Detailed Table of Contents

FRONT  MATTER

Title Page

Copyright / Publication Page

Books also by Professor Randall K. Nichols

Dedications

Disclaimers

Foreword

Preface

Acknowledgements

List of Contributors

Abbreviations and Acronyms

Table of Contents

Table of Figures

Table of Tables

Table of Equations

Table of Appendices

 

SECTION 1: UNMANNED AIRCRAFT SYSTEMS

Chapter 1: Information Advances, Remote ID, & Extreme Persistence ISR [Ryan]

The Emerging World of Unmanned Vehicle Uses

Information Technologies

Internet of Things (IoT)

Near Term IoT Technologies

Longer Term IoT Technologies

Artificial Intelligence (AI)

Advanced Manufacturing

Energy Sources

Concluding Thoughts

References

 

Chapter 2: Unmanned Aerial Vehicles & How They Can Augment Mesonet Weather Tower Data Collection. [Mai]

Student Learning Objectives

What is a Mesonet?

Introduction

An examination a Mesonet Data Collection weather instrument(s).

Additional Components in the Weather Ground Station part of the sUAV ecosystem

If a butterfly flaps its wings in Brazil, could it really cause a hurricane in Texas?

Oklahoma Mesonet

Conclusions

Student Think Questions

References  

 

Chapter 3: Tour de Drones for the Discerning Palate  [Nichols]

Student Objectives

Introduction

Suspicious Drones?

Cops, Drones and Nudes

28,300 feet

Turtles

Aerobatic Drone

Swarm Farming

COVID-19

HAPS UAV – Stratospheric Test Flights

Drones to Deliver Organ Transplants

Robot Trucks?

Can you be sued for flying a Drone over Private Property – The New Tort Law

Background on the Tort Law Relating to Drones – Draft One

The New Draft

Definition of “Airspace Intrusions” from the draft:

GPS Interference crashes drone in UK – Ligado debate rages

Autonomous Underwater Glider

New Autonomous Guard USV

Protecting Undersea Cables – A National Security Priority

Navy Large Unmanned Surface and Undersea Vehicles: Background and Issues for Congress

Drone Sightings: The Actual Non-Hyped Numbers Analyzed

Background

Quick Summary of the Drone Sightings

What Does the Word “Sighting” Mean?

Skyborg and Boeing’s Loyal Wingman Drone Projects

Teaming up with drones

Cultural questions facing the air force

Boeing Loyal Wingman Drone

Conclusion

References

 

SECTION 2: UNMANNED UNDERWATER SYSTEMS

 

Chapter 4: Underwater Autonomous Navigation & other UUV Advances [Mumm]

Student Learning Objectives

History of Undersea Navigation-What is it, and Why Does it Matter?

Advancements in the UUV Arena

New Challenges Require New Thinking for Underwater Bases, Ports, and Inland Waterways

Direct Warfare Port Scenario

Leveraging Underwater Bases

Mission Planning with Swarming UUVs

Perimeter Protection Planning Considerations

UUV Policies and Governance for Consideration

Conclusions

Questions

References

 

Chapter 5: Asymmetric Autonomous Maritime Systems [Hood]

Student Learning Objectives

Asymmetry in Warfare:

Naval Asymmetric Warfare

Autonomous Underwater Vehicle

Applications

Illegal Drug Trafficking:

Air Crash and Maritime Search Investigations:

Military Applications:

Underwater Gliders

US Navy’s NEMESIS Program

DARPA’s Ocean of Things

Conclusions

Questions

References

 

Chapter 6: UUV Integrated Autonomous Missions & Drone Management [Mumm]

Student Learning Objectives

History-What is it, and Why Does it Matter?

Early American Submarine Usage

Submarine and UUV Current Military Missions

Submarine and UUV Civilian/Academic Missions

UUV Markets

Teaming UUV with Manned Equipment

AI and its Influence in the Future of the Integrated Architecture of UUVs

Personnel/Human Implications

Conclusions

Discussion Questions

References

 

Chapter 7: Principles of Naval Architecture Applied to UUV’s [Jackson]

Student Learning Objectives – The student will understand the concepts of applying naval

Introduction

Role of the Naval Architect

Naval Architectural Design of UUVs

Bottaccini Model

Gilmer and Johnson Model

Jackson Curve Fit Model

Jackson-Hoerner Model

Jackson Parallel Mid-Body Model

Martz Model

Control and Dynamics of UUVs in Water

EQUATIONS OF MOTION FOR UUVS

Surge equation

Horizontal plane equations

Vertical plane equations

Roll equation

HYDRODYNAMIC DERIVATIVE FORMS

STABILITY AND CONTROL IN THE HORIZONTAL PLANE

Equations in derivative form

Dynamic stability

Steering motions

STABILITY AND CONTROL IN THE VERTICAL PLANE

Equations in derivative form

Dynamic stability

Motion control with surfaces operating

Structural Integrity

Discussion / Conclusions

Questions

References

 

SECTION 3: UNMANNED VEHICLES FOR GROUND / LAND OPERATIONS & PENETRATION OF ADS

 

Chapter 8 : Unmanned Logistics Operating Safely & Efficiently Across Multiple Domains [Lonstein]

Student Learning Objectives:

Once Completed Students Should

Yesterday, Today and Tomorrow

Yesterday

One If by Land or beneath it

Three if by Air or in Space

Are we prepared for Autonomous Logistics?

