HURGRZQWLPH VXVWDLQDELOLW\ RI LQÀDWDEOH WLUHV &XUUHQWO\ DW DQGDVVHWRSWLPL]DWLRQ>@ DQ HQJLQHHULQJ HYDOXDWLRQ SKDVH The characteristics in the evolution MULE is expected to mature into a >@ RI SURGXFW DQG VHUYLFH YDOXH IXOO VFDOH GHYHORSPHQW V\VWHP DQG LPSO\ IRU LQIRWURQLFV V\VWHPV ,7  EH UHDG\ IRU GHSOR\PHQW ZLWK WKH embedded autonomous service, smart ¿UVW )XWXUH &RPEDW 6\VWHPV )&6  DQG SUHGLFWLYH V\VWHPV DQG ]HUR XQLWV RI DFWLRQ DURXQG  EUHDNGRZQSURGXFWLYLW\ Figure 7).

Fig. 6.(YROXWLRQLQ3URGXFW0DQXIDFWXULQJDQG4XDOLW\ Fig. 7. (YROXWLRQRI3URGXFWDQG6HUYLFH9DOXH

Autonomous logistics processes 7KH PDLQ WHFKQLFDO FKDOOHQJH RI DUH DQ DSSURDFK WR IDFH WKH FXUUHQW DXWRQRPRXVORJLVWLFSURFHVVHVLVWKH FKDOOHQJHVLQORJLVWLFVE\XVHRIPRGHUQ UHDOLVDWLRQ RI DXWRQRPRXV GHFLVLRQ LQIRUPDWLRQ DQG FRPPXQLFDWLRQ WDNLQJ LQ ORJLVWLF HQWLWLHV WKDW KDYH WHFKQRORJLHV ,&7  DQG QRYHO no reliable connection to a central GHFLVLRQSUHSDULQJ DQG GHFLVLRQ control system. PDNLQJ WRROV 5LVN PDQDJHPHQW +RZHYHU LQ RUGHU WR PDLQWDLQ D LV QHHGHG WR PDNH WKH DXWRQRPRXV FRQWUROODEOHG\QDPLFORJLVWLFV\VWHP ORJLVWLFSURFHVVHVUHOLDEOHDQGUREXVW WKHWHFKQRORJLFDOGHYHORSPHQWQHHGV DJDLQVW VXGGHQO\ DSSHDULQJ HYHQWV not only to provide autonomous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presented in Figure 8. Fig. 8.9LVLRQRQVPDUWOLIHF\FOHVXSSRUWIRUPLOLWDU\V\VWHPVHTXLSPHQW The Watchdog Agent is a toolbox $JHQW SURYLGHV PDFKLQH OHYHO RIDOJRULWKPVWKDWFDQDXWRQRPRXVO\ LQWHOOLJHQFHDQGLVV\QFKURQL]HGZLWK DVVHV DQG SUHGLFW WKH SHUIRUPDQFH WKH RSHUDWLRQ DQG V\QFKURQL]DWLRQ GHJUDGDWLRQ DQG UHPDLQLQJ OLIH RI OHYHO LQWHOOLJHQFH ,W LQFOXGHV VLJQDO machines and components. This SURFHVVLQJ DQG IHDWXUH H[WUDFWLRQ LQIRUPDWLRQ FDQ EH IHG WR D FORVHG GLDJQRVHV SHUIRUPDQFH SUHGLFWLRQ ORRS SURGXFW OLIHF\FOH PDQDJHPHQW DQG SHUIRUPDQFH DVVHVVPHQW system, Figure 9 7KH :DWFKGRJ modules.

Fig. 9. :DWFKGRJ$JHQW±3URJQRVWLFVRQDFKLS 7KH WRROER[ FRQVLVWV RI WRROV 7KHSXUSRVHRIVHOIPDLQWHQDQFHLVWR VXFK DV 1HXUDO 1HWZRUNV )RXULHU SURYLGHHQRXJKWLPHIRUPDLQWHQDQFH 7UDQVIRUP6XSSRUW9HFWRU0DFKLQH personnel to become available and 6HOIRUJDQL]LQJ 0DSV )X]]\ /RJLF proper downtime to be scheduled. /RJLVWLF5HJUHVVLRQ+LGGHQ0DUNRY Infotronics Technologies 0RGHOV %D\HVLDQ %HOLHI 1HWZRUNV LQWHUWZLQH DGYDQFHG LQIRUPDWLRQ 0DWFK 0DWUL[ $XWRUHJUHVVLYH DQG HOHFWURQLFV V\VWHPV LQWHOOLJHQFH 0RYLQJ $YHUDJH 7LPH)UHTXHQF\ and enable autonomous business Analysis, in addition to others. IXQFWLRQV DQG REMHFWLYHV WKURXJK The Next Step: Self- WKH XVH RI LQWHUQHW DQG RWKHU WHWKHU Maintenance. 7KH DELOLW\ RI IUHH WHFKQRORJLHV LH ZLUHOHVV a machine to adjust its own ZHE«  7KH PRGHUQ ORJLVWLFV RI IXQFWLRQDOLW\ DFFRUGLQJ WR LWV PLOLWDU\ V\VWHPVHTXLSPHQW LPSOLHV KHDOWK VWDWXV LV DQ LQWHJUDO SDUW RI D FRUHWHFKQRORJLHVVXFKDV:DWFKGRJ VHOIPDLQWHQDQFH SDUDGLJP 6HOI $JHQW IRU 3UHGLFWLYH 3URJQRVWLFV PDLQWHQDQFHUHTXLUHVERWKIXQFWLRQDO :HEHQDEOHG 6PDUW '% GHYLFH LQWHOOLJHQFH DQG KHDOWK LQWHOOLJHQFH WREXVLQHVV 3ODWIRUPDQG7RROVIRU 7KLV LQIRUPDWLRQ FDQ EH IHG LQWR D 'DWD 7UDQVIRUPDWLRQ 2SWLPL]DWLRQ IXQFWLRQDO LQWHOOLJHQFH PRGXOH ± DQG 6\QFKURQL]DWLRQ $SSOLHG HJ FRQWUROOHU ± DQG WKH PDFKLQH¶V :LUHOHVV7HFKQRORJLHVDQG/RJLVWLFV RSHUDWLRQFDQEHDGMXVWHGDFFRUGLQJO\ ,QIRWURQLFV$JHQW /,$ Figure 10.

