<<

NEW ASPECTS of APPLIED INFORMATICS, BIOMEDICAL ELECTRONICS & INFORMATICS and COMMUNICATIONS

Computerised Aided

JIŘÍ F. URBÁNEK, JIŘÍ BARTA, JOSEF HERETÍK and JAROSLAV PRŮCHA* Department of Civil Protection, Dpt of External Relations*, University of Defence, Kounicova 65,662 10 Brno, CZECH REPUBLIC [email protected]; http://www.unob.cz

Abstract: - Interface´s impermeability is important to create among antagonist´s objects in turbulent world. A lot of various interfaces have “smash” contours but their exact definition is helpful for active and passive protection of living objects in nature. The interfaces between human enemies ask camouflage systems and processes implementing military environment. Fundamental principles of nature / human made camouflage are introduced in this paper. Computer aided camouflage by means of contemporary digital cybernetics instruments is an aim of Czech University of Defence R&D Grant solution of National Defence Research Project with acronym - Draft and assertion new adaptive technology for simulation and camouflage in operational environment armed forces of Czech Republic and for infrastructure protection. The resources and “how to” of this Grant asks a finding of new approaches of problems solution in military environment. The architecture of necessary systems and their technologies, representing first milestone of Grant solution, is outlined here. ADAPTIV Project tends to by Computerised Aided (CAM) implementations as autonomic outdoor computerised aided Interoper-mobile WiMAX CAM Workshop.

Key-Words: - Active Camouflage by Computerised Aided Mimicry (CAM) Implementation.

1 Introduction the camouflage must be tailored to the observer. Second, Human society survival requires the most effective the camouflage must deceive the observer into making a behaviour aiming to the co-operation, collaboration, false judgment about the camouflaged object. integration and technological ascendancy of friendly Camouflage is an attempt to avoid observation, and as actors. But security and defence research must offer such, it is tailored to the vision of the expected observer. pertinent means of protection for “native rival´s force” The use of camouflage, no matter what the specific predominance counter antagonists and enemies. A application, has certain basic requirements that must be camouflage systems and technologies is one from most met. First, the camouflage must be tailored to the important means for it. observer. Second, the camouflage must deceive the The Camouflage is concealment by means of disguise observer into making a false judgment about the [1]. The likely root of the word camouflage is camoufler, camouflaged object. The strategies of camouflage can be a French term meaning smoke blown in someone's face as broken down into up to four categories, which are a practical joke. Word origin is in Italian camuffare. The cryptic, disruptive, counter-shading and mimicry. Each Camouflage is a method of avoidance of observation that of these deals with a different method of deceiving the allows an otherwise visible object (organism or structure observer, and often strategies are combined increase their to remain indiscernible from the surrounding environment effectiveness. These may be applied individually, or in through deception. The theory of camouflage covers the combination with one another providing overall various strategies which are used to achieve this effect. camouflage strategy. The blending of disruptive and The definition of camouflage involves the both the cryptic coloration can be called coincident disruption. concealment and the obscurity, whether applied to the Cryptic (or blending) camouflage is an attempt to blend natural coloration of animals, or used in military into the environment and become effectively environment. The methods by which concealment or imperceptible. To do this, the camouflaged object must obscurity are attained share a common set of strategies minimize observable differences between itself and the intended to deceive the observer. The underlying background with respect to the senses of the target methodology used in, whether natural or human-made. observer. The definitive example of camouflage is a Camouflage is not limited to the commonly encountered cryptic camouflage designed to match the visual visual way, but encompasses other senses as well. First, appearance of the expected background, generally using a

ISSN: 1792-460X 289 ISBN: 978-960-474-216-5 NEW ASPECTS of APPLIED INFORMATICS, BIOMEDICAL ELECTRONICS & INFORMATICS and COMMUNICATIONS