What should be done?

Conclusions

Questions for students to consider

 

Chapter 9: Chinese Advances in Stealth UAV Penetration Path Planning in Combat Environment  [Nichols]

 Student Objectives

Introduction

What Is the Counter -UAS Problem?

Implications from Attack by Iran on Saudi Arabian Oil Fields

What else did the Chinese give the Terrorists besides the advanced KH-55 Missiles and Drones?

Chinese Advances in Rapid Path Planning for Stealth UAV in Complex Environment with Bandit Threats

Novelty

UAV Path Planning

Path Planning Formulation

Path Planning Constraints

Maneuver Coordinates

Generation of Safe Paths

Collision Avoidance (CA)

A-Star Algorithm

D-Star Algorithm

Chinese Improved LRTA-STAR Algorithm

MPC

Multi-Step Search Method (MSSM)

Conclusions

Discussion Questions

References

Endnotes

  

SECTION 4: UNMANNED VEHICLES WEAPONS FOR C4ISR & POPULATION TRACKING  & CONTROL

 

Chapter 10: UAS, the Fourth Amendment & Privacy [Shay]

Student Learning Objectives:

Key Concepts

A Recent Rise in UAS Operations, Privacy Concerns and A Pandemic

Background to the FAA’s Regulatory Environment

How Previous Case Law Concerning UASs or the Technology They Carry, Has Been Applied Toward Privacy and Fourth Amendment

Technologies of the Digital Age and the Fourth Amendment

Examinations of Technologies on UASs due to CoViD-19

Federalism or Federal Regulation of UASs

Pro Arguments

Con Arguments

A Look at UAS Federalism in Action

State Laws Pertaining to Privacy and UASs Before CoViD-19       

Federal and State Laws Pertaining to Privacy and UAS After CoViD-19

Conclusions

Student Questions

References

 

Chapter 11: UV & Disinformation / Misinformation Channels [Ryan]

Student Learning Objectives

The Ruses of War

Understanding Effective Communication

The Elements of Communications

A Simple Model of Communications

Effective Listening

Deception As A Strategy

Implications for Unmanned Systems

Sensing and Interpreting Challenges

“Hidden” Information Embeds

Distinguishing Signals in Noisy Environments

Conclusions

References

 

SECTION 5: UV GEOPOLITICAL, MARITIME & LEGAL ADVANCES

Chapter 12:  Chinese UAS Proliferation along New Silk Road Sea / Land Routes [Carter]

 

Student Learning Objectives

Progression of Belt and Road Initiative (BRI) Partnerships

Middle East

European Union

Maritime Silk Road

Blue Ocean Information Network

Digital Silk Road

Conclusions

Discussion Questions

References

 

Chapter 13: Automaton, AI, Law, Ethics, Crossing the Machine – Human Barrier [Lonstein]

Student Learning Objectives

Once Completed Students Should

Humans, Humanity and Humanoids

Are We Losing Our Minds?

Dopamine

Oxytocin

Slot Machines in Your Hand & Head

The Psychology of Social Media

Weaponizing AI and Automation Using Social Media as the Delivery Method

Conclusions

Questions for students to consider

References

 

Chapter 14: Maritime Cybersecurity [Nichols]

Student Objectives

Introduction

The Case for Cyber Weapon Spoofing of Legacy GPS Signals Affecting US Navy and Commercial Vessels in Pacific

U.S Navy Vessel Collisions in the Pacific

Navy Response

The Navy Official Reaction regarding the possibility of Cyber-Weapon or Cyber-Attack

The Case for a Cyber Weapon

Surfacing Questions

How could be the GPS chaos to US Vessels be achieved?

Chinese Nightmare

Marine Transportation System / Sector (MTS) Scope

MTS Systems / Sector

MTS Scope

MTS Cyber Attack Vectors / Targets

Cyber-Physical Systems, Operational Technology, and the Internet of Things (IoT)

Internet of Things (IoT)

Maritime CPS Applications and Cybersecurity

Conclusions

Student Questions

References

BACK MATTER

Chapter 10: UAS, the Fourth Amendment and Privacy [Shay]

Appendix A – Summary of UAS Provisions in H.R. 302 (Association for Unmanned Vehicle Systems International, 2018)

Appendix B – Summary of CFR 14 Part 107 (Federal Aviation Administration, 2016)

Appendix C – Summary of changes due to CoViD-19 pandemic in UAS CFR 14 Part 107 & Part 135 (“Coronavirus guidance & resources from FAA,” 2020)

Chapter 12: Chinese Unmanned Proliferation Along New Silk Road Sea/Land routes [Carter]

Appendix A – Information provided by World Bank via the Green Belt and Road Initiative Center (Dahlquist E., 2017) ( International Institute for Green Finance II Central University for Finance and Economics, 2020)

 

REFERENCES

 

 

License

Share This Book