Fig. 10./RJLVWLFV,QIRWURQLFV$JHQW $GYDQFHGLQIRWURQLFVWHFKQRORJLHV V\VWHPV HQJLQHHULQJ VXSSRUWDELOLW\ IRUVPDUWOLIHF\FOHVXSSRUW Figure 11) DQDO\VLV LQWHJUDWHG ORJLVWLF VXSSRUW PHDQV ¿UVWO\ WKH XWLOL]DWLRQ RI HOHPHQWV ORJLVWLFV HQJLQHHULQJ WHWKHUIUHHLQWHUIDFH and reliability, availability, $GYDQFHG WHFKQRORJLHV DSSOLHG maintainability, testability, WKURXJK WKH OLIH F\FOH ORJLVWLFV SUHGLFWDELOLW\ DQG GLDJQRVWLFDELOLW\ RI WKH PDMRU PLOLWDU\ HTXLSPHQW IRU WKH LQWHURSHUDELOLW\ DQG RSWLPDO Figure 12) involves the approach FRVWRIPDMRUPLOLWDU\HTXLSPHQW LQWHUPVRISURJUDPPHPDQDJHPHQW

Fig. 11. $GYDQFHG,QIRWURQLFV7HFKQRORJLHVIRU6PDUW/LIH&\FOH6XSSRUW

Fig. 12./LIHF\FOHORJLVWLFVRIPDMRUPLOLWDU\V\VWHPV )RU WKH QHDU IXWXUH WUDFHDELOLW\ DJXLGDQFHRQWKHOLIHF\FOHORJLVWLFV SUHGLFWDELOLW\ DQG GLDJQRVWLFDELOLW\ RI WKH PLOLWDU\ V\VWHPVHTXLSPHQW WKURXJK WKH DGYDQFHG WHFKQRORJLHV Figure 13. ZLOOOHDGWKHDUPHGIRUFHVWRHVWDEOLVK

Fig. 13.*XLGDQFHRQWKHOLIHF\FOHORJLVWLFVRIWKHPDMRUPLOLWDU\V\VWHPV REFERENCES >@-D\/HH:LVFRQVLQ'LVWLQJXLVKHG DQG 5RFNZHOO $XWRPDWLRQ >@ $Q ,QWURGXFWLRQ WR 0LOLWDU\ 3URIHVVRU DQG 'LUHFWRU RI Robots, KWWSZZZURERWPDWUL[ ,06 - $GYDQFHG ,QIRWURQLFV RUJPLOLWDU\URERWKWP 7HFKQRORJLHV IRU 6PDUW /LIH >@ %RR] $OOHQ +DPLOWRQ The &\FOH 6XSSRUW $ &ORVHG/RRS 5RDG WR &\EHU 3RZHU ± &\EHU $FTXLVLWLRQ $JH&\EHUVSDFH&\EHUSRZHU >@ /DUU\ . :HQW] &KDUOHV / &\EHUVHFXULW\ &RPPHUFLDO  %DUU\6WXDUW+6WDUUMilitary *RYHUPHQW $FWLRQ, Christopher 3HUVSHFWLYHV RQ &\EHUSRZHU  1HZSRUW8QLYHUVLW\2FWREHU &HQWHU IRU 7HFKQRORJ\ DQG  1DWLRQDO6HFXULW\3ROLF\DW7KH >@ %RR] $OOHQ +DPLOWRQ The 1DWLRQDO 'HIHQVH 8QLYHUVLW\ 5RDGWR&\EHU3RZHU±6HL]LQJ :DVKLQJWRQ'&-XO\ 2SSRUWXQLW\ :KLOH 0DQDJLQJ >@00H\\DSSDQ1DQRWHFKQRORJ\ 5LVNLQWKH'LJLWDO$JH :KDW LV LW" :KDW DUH WKH >@-D\/HH, 'LUHFWRU16),QGXVWU\ RSSRUWXQLWLHV" 1$6$ $PHV University Cooperative 5HVHDUFK&HQWHU0RIIHWW)LHOG 5HVHDUFK &HQWHU RQ ,QWHOOLJHQW $,&K( :HELQDU 0DUFK  0DLQWHQDQFH 6\VWHPV ,06   ,QWHOOLJHQW0DLQWHQDQFH6\VWHPV >@ 0XOWLIXQFWLRQ 8WLOLW\/RJLVWLFV $*DPH&KDQJH7UDQVIRUPDWLRQ DQG (TXLSPHQW KWWSGHIHQVH LQ7300HWKRGRORJ\7RROVDQG XSGDWHFRPSURGXFWVPPXOH $SSOLFDWLRQV. ORDGFDUULHUKWP