mottled pattern of greens and browns to match ground and of the model depending on the situation. Models foliage colour and break up the outline of the themselves are difficult to define in some cases, for camouflaged object. Cryptic camouflage must match the example eye spots may not bear resemblance to any colors and spatial frequencies of the background to be specific organism's eyes, and camouflage often cannot be effective, and may have to suppress non-visual cues. attributed to a particular model. In some cases this can be Disruptive (or dazzle, US) camouflage is not intended quite a complex process, such as in the case of the Mimic to blend into the environment, and in fact often involves , which are extremely flexible. Although all bright, eye-catching colours that would be the antithesis can change colour and texture, and many can of cryptic camouflage. Disruptive camouflage seeks to blend with the sea floor, appearing as rocks, the Mimic confuse the observer, by providing visual cues that Octopus is the first octopus species ever observed to override the camouflaged object's features. This prevents impersonate other creatures – it can change shape to the observer from accurately identifying characteristics of resemble lionfish or other poisonous fish in its habitat. the camouflaged object(s), such as shape, size, Octopus ink cloud also provides disruption of the sense of orientation, and number of objects in a group combination smell e.g. Mimicry is perhaps the broadest example of of counter-shading and cryptic colours and patterns to adaptive camouflage (though the most obvious form to blend into its environment. humans is visual mimicry). Counter-shading is the process of using lighter colours Adaptive camouflage means a capability of an adapting on normally dark areas, and darker colors on normally object appearance to match its environment and/or light areas. This removes some of the visual cues used for impersonate other object. Adaptive camouflage (or active depth perception causing the counter-shaded object to camouflage) is a group of camouflage technologies which appear flat, rather than as an object with depth. This is the would allow an object (usually military in nature) to blend same effect used in the hollow-face illusion where a into its surroundings by use of panels or coatings capable concave object is shaded in such a way as to appear of changing color or luminosity. Active camouflage can convex. Military doctrine also applies this technique to be seen as having the potential to become the perfection camouflage paint. The standard method for applying of the art of camouflaging things from visual detection. camouflage paint to exposed skin is to use dark paint for bright areas of the face, light paint for shadowed areas, and combining this with a disruptive pattern over large areas of skin.

visual visual

The Mimicry is the attempt by the camouflaged object to be observed as some other type of object. Mimicry is ´s ry [2] ry the similarity of one object to another which protects one or both. This similarity can be inappearance, behaviour, nsect sound, scent and even location, with the mimics found in mimic similar places to their models. Mimicry occurs when a group of organisms, the mimics, evolve to share common I Fig. 1: perceived characteristics with another group, the models. The evolution is driven by the selective action of a signal- receiver, or dupe. For example, birds that use sight to 2 Problems of ADAPTIV Project identify palatable insects (the mimics), whilst avoiding the ADAPTIV Project solution has defined strict conditions noxious models. Collectively, this situation is known as a which nominatives are a restriction of financial sources mimicry complex. The model is usually another species and exact definition of Project boundaries and conditions except in cases of Automimicry or intraspecific mimicry regarding researched and developed systems and occurs within a single species, one case being where one technologies: part of an organism's body resembles another part.. The a/ Observer would be military person. signal-receiver is typically another intermediate organism b/ Observer´s sense using for camouflage detection is like the common predator of two species, but may actually limited to normal humans vision in visual range of be the model itself, such as a moth resembling its spider luminous spectrum (see Fig.2), without night vision predator. As an interaction, mimicry is in most cases systems, radar, sonar and thermal imaging as well. advantageous to the mimic and harmful to the receiver, c/ Omitting of other senses, such as olfaction (smell), but may increase, reduce or have no effect on the fitness touch, sound and hearing.

ISSN: 1792-460X 290 ISBN: 978-960-474-216-5 NEW ASPECTS of APPLIED INFORMATICS, BIOMEDICAL ELECTRONICS & INFORMATICS and COMMUNICATIONS

d/ Using cybernetic computerized aided technologies and in that order. Sometimes unexpected colours provide good dataprojectors for a visualisation acquired by COTS cryptic coloration, such as pink. E.g. a shade called principle(Commercial Off The Shelf) [3]. ´Mountbatten pink´ was used during WWar II for ships. e/ Omitting expensive and in the field untried Human eye excites chromatic perception in the conditions technologies, as the lasers… of the visible radiation. Exact extent of visible radiation The eyes differ widely across the animal kingdom. spectral range is impossible to set, because it is depending Some animals see in monochrome, perceiving only on incident radiation to eye retina and on spectral brightness, while other see two or, like humans, three responsibility of observer eye. Lower boundary moves types of color; some species of birds and are within the limits of wave longitude among 0,36 and 0,40 capable of distinguishing four different colors. Even in the µm and upper boundary among 0,76 and 0,83 µm – see animals with the same degree of colour perception, the Fig. 2 [4]. Radiation of light (light) is visible radiation pigments respond to different wavelengths would be a that is utilized by observer ocular organ. Every mono- completely different colour to another species. In addition frequency radiation excites quite definite coloured eye´s to differences in how colour is perceived, the nervous sensation, hence this radiation is indicating as system does a significant amount of processing to the monochromatic. In spectra solar radiation eye man can image, finding edges, adjusting contrast, and determining detect in circa 128 coloured tones. spatial frequency. Because the ADAPTIV Project has in its submission above boundaries and conditions a/ and b/, 2.1 Best Practice in Military Environment than the human eyes will be the organs of observer´s Military camouflage did not achieve widespread use until visual camouflage perception. World War I, after the introduction of airplanes for an observation. This early camouflage was not restricted to just coloring, it applied to shape as well. United States Army Field Manual [5] in chapter 1(detailed information and how-tos): Camouflage uses concealment and deception to promote our offensive action, to surprise, to mislead the enemy, and to prevent him from inflicting damage upon us. It includes hiding from view, making hard to see clearly, arranging obstructions to vision, wave wave - deceiving and disguising, and deception involving sound. Relevant military manuals cover general camouflage principles and camouflage of individuals, infantry

weapons, vehicles, bivouacs, command posts, supply points, medical installations, field artillery, aircraft on the spectrum ground, airdromes, antiaircraft artillery, rear areas, and permanent fortifications. The operations, training, and planning section of a staff is responsible for preparation of plans for and supervision Fig. 2: Electromagnetic Fig. 2: of activities concerning tactical measures to preserve secrecy and effect surprise. One such responsibility is operational camouflage; it involves concealment and deception through camouflage activities and construction, and is used tactically in ruses and feints to deceive and surprise the enemy. The operations, training, and planning sections share this responsibility with the intelligence Normal human eyes see though the actions of four section. In military environment exist specially trained types of receptors in the eye; the rods, which are highly camouflage units - engineer troops: camouflage battalions sensitive, perceive brightness, while three types of cones and separate camouflage companies of ground forces; perceive red, green, and blue colors. The density and aviation camouflage battalions; and camouflage sections sensitivity of these rods and cones determine how of engineer headquarters companies of the air force. sensitive the eye is to colour. Brightness is the most There are four fundamental ways of concealing important factor, followed by green, red, and blue colours, installations activity and camouflage methods:

ISSN: 1792-460X 291 ISBN: 978-960-474-216-5 NEW ASPECTS of APPLIED INFORMATICS, BIOMEDICAL ELECTRONICS & INFORMATICS and COMMUNICATIONS

a. Blending. - An object is concealed by camouflage (1) materials arranged so that both the materials and the object seem a part of their background (fig. 33). The aim

is to prevent disclosure of the object by a change in the

natural appearance of the site. 8'). b. Hiding. - Hiding is concealing the identity of an - object with a screen even though the screen itself may sometimes be seen.

c. Deceiving. - Deceiving simulates an object or incident The index. activity of military significance or disguises them so they metamaterial ( metamaterial

appear to be something else. Deceiving accomplishes the positive but the same, Fig. 3: A comparison of of A comparison Fig. 3: inthat a to metamaterial refracts in a normal (8') or (8') a normal in refracts following: and air from beam 8 enters conventional material having having material conventional refractive Divides an enemy attack by offering more targets than index negative in a refraction

actually exist. - Draws enemy attention and fire away from essential installations or activity. Deceives the enemy as to identity, strength, intention, or degree of activity in an area. d. Decoys. - Imitations of real objects are the basis for Credit: Photo Drake 2009 Drake

most deceptive practices. Although it is possible to make . a decoy representation of any object, the most useful are K Fig. 4: An artist's An artist's Fig. 4:

decoy roads, paths, rocks, stumps, trees, hedges, guns, metamaterial. bending Wikipedia Wikipedia vehicles, planes, and buildings. Disguise changes the light new the of rendition appearance of an object or activity to give a false All known non-metamaterial transparent materials impression of its character. The purpose may be either to possess positive ε and µ. But a left-handed material create a military target or to conceal the object by making (LHM) can be defined (see Fig. 3 [7]). It is a material it appear to be of non-military significance. which exhibits simultaneous negative values for permittivity ε and permeability μ in an overlapping 2.2 Camouflage top world´s R&D frequency region. Since the values are derived from the Here, in this paper is necessary to highlight that problem effects of the composite medium system as a whole, these solution is in CAMouflage INTERFACEs (See Fig. 6) are defined as effective permittivity, εeff, and effective between two Environments (ENVs): OBSERVER ENV permeability, μeff (see Fig. 4 [8]). Real values are then counter Camouflage OBJECT ENV. The best possible derived to denote the value of negative index of solution would be in a Metamaterial using with special refraction, and wave vectors. This means that in practice optical behaviour creating Cloaking of . losses will occur for a given medium and environment Metamaterials are artificial materials engineered to used to transmit electromagnetic radiation such as provide properties which may not be readily available in microwave, or infrared frequencies and/or visible light. nature. These materials usually gain their properties from But, metamaterials are not disposable till this time and the structure rather than composition, using the inclusion of problem solution by our R&D is pointed at elsewhere. small inhomogeneities to enact effective macroscopic behaviour. [6] The greatest potential of metamaterials is the possibility to create a structure with a negative 3 ADAPTIV Project Solutions refractive index, since this property is not found in any Czech University of Defence is in the solution of National non-synthetic material. Almost all materials encountered Defence Research Project with acronym ADAPTIV - in optics, such as glass or water, have positive values for Draft and assertion new adaptive technology for both permittivity ε and permeability µ. However, many simulation and camouflage in operational environment metals (such as silver and gold) have negative ε at visible armed forces of Czech Republic and for infrastructure wavelengths. Although the optical properties of a protection. This project´s aim: A using of the perspectives, transparent material are fully specified by the parameters research, development, implementation and application of ε and µ, refractive index n is often used in practice, which cybernetic computerized aided technologies, intended for can be determined from a protection of troop’s forces and equipments, of the

ISSN: 1792-460X 292 ISBN: 978-960-474-216-5 iuain n cmulg o mltr atvte and activities military of targets. the camouflage for and and simulation infrastructure technological and civilians ( imagined of Defence R&D project [10, 11]. The DataCUM featuresDataCUM The 11]. [10, project R&D Defence of University former in functionalities others with using and from benefits new with arised have DataCUM 8). Fig. on see one small the screens, dataSAM and (projectors emission audio-visual ( implementation Roaming), (WiMAX transmission & information sharing gathering Fig.7), see information on for others among field cameras, autonomous Workshop) for technologies cybernetic (CAM using communication site mobile is system crucial the mutual Blazon the At CAM their building entities, architecture, areblazonry and modeled the at next Fig. 6. amongst [9] (ENVs) . relationships Environments functions operational their and Relevant Cases Use , The real component entitiesrepresent: Systems 3.1 CAM Architecture disruption effective for macropatterns larger p with confused be not can (CAM) Mimicry Aided Computerised The Remark: (NEC) Capability Computer Enabled Network Integration, the of capabilities manifest DATABASE formalized Computer attern devised by utilizing small micropatterns, as opposed to opposed as micropatterns, small utilizing by devised attern Fig. 5: CAM Concept Attributes Flex

ISSN:

ibility ised ised as NEW 1792-460X CAM Aided Design (CAD) Interoperability M.O

Aided Mimicry Aided Digital Camouflage (or "digicam"), which is a is which "digicam"), (or Camouflage Digital ASPECTS Aofae plus CAMouflage

. a Integration YESS wih a designed was which CYBERSYS, se i. 5) Fig. (see ADAPTIV Project

of of of Camouflage Fig.6) tends towards implementations APPLIED rendering (intercepting) and C E N scenery and object copys; h P the lxblt, Interoperability, Flexibility,

) (illusory) virtual reality Aided Mimicry (CAM)

CA and /or emitting/or relevant object change CAM . ictures.

( D

INFORMATICS, M.O. i Its . ts ts optrsd aided computerised

ehooy and Technology) by body ADAPTIV Project. a is

in thein theaters of a ) Mimic) Octopus “ DataCUM

R&D ENV (see Computerised how-to c general pattern SATELKITE eye The The , using scene, oncept is here is oncept

deceptive is builded by builded is operations.

protective Active Above is BIOMEDICAL tentacles

“ of the“ of

I is It .

CAM

and (by (by for

293 ELECTRONICS [6] A. Sihvola, Alexey P. Vinogradov. Vinogradov. P. Alexey Sihvola, A. [6] [5] Moulder, J.E. [4] Secretary, W.Perry. US State [3] http://en.wikipedia.org/wiki/ [2] Allen. R. [1] References: forces, ADAPTIV will continue for aprototype future militarytwo years. camouflage adaptive resources infrastructure; & means critical digital of for protection information visual easy andwell-arranged creation anddisplaying(audio)- of Workshop. CAM to (CAM) tends and to” Mimicry and architecture the Aided from follows implementations Computerised Czech The by of protection. camouflage infrastructure forces for armed and Republic of in environment camouflage and operational simulation for technology adaptive here.introduced Grant R&D by Defence of camouflage University aided Czech Computerised of milestone First 4 Conclusion relevant(audio) –visual information. of emission and creation processing, storage, acquisition, functions,necessaryall fieldinteroperablefor way of and integrated provides and implements solution engineering DataCUM operation. on its for requirements needed resources retrofitting minimal has It capability. operational m 40 area flat straight ferried in a boot of common motorcar. It be can erected on medial wire and Itsignals.requires simple transportation,becan itbecause sources energy ground on connectors stationary without autonomous basically operate to is able It field. a in wherever erection reliable and fast its by [9] J.F. Urbánek. Urbánek. J.F. [9] S.C. Nemat-Nasser S.; Shultz D.R.; Smith A.; R. Shelby, [8] Ziolkowski. Nader, Engheta, [7] .. ry il Manuals, Field Army U.S. York: Springer-Verlag. 2008. 2008. Springer-Verlag. York: Applications Modelling, Fundamentals, Plasmonics: 5- FM 2007, ISBN 978-0- 2003, Books, iuain mdlig n otmzto, M '08 SMO pp. 2008, optimization, 978-960- ISBN Press, WSEAS and Spain, Santander, modelling Simulation, Practitioners Cyber-Informatics two-dimensional, 78. a through metamaterial. left-handed isotropic, transmission Microwave 9780471761020. explorations engineering

2001. 2001. & INFORMATICS h PNUN nls Dictionary English PENGUIN The 20. , 2004. Light2004. , It contents the draft and assertion of new of assertionand draft Itthe contents 474-

Effective Modelling of Know-How for for Know-How of Modelling Effective n/r o decoy´s for and/or -9, ISSN007-9, 1790-2769. 2 and during l0 minutes to achieve to minutes l0 during and and 140 WlySn. 06 ISBN 2006. Wiley&Sons. . Army Publishing Directorate. Directorate. Publishing Army COMMUNICATIONS ISBN: Military Doctrine Military ISBN - -6, p 197. p 51533-6, 197. Metamaterials: physics and and physics Metamaterials: , 978-960-474-216-5 It serves especially for especially serves It In

9781402094064 Applied Physic Letters Letters Physic Applied iuain Grant simulation. 8 Metamaterials and and Metamaterials th Int. Conf. on on Conf. Int.

ADAPTIV , 1994. 1994. , 252 , Penguin Penguin , . active - New . “how 255, is ,

NEW ASPECTS of APPLIED INFORMATICS, BIOMEDICAL ELECTRONICS & INFORMATICS and COMMUNICATIONS

[10] J.F. Urbánek. Application Modelling Simulation of [11] J.F. Urbánek, J. Průcha, A Development of Wireless Data Flow in Disaster Events Management, In 8th Int. Conf. Interoper-mobile Application for Outdoor Operation on Simulation, modelling and optimization, SMO '08, Management, In 8th Int. Conf. on Electronics, hardware, Santander, Spain, WSEAS Press, Sept. 2008, ISBN 978- wireless and optical communications, EHAC ´09,, 960-474-007-9, ISSN 1790-2769, pp 256-260. Cambridge, UK, WSEAS Press, Feb. 2009, ISBN 978-960- 474-053-6, ISSN 1790-5117, ID 609-289, pp 57-64.

. m

e

emitting emitting

Syst

kite with with kite - projecting projecting - enery, enery, c Aerial

Autonomous (right side). (right WiMAX antennas antennas WiMAX

and sensors Fig. 7 screen DataCUM s DataCUM Helium balloon Helium Unmanned cameras, cameras, to back side) (left simultaneously live picture scene scene picture live simultaneously Fig. 8

Project Research & Development ENV V ADAPTIV Project Research & Development N

E

R CAMouflage ENV CAMouflage INTERFACE E

V

R

E DoingCAMouflage useCase S B O System dataCUM WiMAX Roaming useCase Dataproject System Projectors; dataSAM

AutonomousUnmannedAerialSystems

t t t e e e avaxTou ; SATELKITE r r r p

p

p

r

r r e e e e r e r e r t

t to DataGather t to DataGather

a to DataGather a

a n n n I h I h I h a

a AutonomousCameras S AutonomousCameras a S S t t t & a & a & a

D D D

o o

o

t t t

CCAAMMoouuffflllaaggeePPllluuss TTeecchhnnoolllooggyy uusseeCCaassee

Fig. 6: The blazon of CAM architecture modelling

ISSN: 1792-460X 294 ISBN: 978-960-474-216-5